Publication | Closed Access
Usage Control Enforcement: Present and Future
67
Citations
8
References
2008
Year
EngineeringInformation SecurityLawInformation PrivacyTechnology LawLogical Access ControlAccess ControlUsage ControlUsage Control EnforcementData ManagementIntellectual PropertyPersonal DataPrivacy Enhancing TechnologySecurity ManagementData PrivacyInformation ManagementData SecuritySecurityTechnologyData PortabilityRegulationData Protection
Both personal data and intellectual property must be protected for various reasons. The authors explore the state of the art in usage control, which is about controlling the use of such data after it has been given away, and identify room for improvement.
| Year | Citations | |
|---|---|---|
Page 1
Page 1