-
2
-
-
0003945085
-
-
AMERICAN HERITAGE DICTIONARIES, Ed. fourth ed. Houghton Mifflin Company
-
AMERICAN HERITAGE DICTIONARIES, Ed. The American Heritage Dictionary of the English Language, fourth ed. Houghton Mifflin Company, 2000.
-
(2000)
The American Heritage Dictionary of the English Language
-
-
-
4
-
-
33745839874
-
Fairer usage contracts for DRM
-
R. Safavi-Naini and M. Yung, Eds., ACM
-
ARNAB, A., AND HUTCHISON, A. Fairer usage contracts for DRM. In Proceedings of the fifth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2005 (2005), R. Safavi-Naini and M. Yung, Eds., ACM, pp. 1-7.
-
Proceedings of the Fifth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2005 (2005)
, pp. 1-7
-
-
Arnab, A.1
Hutchison, A.2
-
5
-
-
79959841253
-
DRM use license negotiations using ODRL
-
v2.0, Submitted to the discussions in the
-
ARNAB, A., AND HUTCHISON, A. DRM use license negotiations using ODRL v2.0, 2006. Submitted to the discussions in the 9th General Assembly of the Digital Media Project (DMP), Laussanne, Switzerland.
-
(2006)
9th General Assembly of the Digital Media Project (DMP), Laussanne, Switzerland
-
-
Arnab, A.1
Hutchison, A.2
-
6
-
-
34547431237
-
Verifiable digital object identity system
-
K. Kurosawa, R. Safavi-Naini, and M. Yung, Eds., ACM
-
ARNAB, A., AND HUTCHISON, A. Verifiable digital object identity system. In Proceedings of the Sixth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2006 (2006), K. Kurosawa, R. Safavi-Naini, and M. Yung, Eds., ACM.
-
Proceedings of the Sixth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2006 (2006)
-
-
Arnab, A.1
Hutchison, A.2
-
9
-
-
49049100147
-
Secure computer systems: A mathematical model
-
Reprint of technical report M74 244, MITRE Corp.
-
BELL, D. E., AND LAPADULA, L. J. Secure computer systems: A mathematical model. Journal of Computer Security 4, 2/3 (1996), 229-263. Reprint of 1973 technical report M74 244, MITRE Corp.
-
(1973)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 229-263
-
-
Bell, D.E.1
Lapadula, L.J.2
-
11
-
-
40949125463
-
Logic based authorization policy engineering
-
DAI, J., AND ALVES-FOSS, J. Logic based authorization policy engineering. In Proceedings of the 6th World Multiconference on Systemics, Cybernetics, and Informatics (2002), pp. 230-238.
-
Proceedings of the 6th World Multiconference on Systemics, Cybernetics, and Informatics (2002)
, pp. 230-238
-
-
Dai, J.1
Alves-Foss, J.2
-
12
-
-
2442601764
-
Skeptical view of DRM and Fair Use
-
FELTEN, E. Skeptical view of DRM and Fair Use. Communications of the ACM 46, 4 (2003), 57-59.
-
(2003)
Communications of the ACM
, vol.46
, Issue.4
, pp. 57-59
-
-
Felten, E.1
-
13
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
FERRAIOLO, D. F., BARKLEY, J. F., AND KUHN, D. R. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security 2, 1 (1999), 34-64.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
14
-
-
0002262722
-
R. Role-based access control (RBAC): Features and motivations
-
IEEE Computer Society Press. Available online
-
FERRAIOLO, D. F., CUGINI, J. A., AND KUHN, D. R. Role-based access control (RBAC): Features and motivations. In Annual Computer Security Applications Conference (1995), IEEE Computer Society Press. Available online: http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf.
-
Annual Computer Security Applications Conference (1995)
-
-
Ferraiolo, D.F.1
Cugini, J.A.2
Kuhn, D.3
-
19
-
-
18844450721
-
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
-
ACM
-
GUTH, S., NEUMANN, G., AND STREMBECK, M. Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. In Proceedings of the 2003 ACM workshop on Digital Rights Management (2003), ACM, pp. 90-102.
-
Proceedings of the 2003 ACM Workshop on Digital Rights Management (2003)
, pp. 90-102
-
-
Guth, S.1
Neumann, G.2
Strembeck, M.3
-
23
-
-
79959847199
-
-
13 Jan last accessed: 2007-08-23
-
IANNELLA, R., AND GUTH, S., Eds. ODRL V2.0 - Model Semantics. 13 Jan 2007. URL: http://odrl.net/2.0/WD-ODRL-Model-20070113.html last accessed: 2007-08-23.
-
(2007)
ODRL V2.0 - Model Semantics
-
-
Iannella, R.1
Guth, S.2
-
24
-
-
0030677524
-
A logical language for expressing authorizations
-
JAJODIA, S., SAMARATI, P., AND SUBRAHMANIAN, V. A logical language for expressing authorizations. In Proceedings of 1997 IEEE Symposium on Security and Privacy (1997), pp. 31-42.
-
Proceedings of 1997 IEEE Symposium on Security and Privacy (1997)
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
-
25
-
-
18844387654
-
DRM as a Layered System
-
A. Kiayias and M. Yung, Eds., ACM
-
JAMKHEDKAR, P. A., AND HEILEMAN, G. L. DRM as a Layered System. In Proceedings of the Fourth ACM Workshop on Digital Rights Management (2004), A. Kiayias and M. Yung, Eds., ACM, pp. 11-21.
-
Proceedings of the Fourth ACM Workshop on Digital Rights Management (2004)
, pp. 11-21
-
-
Jamkhedkar, P.A.1
Heileman, G.L.2
-
26
-
-
34547539234
-
The problem with rights expression languages
-
ACM Press
-
JAMKHEDKAR, P. A., HEILEMAN, G. L., AND MARTINEZ-ORTIZ, I. The problem with rights expression languages. In DRM '06: Proceedings of the ACM workshop on Digital rights management (New York, NY, USA, 2006), ACM Press, pp. 59-68.
-
DRM '06: Proceedings of the ACM Workshop on Digital Rights Management (New York, NY, USA, 2006)
, pp. 59-68
-
-
Jamkhedkar, P.A.1
Heileman, G.L.2
Martinez-Ortiz, I.3
-
27
-
-
0034450091
-
XML document security based on provisional authorization
-
ACM Press
-
KUDO, M., AND HADA, S. XML document security based on provisional authorization. In CCS '00: Proceedings of the 7th ACM conference on Computer and communications security (New York, NY, USA, 2000), ACM Press, pp. 87-96.
-
CCS '00: Proceedings of the 7th ACM Conference on Computer and Communications Security (New York, NY, USA, 2000)
, pp. 87-96
-
-
Kudo, M.1
Hada, S.2
-
32
-
-
71049135827
-
DRM, Trusted Computing and Operating System Architecture
-
Australian Computer Society, Inc.
-
REID, J. F., AND CAELLI, W. J. DRM, Trusted Computing and Operating System Architecture. In Conferences in Research and Practice in Information Techology (Newcastle, Australia, 2005), vol. 44, Australian Computer Society, Inc., pp. 127-136.
-
Conferences in Research and Practice in Information Techology (Newcastle, Australia, 2005)
, vol.44
, pp. 127-136
-
-
Reid, J.F.1
Caelli, W.J.2
-
33
-
-
79959843588
-
Mandatory Access Control
-
Chapter 15 FreeBSD.org. Online, last accessed: 2006-05-06
-
RHODES, T. Chapter 15 - Mandatory Access Control. FreeBSD Handbook, FreeBSD.org. Online, last accessed: 2006-05-06. URL: http://www.freebsd.org/doc/ handbook/mac.html.
-
FreeBSD Handbook
-
-
Rhodes, T.1
-
34
-
-
77954344689
-
Integrating content management with digital rights management - Imperatives and opportunities for digital content lifecycles
-
White paper
-
ROSENBLATT, B., AND DYKSTRA, G. Integrating content management with digital rights management - imperatives and opportunities for digital content lifecycles. White paper, Giantsteps Media Technology Strategies, 2003. URL: http://www.giantstepsmts.com/drm-cm-white-paper.htm.
-
(2003)
Giantsteps Media Technology Strategies
-
-
Rosenblatt, B.1
Dykstra, G.2
-
35
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. Role-based access control models. IEEE Computer 29, 2 (1996), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
38
-
-
0742292799
-
Internet security glossary
-
SHIREY, R. RFC 2828 - Internet security glossary, 2000. URL: http://www.faqs.org/rfcs/rfc2828.html.
-
(2000)
RFC
, vol.2828
-
-
Shirey, R.1
-
39
-
-
0028714663
-
The management of computer security profiles using a role-oriented approach
-
VON SOLMS, S. H., AND VAN DER MERWE, I. The management of computer security profiles using a role-oriented approach. Computers and Security 13, 8 (1994), 673-680.
-
(1994)
Computers and Security
, vol.13
, Issue.8
, pp. 673-680
-
-
Von Solms, S.H.1
Van Der Merwe, I.2
-
40
-
-
0002207250
-
Languages for negotiation
-
W. Horn, Ed., John Wiley & Sons.
-
WOOLDRIDGE, M., AND PARSONS, S. Languages for negotiation. In Proceedings of the Fourteenth European Conference on Artificial Intelligence (ECAI-2000) (2000), W. Horn, Ed., John Wiley & Sons. http://citeseer.ist.psu.edu/ wooldridge00languages.html.
-
Proceedings of the Fourteenth European Conference on Artificial Intelligence (ECAI-2000) (2000)
-
-
Wooldridge, M.1
Parsons, S.2
|