Feedback

X
Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments

Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments

0 Ungluers have Faved this Work
Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement process. For this, a suitable system architecture and several remote attestation protocols are designed and implemented. The resulting usage control framework is evaluated using a smart manufacturing application scenario.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 4 times via unglue.it ebook links.
  1. 4 - pdf (CC BY-SA) at OAPEN Library.

Keywords

  • Attestierungsprotokolle
  • Distributed Usage Control
  • Remote Attestation
  • thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists
  • Trusted computing
  • Trustworthy Data Spaces
  • Verteilte Nutzungskontrolle
  • Vertrauenswürdige Datenräume

Links

DOI: 10.5445/KSP/1000175307

Editions

edition cover

Share

Copy/paste this into your site: