Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments
dc.contributor.author | Wagner, Paul Georg | |
dc.date.accessioned | 2025-02-05T08:04:16Z | |
dc.date.available | 2025-02-05T08:04:16Z | |
dc.date.issued | 2025 | |
dc.identifier.uri | https://library.oapen.org/handle/20.500.12657/98205 | |
dc.description.abstract | Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement process. For this, a suitable system architecture and several remote attestation protocols are designed and implemented. The resulting usage control framework is evaluated using a smart manufacturing application scenario. | en_US |
dc.language | English | en_US |
dc.relation.ispartofseries | Karlsruher Schriften zur Anthropomatik | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists | en_US |
dc.subject.other | Trustworthy Data Spaces; Remote Attestation; Distributed Usage Control; Vertrauenswürdige Datenräume; Attestierungsprotokolle; Trusted Computing; Verteilte Nutzungskontrolle | en_US |
dc.title | Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments | en_US |
dc.type | book | |
oapen.identifier.doi | 10.5445/KSP/1000175307 | en_US |
oapen.relation.isPublishedBy | 44e29711-8d53-496b-85cc-3d10c9469be9 | en_US |
oapen.series.number | 67 | en_US |
oapen.pages | 414 | en_US |
oapen.place.publication | Karlsruhe | en_US |