Wagner, 2025 - Google Patents
Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing EnvironmentsWagner, 2025
View PDF- Document ID
- 10831643421487163758
- Author
- Wagner P
- Publication year
External Links
Snippet
Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement …
- 238000000034 method 0 abstract description 99
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/52—Programme synchronisation; Mutual exclusion, e.g. by means of semaphores; Contention for resources among tasks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power Management, i.e. event-based initiation of power-saving mode
- G06F1/3206—Monitoring a parameter, a device or an event triggering a change in power modality
- G06F1/3228—Monitoring task completion, e.g. by use of idle timer, STOP command, WAIT command
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/76—Architectures of general purpose stored programme computers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abouelmehdi et al. | Big healthcare data: preserving security and privacy | |
Sookhak et al. | Security and privacy of smart cities: a survey, research issues and challenges | |
Pasquier et al. | Data provenance to audit compliance with privacy policy in the Internet of Things | |
US9015845B2 (en) | Transit control for data | |
Vithanwattana et al. | Developing a comprehensive information security framework for mHealth: a detailed analysis | |
Jin et al. | Toward secure, privacy-preserving, and interoperable medical data sharing via blockchain | |
Muheidat et al. | Mobile and cloud computing security | |
Alansari | A blockchain-based approach for secure, transparent and accountable personal data sharing | |
Yakubu et al. | PatCen: A blockchain-based patient-centric mechanism for the granular access control of infectious disease-related test records | |
Itani et al. | Reputation as a service: A system for ranking service providers in cloud systems | |
Tawfik et al. | ACHealthChain blockchain framework for access control and privacy preservation in healthcare | |
Fournaris et al. | From hardware security tokens to trusted computing and trusted systems | |
Joshi et al. | Secure and interoperable EHR management via hyperledger fabric: The Mrblock framework | |
Wagner | Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments | |
Naranjo Rico | Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques | |
Shafqat et al. | Identity matrix: architecture framework for trusted cloud computing through cloud intellect | |
Runsewe | A policy-based management framework for cloud computing security | |
Stöcklin | Evaluating SSH for modern deployments | |
Wagner | Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments | |
Alahmari et al. | A decentralized and privacy-preserving framework for electronic health records using blockchain | |
Yeluri et al. | Identity management and control for clouds | |
Pfleger | Data Security in Microservice-Systems | |
Halla-aho et al. | On the effects of forced trust on implementations of small smart cities | |
Mazmudar | Mitigator: Privacy policy compliance using Intel SGX | |
Amirah | Policy-Based Encryption Models and Their Role in Enforcing Granular Data Security for E-Marketplace Customers |