Publication | Closed Access
Usage Control Requirements in Mobile and Ubiquitous Computing Applications
14
Citations
8
References
2006
Year
Unknown Venue
Context-aware Pervasive SystemEngineeringInformation SecuritySoftware EngineeringContext ManagementData SciencePervasive ComputingUsage ControlInternet Of ThingsThird PartiesData ManagementIntellectual PropertyMobile Device ManagementData PrivacyMobile ComputingInformation ManagementComputer ScienceUsage Control RequirementsSoftware DesignData SecurityMobile Computing SystemEdge ComputingTechnologySystem SoftwareUbiquitous Application
Usage control is concerned with control over data after its release to third parties, and includes requirements such as "this data must be deleted after 30 days" and "this data may be used for statistical purposes only". With the ultimate goal of respective policy languages that go beyond current technology for DRM of intellectual property, we provide (1) a catalog of requirements that are specific to the domains of mobile and ubiquitous computing applications, and (2) a classification of mobile and ubiquitous computing application scenarios that involve usage control, including a description of different kinds of involved data.
| Year | Citations | |
|---|---|---|
Page 1
Page 1