-
1
-
-
3142523603
-
The UCON ABC Usage Control Model
-
J. Park and R. Sandhu, "The UCON ABC Usage Control Model," ACM Trans. Information and Systems Security, vol. 7, no. 1, 2004, pp. 128-174.
-
(2004)
ACM Trans. Information and Systems Security
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
2
-
-
33748543201
-
Distributed Usage Control
-
A. Pretschner, M. Hilty, and D. Basin, "Distributed Usage Control," Comm. ACM, vol. 49, no. 9, 2006, pp. 39-44.
-
(2006)
Comm. ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
3
-
-
49249106335
-
A System Model and an Obligation Language for Distributed Usage Control
-
I-ST-20, DoCoMo Euro-Labs, Dec
-
M. Hilty et al., A System Model and an Obligation Language for Distributed Usage Control, tech. report I-ST-20, DoCoMo Euro-Labs, Dec. 2006; www.docomoeurolabs.de/pdf/ A_System_Model_and_an_Obligation_Language_for_Distributed_Usage_Control.pdf.
-
(2006)
tech. report
-
-
Hilty, M.1
-
4
-
-
0345829056
-
Provisions and Obligations in Policy Rule Management
-
C. Bettini et al., "Provisions and Obligations in Policy Rule Management," J. Network and System Management, vol. 11, no. 3, 2003, pp. 351-372.
-
(2003)
J. Network and System Management
, vol.11
, Issue.3
, pp. 351-372
-
-
Bettini, C.1
-
5
-
-
0033489645
-
Optimistic Security: A New Access Control Paradigm
-
ACM
-
D. Povey, "Optimistic Security: A New Access Control Paradigm," Proc. Workshop on New Security Paradigms, ACM, 1999, pp. 40-45.
-
(1999)
Proc. Workshop on New Security Paradigms
, pp. 40-45
-
-
Povey, D.1
-
6
-
-
40249090155
-
Usage Control Requirements in Mobile and Ubiquitous Computing Applications
-
IEEE CS Press
-
M. Hilty et al., "Usage Control Requirements in Mobile and Ubiquitous Computing Applications," Proc. Int'l. Conf. Systems and Networks Communications, IEEE CS Press, 2006.
-
(2006)
Proc. Int'l. Conf. Systems and Networks Communications
-
-
Hilty, M.1
-
8
-
-
35248890958
-
Requirements for a Rights Data Dictionary and Rights Expression Language
-
Reuters, 2001;
-
D. Parrott, Requirements for a Rights Data Dictionary and Rights Expression Language, tech. report, Reuters, 2001; xml.coverpages.org/ Reuters-mpeg-response-v10-public.pdf.
-
tech. report
-
-
Parrott, D.1
-
9
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 On The Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data
-
Nov
-
European Union, "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 On The Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data," Official Journal L 281, Nov. 1995, pp. 31-50; http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:NOT.
-
(1995)
Official Journal L
, vol.281
, pp. 31-50
-
-
-
10
-
-
49249113313
-
-
Privacy and Identity Management for Europe (Prime) Project, June
-
Privacy and Identity Management for Europe (Prime) Project, "Requirements v. 1," June 2005; www.prime-project.eu/prime_products/ reports/reqs/.
-
(2005)
Requirements
, vol.1
-
-
-
11
-
-
38049040380
-
A Policy Language for Distributed Usage Control
-
Springer-Verlag
-
M. Hilty et al., "A Policy Language for Distributed Usage Control," Proc. European Symp. Research in Computer Security, Springer-Verlag, 2007, pp. 531-546.
-
(2007)
Proc. European Symp. Research in Computer Security
, pp. 531-546
-
-
Hilty, M.1
-
13
-
-
37249019315
-
Enforcement for Usage Control - An Overview of Control Mechanisms
-
I-ST-18, DoCoMo Euro-Labs, July
-
M. Hilty et al., Enforcement for Usage Control - An Overview of Control Mechanisms, tech. report I-ST-18, DoCoMo Euro-Labs, July 2006; www.docomoeurolabs.de/pdf/ Enforcement_for_Usage_Control_an_Overview_of_Control_Mechanisms.pdf.
-
(2006)
tech. report
-
-
Hilty, M.1
-
14
-
-
49249103584
-
-
Digital Content Protection, High-bandwidth Digital Content Protection System - v. 1.1, June 2003; www.digital-cp.com/files/static_page_files/ 8006F925-129D-4C12-C87899B5A76EF5C3/HDCP_Specification%20Rev1_3.pdf.
-
Digital Content Protection, High-bandwidth Digital Content Protection System - v. 1.1, June 2003; www.digital-cp.com/files/static_page_files/ 8006F925-129D-4C12-C87899B5A76EF5C3/HDCP_Specification%20Rev1_3.pdf.
-
-
-
-
15
-
-
33747846186
-
Client-Side Access Control Enforcement Using Trusted Computing and PEI Models
-
R. Sandhu et al., "Client-Side Access Control Enforcement Using Trusted Computing and PEI Models," J. High Speed Networks, vol. 15, no. 3, 2006, pp. 229-245.
-
(2006)
J. High Speed Networks
, vol.15
, Issue.3
, pp. 229-245
-
-
Sandhu, R.1
-
16
-
-
37149049972
-
Securing the Distribution and Storage of Secrets with Trusted Platform Modules
-
Proc. IEEE Workshop in Information Security Theory and Practices, Springer-Verlag
-
P. Sevinç, M. Strasser, and D. Basin, "Securing the Distribution and Storage of Secrets with Trusted Platform Modules," Proc. IEEE Workshop in Information Security Theory and Practices, LNCS 4462, Springer-Verlag, 2007, pp. 53-66.
-
(2007)
LNCS
, vol.4462
, pp. 53-66
-
-
Sevinç, P.1
Strasser, M.2
Basin, D.3
-
17
-
-
49249090339
-
-
Marlin Developer Community, Marlin Architecture Overview, 2006; www.marlin-community.com/images/wp/MarlinArchitectureOverview.pdf.
-
Marlin Developer Community, "Marlin Architecture Overview," 2006; www.marlin-community.com/images/wp/MarlinArchitectureOverview.pdf.
-
-
-
-
18
-
-
49249094930
-
-
Marlin Developer Community, The Role of Octopus in Marlin, 2006; www.marlin-community.com/images/wp/RoleofOctopusinMarlin.pdf.
-
Marlin Developer Community, "The Role of Octopus in Marlin," 2006; www.marlin-community.com/images/wp/RoleofOctopusinMarlin.pdf.
-
-
-
|