메뉴 건너뛰기




Volumn 31, Issue 6, 2008, Pages 1173-1180

Location constraints in digital rights management

Author keywords

Access control; Digital rights management; HTTP Enabled Location Delivery; Location

Indexed keywords

ACCESS CONTROL; CONSTRAINT THEORY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; HTTP; INFORMATION SERVICES; TAXONOMIES;

EID: 40949093944     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.01.008     Document Type: Article
Times cited : (12)

References (45)
  • 1
    • 40949109024 scopus 로고    scopus 로고
    • International Standards Organisation, Information technology - multimedia framework (MPEG-21) - part 4: Intellectual property management and protection components, ISO/IEC 21000-4:2006.
    • International Standards Organisation, Information technology - multimedia framework (MPEG-21) - part 4: Intellectual property management and protection components, ISO/IEC 21000-4:2006.
  • 2
    • 40949137972 scopus 로고    scopus 로고
    • M. Barnes, J. Winterbottom, M. Thomson, B. Stark, HTTP enabled location delivery (HELD), Internet Draft (work in progress). Available from: (17 November 2007).
    • M. Barnes, J. Winterbottom, M. Thomson, B. Stark, HTTP enabled location delivery (HELD), Internet Draft (work in progress). Available from: (17 November 2007).
  • 3
    • 0033872896 scopus 로고    scopus 로고
    • P. Bahl, V.N. Padmanabhan, RADAR: an in-building RF-based user location and tracking system, in: Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 26-30 March 2000, pp. 775-784.
    • P. Bahl, V.N. Padmanabhan, RADAR: an in-building RF-based user location and tracking system, in: Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 26-30 March 2000, pp. 775-784.
  • 4
    • 84945536849 scopus 로고    scopus 로고
    • P. Castro, P. Chiu, T. Kremenek, R. Muntz, A probabilistic room location service for wireless networked environments, in: Ubicomp, 2001, pp. 18-34.
    • P. Castro, P. Chiu, T. Kremenek, R. Muntz, A probabilistic room location service for wireless networked environments, in: Ubicomp, 2001, pp. 18-34.
  • 6
    • 1542347977 scopus 로고    scopus 로고
    • P. Tao, A. Rudys, A.M. Ladd, D.S. Wallach, Wireless LAN location-sensing for security applications, in: ACM Workshop on Wireless Security, 2003, pp. 11-20.
    • P. Tao, A. Rudys, A.M. Ladd, D.S. Wallach, Wireless LAN location-sensing for security applications, in: ACM Workshop on Wireless Security, 2003, pp. 11-20.
  • 7
    • 78649688335 scopus 로고    scopus 로고
    • M.A. Youssef, A. Agrawala, A. Udaya Shankar, WLAN location determination via clustering and probability distributions, in: Pervasive Computing and Communications, 2003, pp. 143-150.
    • M.A. Youssef, A. Agrawala, A. Udaya Shankar, WLAN location determination via clustering and probability distributions, in: Pervasive Computing and Communications, 2003, pp. 143-150.
  • 8
    • 34547427328 scopus 로고    scopus 로고
    • T. Mundt, Two methods of authenticated positioning, in: Second ACM Workshop on QoS and Security for Wireless and Mobile Networks, 2 October 2006, pp. 25-32.
    • T. Mundt, Two methods of authenticated positioning, in: Second ACM Workshop on QoS and Security for Wireless and Mobile Networks, 2 October 2006, pp. 25-32.
  • 9
    • 46749123567 scopus 로고    scopus 로고
    • M.J. Surminen, N.P. Sheppard, R. Safavi-Naini, Location-based DRM using WiFi access points, in: International Symposium on Communications and Information Technology, Sydney, Australia, 2007, pp. 882-886.
    • M.J. Surminen, N.P. Sheppard, R. Safavi-Naini, Location-based DRM using WiFi access points, in: International Symposium on Communications and Information Technology, Sydney, Australia, 2007, pp. 882-886.
  • 10
    • 40949152130 scopus 로고    scopus 로고
    • Newbury Networks, WiFi, 2006. Watchdog. Available from: .
    • Newbury Networks, WiFi, 2006. Watchdog. Available from: .
  • 11
    • 40949111577 scopus 로고    scopus 로고
    • Ekahau, Ekahau, 2007. Available from: .
    • Ekahau, Ekahau, 2007. Available from: .
  • 12
    • 1542341270 scopus 로고    scopus 로고
    • Location-based authentication: grounding cyberspace for better security
    • Denning D.E., and MacDoran P.F. Location-based authentication: grounding cyberspace for better security. Computer Fraud and Security (1996) 12-16
    • (1996) Computer Fraud and Security , pp. 12-16
    • Denning, D.E.1    MacDoran, P.F.2
  • 13
    • 0032218225 scopus 로고    scopus 로고
    • E. Gabber, A. Wool, How to prove where you are: tracking the location of customer equipment, in: Fifth Conference on Computer and Communications Security, 1998, pp. 142-149.
    • E. Gabber, A. Wool, How to prove where you are: tracking the location of customer equipment, in: Fifth Conference on Computer and Communications Security, 1998, pp. 142-149.
  • 14
    • 30744444379 scopus 로고    scopus 로고
    • B. Hulsebosch, A. Salden, M. Bargh, Context-based service access for train travelers, in: European Symposium on Ambient Intelligence, 2004, pp. 84-87.
    • B. Hulsebosch, A. Salden, M. Bargh, Context-based service access for train travelers, in: European Symposium on Ambient Intelligence, 2004, pp. 84-87.
  • 15
    • 40949117759 scopus 로고    scopus 로고
    • U. Greveler, Enforcing regional DRM for multimedia broadcasts without trusted computing, in: Digital Rights Management: Technologies, Issues, Challenges and Systems, 2005, pp. 345-353.
    • U. Greveler, Enforcing regional DRM for multimedia broadcasts without trusted computing, in: Digital Rights Management: Technologies, Issues, Challenges and Systems, 2005, pp. 345-353.
  • 16
    • 27544482364 scopus 로고    scopus 로고
    • T. Mundt, Location dependent digital rights management, in: Tenth IEEE Symposium on Computers and Communications, 2005, pp. 617-622.
    • T. Mundt, Location dependent digital rights management, in: Tenth IEEE Symposium on Computers and Communications, 2005, pp. 617-622.
  • 17
    • 0035696880 scopus 로고    scopus 로고
    • M. Looi, Enhanced authentication services for Internet systems using mobile networks, in: IEEE Global Telecommunications Conference, 2001, pp. 3468-3472.
    • M. Looi, Enhanced authentication services for Internet systems using mobile networks, in: IEEE Global Telecommunications Conference, 2001, pp. 3468-3472.
  • 18
    • 2942584756 scopus 로고    scopus 로고
    • C. Wullems, M. Looi, A. Clark, Enhancing the security of Internet applications using location: a new model for tamper-resistant GSM location, in: Eighth IEEE International Symposium on Computers and Communication, 30 June-3 July 2003, pp. 1251-1258.
    • C. Wullems, M. Looi, A. Clark, Enhancing the security of Internet applications using location: a new model for tamper-resistant GSM location, in: Eighth IEEE International Symposium on Computers and Communication, 30 June-3 July 2003, pp. 1251-1258.
  • 19
    • 40949101911 scopus 로고    scopus 로고
    • Ericsson, Mobile positioning system, 2007. Available from: .
    • Ericsson, Mobile positioning system, 2007. Available from: .
  • 20
    • 40949115600 scopus 로고    scopus 로고
    • K. Nakanishi, J. Nakazawa, H. Tokuda, LEXP: preserving user privacy and certifying location information, in: Second Workshop on Security at the Ubicomp Conference, 2003.
    • K. Nakanishi, J. Nakazawa, H. Tokuda, LEXP: preserving user privacy and certifying location information, in: Second Workshop on Security at the Ubicomp Conference, 2003.
  • 21
    • 1542317849 scopus 로고    scopus 로고
    • N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: ACM Workshop on Wireless Security, 2003, pp. 1-10.
    • N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: ACM Workshop on Wireless Security, 2003, pp. 1-10.
  • 22
    • 84961644448 scopus 로고    scopus 로고
    • T. Kindberg, K. Zhang, N. Shankar, Context authentication using constrainted channels, in: Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002, pp. 14-21.
    • T. Kindberg, K. Zhang, N. Shankar, Context authentication using constrainted channels, in: Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002, pp. 14-21.
  • 23
    • 26444527413 scopus 로고    scopus 로고
    • A. Vora, M. Nesterenko, Secure location verification using radio broadcast, in: Eighth International Conference on Principles of Distributed Systems, 15-17 December 2004, pp. 369-383.
    • A. Vora, M. Nesterenko, Secure location verification using radio broadcast, in: Eighth International Conference on Principles of Distributed Systems, 15-17 December 2004, pp. 369-383.
  • 24
    • 0035791053 scopus 로고    scopus 로고
    • M.J. Covington, W. Long, S. Srinivasan, A.K. Dey, M. Ahamad, G.D. Abowd, Securing context-aware applications using environment roles, in: ACM Symposium on Access Control Models and Technologies, 2001, pp. 10-20.
    • M.J. Covington, W. Long, S. Srinivasan, A.K. Dey, M. Ahamad, G.D. Abowd, Securing context-aware applications using environment roles, in: ACM Symposium on Access Control Models and Technologies, 2001, pp. 10-20.
  • 25
    • 84948983013 scopus 로고    scopus 로고
    • G. Sampemane, P. Naldurg, R.H. Campbell, Access control for active spaces, in: Annual Computer Security Applications Conference, 2002, pp. 343-352.
    • G. Sampemane, P. Naldurg, R.H. Campbell, Access control for active spaces, in: Annual Computer Security Applications Conference, 2002, pp. 343-352.
  • 26
    • 4143096907 scopus 로고    scopus 로고
    • F. Hansen, V. Oleshchuk, Spatial role-based access control model for wireless networks, in: IEEE Vehicular Technology Conference, 2003, pp. 2093-2097.
    • F. Hansen, V. Oleshchuk, Spatial role-based access control model for wireless networks, in: IEEE Vehicular Technology Conference, 2003, pp. 2093-2097.
  • 27
    • 0242721389 scopus 로고    scopus 로고
    • W.J. Tolone, R.A. Gandhi, G.-J. Ahn, Locale-based access control: Placing collaborative decisions in context, in: IEEE International Conference on Man, Systems and Cybernetics, 2003, pp. 4120-4127.
    • W.J. Tolone, R.A. Gandhi, G.-J. Ahn, Locale-based access control: Placing collaborative decisions in context, in: IEEE International Conference on Man, Systems and Cybernetics, 2003, pp. 4120-4127.
  • 28
    • 18744414770 scopus 로고    scopus 로고
    • A. Corradi, R. Montanari, D. Tibaldi, Context-based access control for ubiquitous service provisioning, in: International Computer Software and Applications Conference, 2004, pp. 444-451.
    • A. Corradi, R. Montanari, D. Tibaldi, Context-based access control for ubiquitous service provisioning, in: International Computer Software and Applications Conference, 2004, pp. 444-451.
  • 29
    • 30644474741 scopus 로고    scopus 로고
    • E. Bertino, B. Catania, M.L. Damiani, P. Perlasca, GEO-RBAC: A spatially aware RBAC, in: ACM Symposium on Access Control Models and Technologies, 2005, pp. 29-37.
    • E. Bertino, B. Catania, M.L. Damiani, P. Perlasca, GEO-RBAC: A spatially aware RBAC, in: ACM Symposium on Access Control Models and Technologies, 2005, pp. 29-37.
  • 30
    • 33746900477 scopus 로고    scopus 로고
    • W. Han, J. Zhang, X. Yao, Context-sensitive access control model and implementation, in: International Conference on Computer and Information Technology, 2005, pp. 757-763.
    • W. Han, J. Zhang, X. Yao, Context-sensitive access control model and implementation, in: International Conference on Computer and Information Technology, 2005, pp. 757-763.
  • 31
    • 30744448197 scopus 로고    scopus 로고
    • R.J. Hulsebosch, A.H. Salden, M.S. Bargh, P.W.G. Ebben, J. Reitsma, Context sensitive access control, in: ACM Symposium on Access Control Models and Technologies, 2005, pp. 111-119.
    • R.J. Hulsebosch, A.H. Salden, M.S. Bargh, P.W.G. Ebben, J. Reitsma, Context sensitive access control, in: ACM Symposium on Access Control Models and Technologies, 2005, pp. 111-119.
  • 32
    • 33847333876 scopus 로고    scopus 로고
    • I. Ray, L. Yu, Short paper: Towards a location-aware role-based access control model, in: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 5-9 September 2005, pp. 234-236.
    • I. Ray, L. Yu, Short paper: Towards a location-aware role-based access control model, in: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 5-9 September 2005, pp. 234-236.
  • 33
    • 33751037058 scopus 로고    scopus 로고
    • M.L. Damiani, E. Bertino, Architectural issues for a location-aware role-based access control system, in: ACM Symposium on Applied Computing, 23-27 April 2006, pp. 1184-1185.
    • M.L. Damiani, E. Bertino, Architectural issues for a location-aware role-based access control system, in: ACM Symposium on Applied Computing, 23-27 April 2006, pp. 1184-1185.
  • 34
    • 33750318741 scopus 로고    scopus 로고
    • S.K.S. Gupta, T. Mukherjee, Venkatasubramanian, T.B. Taylor, Proximity based access control in smart-emergency departments, in: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 12-17 March 2006.
    • S.K.S. Gupta, T. Mukherjee, Venkatasubramanian, T.B. Taylor, Proximity based access control in smart-emergency departments, in: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 12-17 March 2006.
  • 35
    • 40949096638 scopus 로고    scopus 로고
    • ContentGuard, Extensible Rights Markup Language, 2004. Available from: .
    • ContentGuard, Extensible Rights Markup Language, 2004. Available from: .
  • 36
    • 40949151264 scopus 로고    scopus 로고
    • Open Digital Rights Language Initiative, The Open Digital Rights Language Initiative, 2004. Available from: .
    • Open Digital Rights Language Initiative, The Open Digital Rights Language Initiative, 2004. Available from: .
  • 37
    • 33750310547 scopus 로고    scopus 로고
    • J. Al-Muhtadi, R. Hill, R. Campbell, M.D. Mickunas, Context and location-aware encryption for pervasive computing environments, in: Fourth Annual IEEE Conference on Pervasive Computing and Communications Workshops, 13-17 March 2006.
    • J. Al-Muhtadi, R. Hill, R. Campbell, M.D. Mickunas, Context and location-aware encryption for pervasive computing environments, in: Fourth Annual IEEE Conference on Pervasive Computing and Communications Workshops, 13-17 March 2006.
  • 38
    • 24644446545 scopus 로고    scopus 로고
    • A.J. Lee, J.P. Boyer, C. Drexelius, P. Naldurg, R.L. Hill, R.H. Campbell, Supporting dynamically changing authorizations in pervasive communications systems, in: Second International Conference on Security in Pervasive Computing, 2005, pp. 134-150.
    • A.J. Lee, J.P. Boyer, C. Drexelius, P. Naldurg, R.L. Hill, R.H. Campbell, Supporting dynamically changing authorizations in pervasive communications systems, in: Second International Conference on Security in Pervasive Computing, 2005, pp. 134-150.
  • 39
    • 28844434914 scopus 로고    scopus 로고
    • M. White, B. Jennings, V. Osmani, S. van der Meer, Context driven, user-centric access control for smart spaces, in: IEE International Workshop on Intelligent Environments, 2005, pp. 13-19.
    • M. White, B. Jennings, V. Osmani, S. van der Meer, Context driven, user-centric access control for smart spaces, in: IEE International Workshop on Intelligent Environments, 2005, pp. 13-19.
  • 40
    • 40949116839 scopus 로고    scopus 로고
    • International Standards Organisation, Information technology - multimedia framework (MPEG-21) - part 5: Rights expression language, ISO/IEC 21000-5:2004.
    • International Standards Organisation, Information technology - multimedia framework (MPEG-21) - part 5: Rights expression language, ISO/IEC 21000-5:2004.
  • 41
    • 27644513815 scopus 로고    scopus 로고
    • A.W. Dent, A. Tomlinson, Regional blackouts: protection of broadcast content on 3G networks, in: Fifth IEE Conference on 3G Mobile Communication Technologies, 2004, pp. 442-446.
    • A.W. Dent, A. Tomlinson, Regional blackouts: protection of broadcast content on 3G networks, in: Fifth IEE Conference on 3G Mobile Communication Technologies, 2004, pp. 442-446.
  • 42
    • 77149147114 scopus 로고    scopus 로고
    • N.P. Sheppard, R. Safavi-Naini, Protecting privacy with the MPEG-21 IPMP framework, in: International Workshop on Privacy Enhancing Technologies, Cambridge, UK, 2006, pp. 152-171.
    • N.P. Sheppard, R. Safavi-Naini, Protecting privacy with the MPEG-21 IPMP framework, in: International Workshop on Privacy Enhancing Technologies, Cambridge, UK, 2006, pp. 152-171.
  • 43
    • 40949156377 scopus 로고    scopus 로고
    • International Standards Organisation, Information technology - multimedia framework (MPEG-21) - part 1: Vision, technologies and strategy, ISO/IEC 21000-1:2001.
    • International Standards Organisation, Information technology - multimedia framework (MPEG-21) - part 1: Vision, technologies and strategy, ISO/IEC 21000-1:2001.
  • 44
    • 40949151262 scopus 로고    scopus 로고
    • Andrew Corporation, Open source HELD: LIS and client, 2007. Available from: .
    • Andrew Corporation, Open source HELD: LIS and client, 2007. Available from: .
  • 45
    • 40949154459 scopus 로고    scopus 로고
    • T. Dierks, C. Allen, The TLS protocol: Version 1.0, RFC 2246, 1999.
    • T. Dierks, C. Allen, The TLS protocol: Version 1.0, RFC 2246, 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.