Show simple item record

dc.contributor.authorWagner, Paul Georg
dc.date.accessioned2025-02-05T08:04:16Z
dc.date.available2025-02-05T08:04:16Z
dc.date.issued2025
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/98205
dc.description.abstractDistributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement process. For this, a suitable system architecture and several remote attestation protocols are designed and implemented. The resulting usage control framework is evaluated using a smart manufacturing application scenario.en_US
dc.languageEnglishen_US
dc.relation.ispartofseriesKarlsruher Schriften zur Anthropomatiken_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientistsen_US
dc.subject.otherTrustworthy Data Spaces; Remote Attestation; Distributed Usage Control; Vertrauenswürdige Datenräume; Attestierungsprotokolle; Trusted Computing; Verteilte Nutzungskontrolleen_US
dc.titleTrustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environmentsen_US
dc.typebook
oapen.identifier.doi10.5445/KSP/1000175307en_US
oapen.relation.isPublishedBy44e29711-8d53-496b-85cc-3d10c9469be9en_US
oapen.series.number67en_US
oapen.pages414en_US
oapen.place.publicationKarlsruheen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record