KTU Repository

Usage control: a solution to access control in a distributed- network-connected environment

Show simple item record

dc.contributor.author Ghann, Patricia
dc.contributor.author Wang, Changda
dc.contributor.author Zhou, Conghua
dc.date.accessioned 2025-02-04T13:00:51Z
dc.date.available 2025-02-04T13:00:51Z
dc.date.issued 2013
dc.identifier.uri http://ir.ktu.edu.gh/xmlui/handle/123456789/300
dc.description.abstract Computer and information technology has evaded our every aspect of life. Information technology is seen in all aspect of the individual from banking and investing to shopping and communicating through the use of the internet services such as emails and chat rooms. Organizations and industries also utilize computer and information technology to collect information on individuals leading to the creation of warehouse of databases that enable them to achieve their objectives. In a distributed network environment today, information security is a very important issue in ensuring a safe computing environment. en_US
dc.publisher ICCSEE en_US
dc.subject Access control, Usage control, Transition state, Obligation, Digital resource en_US
dc.title Usage control: a solution to access control in a distributed- network-connected environment en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search KTU-IR


Advanced Search

Browse

My Account