Usage control in service-oriented architectures

13Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in general has no control over the service provider's information processing devices. We analyze applicable trust models, conclude that observation-based enforcement is often more appropriate than enforcement by direct control over the service provider's actions, and present a logical architecture that blends both forms of enforcement with the business logics of serviceoriented architectures. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Pretschner, A., Massacci, F., & Hilty, M. (2007). Usage control in service-oriented architectures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4657 LNCS, pp. 83–93). Springer Verlag. https://doi.org/10.1007/978-3-540-74409-2_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free