[go: up one dir, main page]

Wagner, 2025 - Google Patents

Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments

Wagner, 2025

View PDF
Document ID
10831643421487163758
Author
Wagner P
Publication year

External Links

Snippet

Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement …
Continue reading at library.oapen.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Programme synchronisation; Mutual exclusion, e.g. by means of semaphores; Contention for resources among tasks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power Management, i.e. event-based initiation of power-saving mode
    • G06F1/3206Monitoring a parameter, a device or an event triggering a change in power modality
    • G06F1/3228Monitoring task completion, e.g. by use of idle timer, STOP command, WAIT command
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/76Architectures of general purpose stored programme computers

Similar Documents

Publication Publication Date Title
Abouelmehdi et al. Big healthcare data: preserving security and privacy
Sookhak et al. Security and privacy of smart cities: a survey, research issues and challenges
Pasquier et al. Data provenance to audit compliance with privacy policy in the Internet of Things
US9015845B2 (en) Transit control for data
Vithanwattana et al. Developing a comprehensive information security framework for mHealth: a detailed analysis
Jin et al. Toward secure, privacy-preserving, and interoperable medical data sharing via blockchain
Muheidat et al. Mobile and cloud computing security
Alansari A blockchain-based approach for secure, transparent and accountable personal data sharing
Yakubu et al. PatCen: A blockchain-based patient-centric mechanism for the granular access control of infectious disease-related test records
Itani et al. Reputation as a service: A system for ranking service providers in cloud systems
Tawfik et al. ACHealthChain blockchain framework for access control and privacy preservation in healthcare
Fournaris et al. From hardware security tokens to trusted computing and trusted systems
Joshi et al. Secure and interoperable EHR management via hyperledger fabric: The Mrblock framework
Wagner Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments
Naranjo Rico Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques
Shafqat et al. Identity matrix: architecture framework for trusted cloud computing through cloud intellect
Runsewe A policy-based management framework for cloud computing security
Stöcklin Evaluating SSH for modern deployments
Wagner Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments
Alahmari et al. A decentralized and privacy-preserving framework for electronic health records using blockchain
Yeluri et al. Identity management and control for clouds
Pfleger Data Security in Microservice-Systems
Halla-aho et al. On the effects of forced trust on implementations of small smart cities
Mazmudar Mitigator: Privacy policy compliance using Intel SGX
Amirah Policy-Based Encryption Models and Their Role in Enforcing Granular Data Security for E-Marketplace Customers