-
2
-
-
47849103212
-
-
DRM From the Viewpoint of the Electronic Industry, URL
-
"DRM From the Viewpoint of the Electronic Industry," Slashdot, 2003, URL: http://slashdot.org/article.pl?sid=03/11/25/1821218.
-
(2003)
-
-
-
4
-
-
47849108458
-
Investigation of a kernel level DRM implementation
-
Tech. Rep. CS07-01-00, URL
-
A. Arnab, M. Paulse, D. Bennett, and A. Hutchison, "Investigation of a kernel level DRM implementation", Tech. Rep. CS07-01-00, 2007, URL: http://pubs.cs.uct.ac.za/archive/00000389/.
-
(2007)
-
-
Arnab, A.1
Paulse, M.2
Bennett, D.3
Hutchison, A.4
-
5
-
-
47849094317
-
-
D. E. Bell and L. J. LaPadula, Secure computer system: Unified exposition and multics interpretation, The MITRE Corporation, MTR-2997 Rev. 1, online, last accessed: 2006-05-06. URL: http://csrc.nist.gov/ publications/history/bell76.pdf.
-
D. E. Bell and L. J. LaPadula, "Secure computer system: Unified exposition and multics interpretation," The MITRE Corporation," MTR-2997 Rev. 1, online, last accessed: 2006-05-06. URL: http://csrc.nist.gov/ publications/history/bell76.pdf.
-
-
-
-
6
-
-
47849119737
-
-
_, Secure computer systems: A mathematical model, Journal of Computer Security, 4, no. 2/3, pp. 229-263, 1996, reprint of 1973 technical report M74 244, MITRE Corp.
-
_, "Secure computer systems: A mathematical model," Journal of Computer Security, vol. 4, no. 2/3, pp. 229-263, 1996, reprint of 1973 technical report M74 244, MITRE Corp.
-
-
-
-
7
-
-
47849112848
-
-
D. Berlind, A load of C.R.A.P, ZDNet.com, 2005, URL: http://news.zdnet.com/html/z/wb/6035707.html Last Accessed: 2007-01-06.
-
D. Berlind, "A load of C.R.A.P," ZDNet.com, 2005, URL: http://news.zdnet.com/html/z/wb/6035707.html Last Accessed: 2007-01-06.
-
-
-
-
8
-
-
47849128667
-
-
J. Evers, Ibm looks to hardwired DRM, ZDNet-UK, online, last accessed 2006-05-05 URL: http://news.zdnet.co.uk/business/legal/0, 39020651,39262333,00.htm.
-
J. Evers, "Ibm looks to hardwired DRM," ZDNet-UK, online, last accessed 2006-05-05 URL: http://news.zdnet.co.uk/business/legal/0, 39020651,39262333,00.htm.
-
-
-
-
9
-
-
0002262722
-
Role-based access control (RBAC): Features and motivations
-
IEEE Computer Society Press, Available online
-
D. F. Ferraiolo, J. A. Cugini, and D. R. Kuhn, "Role-based access control (RBAC): Features and motivations," in Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995, Available online: http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf.
-
(1995)
Annual Computer Security Applications Conference
-
-
Ferraiolo, D.F.1
Cugini, J.A.2
Kuhn, D.R.3
-
11
-
-
18844450721
-
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
-
ACM
-
S. Guth, G. Neumann, and M. Strembeck, "Experiences with the enforcement of access rights extracted from ODRL-based digital contracts," in Proceedings of the 2003 ACM workshop on Digital Rights Management. ACM, 2003, pp. 90-102.
-
(2003)
Proceedings of the 2003 ACM workshop on Digital Rights Management
, pp. 90-102
-
-
Guth, S.1
Neumann, G.2
Strembeck, M.3
-
12
-
-
27644495977
-
-
R. Iannella, Ed, IPR Systems Pty Ltd, URL
-
R. Iannella, Ed., Open Digital Rights Language (ODRL) 1.1. IPR Systems Pty Ltd., 2002, URL: http://odrl.net/1.1/ODRL-11.pdf.
-
(2002)
Open Digital Rights Language (ODRL) 1.1
-
-
-
13
-
-
47849104676
-
-
Microsoft, Technical overview of windows rights management services for windows server 2003, White Paper, 2003.
-
Microsoft, "Technical overview of windows rights management services for windows server 2003, White Paper," 2003.
-
-
-
-
14
-
-
11144292628
-
How DRM Based Content Delivery Systems Disrupt Expectations of "Personal Use
-
URL
-
D. Mulligan, J. Han, and A. Burstein, "How DRM Based Content Delivery Systems Disrupt Expectations of "Personal Use"," in Proceedings of the 2003 ACM workshop on Digital Rights Management. ACM, 2003, pp. 77-89, URL: http://doi.acm.org/10.1145/947380.947391.
-
(2003)
Proceedings of the 2003 ACM workshop on Digital Rights Management
, pp. 77-89
-
-
Mulligan, D.1
Han, J.2
Burstein, A.3
-
15
-
-
47849087146
-
-
Open Mobile Alliance (OMA), OMA digital rights management v1.0, Approved Version, 2004-06-25, URL: http://www.openmobilealliance.org/ release program/drm_v1_0.html.
-
Open Mobile Alliance (OMA), "OMA digital rights management v1.0, Approved Version," 2004-06-25, URL: http://www.openmobilealliance.org/ release program/drm_v1_0.html.
-
-
-
-
17
-
-
71049135827
-
DRM, Trusted Computing and Operating System Architecture
-
Newcastle, Australia: Australian Computer Society, Inc
-
J. F. Reid and W. J. Caelli, "DRM, Trusted Computing and Operating System Architecture," in Conferences in Research and Practice in Information Techology, vol. 44. Newcastle, Australia: Australian Computer Society, Inc., 2005, pp. 127-136.
-
(2005)
Conferences in Research and Practice in Information Techology
, vol.44
, pp. 127-136
-
-
Reid, J.F.1
Caelli, W.J.2
-
18
-
-
47849086576
-
-
T. Rhodes, Chapter 15 - Mandatory Access Control, FreeBSD.org, FreeBSD Handbook, online, last accessed: 2006-05-06. URL: http://www.freebsd.org/doc/handbook/mac.html.
-
T. Rhodes, "Chapter 15 - Mandatory Access Control," FreeBSD.org," FreeBSD Handbook, online, last accessed: 2006-05-06. URL: http://www.freebsd.org/doc/handbook/mac.html.
-
-
-
-
20
-
-
84899167369
-
-
Giantsteps Media Technology Strategies, White Paper, 2003, URL
-
B. Rosenblatt and G. Dykstra, "Integrating content management with digital rights management - imperatives and opportunities for digital content lifecycles," Giantsteps Media Technology Strategies," White Paper, 2003, URL: http://www.giantstepsmts.com/drm-cm_white_paper.htm.
-
Integrating content management with digital rights management - imperatives and opportunities for digital content lifecycles
-
-
Rosenblatt, B.1
Dykstra, G.2
-
21
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|