Padayachee, Keshnee; Eloff, Jan H.P.
(Computer Society of South Africa, 2012-06)
This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects
than do traditional access control models. Deterrent controls are intended to ...