Usage control: a solution to access control in a distributed- network-connected environment
Authors
Patricia Ghann, Changda Wang, Conghua Zhou
Corresponding Author
Patricia Ghann
Available Online March 2013.
- DOI
- 10.2991/iccsee.2013.68How to use a DOI?
- Keywords
- Access control, Usage control, Transition state, Obligation, Digital resource
- Abstract
Computer and information technology has evaded our every aspect of life. Information technology is seen in all aspect of the individual from banking and investing to shopping and communicating through the use of the internet services such as emails and chat rooms. Organizations and industries also utilize computer and information technology to collect information on individuals leading to the creation of warehouse of databases that enable them to achieve their objectives. In a distributed network environment today, information security is a very important issue in ensuring a safe computing environment.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Patricia Ghann AU - Changda Wang AU - Conghua Zhou PY - 2013/03 DA - 2013/03 TI - Usage control: a solution to access control in a distributed- network-connected environment BT - Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013) PB - Atlantis Press SP - 264 EP - 269 SN - 1951-6851 UR - https://doi.org/10.2991/iccsee.2013.68 DO - 10.2991/iccsee.2013.68 ID - Ghann2013/03 ER -