-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Relationship between Usage Control and Access Control #67
Comments
Hi, this concept evolved from some major publications in the area of usage control. |
Hi Gerd,
that is an interesting point. If I try to apply this, would it mean that any kind of such usage policy is ONLY possible WITH some kind of technical enforcement? Or how would you describe usage policy (security context outside my own organization...) in case NO technical enforcement was possible? |
Hi Matthias, I do agree. Without technical enforcement you have "just" a legal agreement in the best case. And indeed, technical enforcement is not trivial. This is also why we focus on Trusted Execution Environments so much from a security point of view. We did build systems based on Trusted Platform Modules, but reliably securing the full software stack is quite challenging. With a working remote attestation mechanisms and TEEs you could have technical enforcement and a reliable way to prove f the deployed software artefact is what you expect. |
And that would raise the question that I asked in #75 Would you say that such a 'legal agreement' is a license? |
I commented there. I fully agree with Peter. |
From a plain protocol perspective, this is not anything which needs to be specified by us here. However, we (the DSP working group) proposes to explain the relationship between Usage/Access/etc. Control to the policy/contract data object in the Best Practice document. |
Therefore, I propose to remove the "V1 pre-release" label @ssteinbuss |
Ack, changed label from "V1 pre-release" to "Best Practices" |
As a reminder to what we discussed during the sync call 2 weeks ago. Is Access Control really part of Usage Control?
Seems to appear in multiple documents, e.g.
https://internationaldataspaces.org/wp-content/uploads/dlm_uploads/IDSA-Position-Paper-Data-Sovereignty-Requirements-Analysis-of-Manufacturing-Use-Cases.pdf
Page 10.
It should be discussed whether:
should be changed to:
for more clarity.
I think "extension could be still fine, if not the picture would direct into the idea that one was "contained in" the other.
The text was updated successfully, but these errors were encountered: