52,00 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
0 °P sammeln
  • Broschiertes Buch

Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement process. For this, a suitable system architecture and several remote attestation protocols are designed and implemented. The resulting usage control framework is evaluated using a smart manufacturing application scenario.

Produktbeschreibung
Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement process. For this, a suitable system architecture and several remote attestation protocols are designed and implemented. The resulting usage control framework is evaluated using a smart manufacturing application scenario.