메뉴 건너뛰기




Volumn , Issue , 2007, Pages 13-18

Usage control reference monitor architecture

Author keywords

[No Author keywords available]

Indexed keywords

DECENTRALIZED CONTROL; MOBILE DEVICES; TECHNICAL PRESENTATIONS; TELECOMMUNICATION EQUIPMENT; UBIQUITOUS COMPUTING;

EID: 47649128729     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPERU.2007.20     Document Type: Conference Paper
Times cited : (5)

References (11)
  • 1
    • 40249113471 scopus 로고    scopus 로고
    • Tamper-resistant charging technology for a seamless environment
    • September
    • H. Aono, R. Hoshino, and S. Hongo. Tamper-resistant charging technology for a seamless environment. NTT DoCoMo Technical Journal, 6(2):31-37, September 2004.
    • (2004) NTT DoCoMo Technical Journal , vol.6 , Issue.2 , pp. 31-37
    • Aono, H.1    Hoshino, R.2    Hongo, S.3
  • 2
    • 50049116165 scopus 로고    scopus 로고
    • A customizable reputation-based privacy assurance system using active feedback
    • September
    • S. Crane and M. C. Mont. A customizable reputation-based privacy assurance system using active feedback. In IEEE SECURECOMM SECOVAL Workshop, September 2006.
    • (2006) IEEE SECURECOMM SECOVAL Workshop
    • Crane, S.1    Mont, M.C.2
  • 6
    • 47649100786 scopus 로고    scopus 로고
    • Digital Rights Management-A Survey of Existing Technologies. Technical report, Katholieke Universiteit Leuven
    • November
    • S. Michiels, W. Jossen, E. Truyen, and K. Verslype. Digital Rights Management-A Survey of Existing Technologies. Technical report, Katholieke Universiteit Leuven, November 2005.
    • (2005)
    • Michiels, S.1    Jossen, W.2    Truyen, E.3    Verslype, K.4
  • 7
    • 34547977332 scopus 로고    scopus 로고
    • Extending hp identity management solutions to enforce privacy policies and obligations for regulatory compliance by enterprises
    • Technical Report HPL-2005-110, HP-Labs, June
    • M. C. Mont, R. Thyne, K. Chan, and P. Bramhall. Extending hp identity management solutions to enforce privacy policies and obligations for regulatory compliance by enterprises. Technical Report HPL-2005-110, HP-Labs, June 2005.
    • (2005)
    • Mont, M.C.1    Thyne, R.2    Chan, K.3    Bramhall, P.4
  • 8
    • 47649120146 scopus 로고    scopus 로고
    • OMA. DRM Architecture, September 2005. Candidate Version 2.0
    • OMA. DRM Architecture, September 2005. Candidate Version 2.0.
  • 9
    • 0242456750 scopus 로고    scopus 로고
    • Towards Usage Control Models: Beyond Traditional Access Control
    • J. Park and R. Sandhu. Towards Usage Control Models: Beyond Traditional Access Control. In SACMAT 2002, 2002.
    • (2002) SACMAT 2002
    • Park, J.1    Sandhu, R.2
  • 11
    • 47649097802 scopus 로고    scopus 로고
    • Usage Control Enforcement - Architecture of a Reference Monitor
    • Technical Report I-ST-014, DoCoMo Euro-Labs
    • C. Schaefer. Usage Control Enforcement - Architecture of a Reference Monitor. Technical Report I-ST-014, DoCoMo Euro-Labs, 2006.
    • (2006)
    • Schaefer, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.