Seminar: Current Topics in Usage Control

Form:
Block seminar on July 5-6, 2012
Organizer:
Prof. Dr. Heiko Mantel
Registration:
closed
Preparation Meeting:
Thursday, 12.04.12, 16:15 in S2|02 E302
Literature:
introduced in the preparation meeting

Content

When treating confidential data, regulations claiming that the access to the data should be limited and controlled usually have to be considered. One way to formulate these regulations are access control policies (e.g., Chinese Wall). Usage control policies even go beyond access control policies by not only constraining the sets of access rights but also the terms of usage (e.g. for what purpose, how often, during which time period). In the presence of such regulations, the need for developing appropriate mechanisms to enforce security policies arises, especially in the context of untrusted code.

In this seminar, current research papers capturing security policy languages, static verification of policy conformance prior to program execution, and runtime enforcement mechanisms will be presented.

Resources

 

Last modified on 22 October 2012.

A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang