메뉴 건너뛰기




Volumn , Issue , 2007, Pages 41-53

Persistent access control: A formal model for DRM

Author keywords

access control; REL; rights expression languages

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; CONTRACTUAL AGREEMENTS; DIGITAL RIGHTS MANAGEMENT; DRM SYSTEM; FORMAL DESCRIPTION; FORMAL MODEL; FORMAL NOTATIONS; REL; RIGHTS EXPRESSION LANGUAGE;

EID: 69249168719     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314276.1314286     Document Type: Conference Paper
Times cited : (28)

References (40)
  • 2
    • 0003945085 scopus 로고    scopus 로고
    • AMERICAN HERITAGE DICTIONARIES, Ed. fourth ed. Houghton Mifflin Company
    • AMERICAN HERITAGE DICTIONARIES, Ed. The American Heritage Dictionary of the English Language, fourth ed. Houghton Mifflin Company, 2000.
    • (2000) The American Heritage Dictionary of the English Language
  • 9
    • 49049100147 scopus 로고
    • Secure computer systems: A mathematical model
    • Reprint of technical report M74 244, MITRE Corp.
    • BELL, D. E., AND LAPADULA, L. J. Secure computer systems: A mathematical model. Journal of Computer Security 4, 2/3 (1996), 229-263. Reprint of 1973 technical report M74 244, MITRE Corp.
    • (1973) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 229-263
    • Bell, D.E.1    Lapadula, L.J.2
  • 12
    • 2442601764 scopus 로고    scopus 로고
    • Skeptical view of DRM and Fair Use
    • FELTEN, E. Skeptical view of DRM and Fair Use. Communications of the ACM 46, 4 (2003), 57-59.
    • (2003) Communications of the ACM , vol.46 , Issue.4 , pp. 57-59
    • Felten, E.1
  • 14
    • 0002262722 scopus 로고    scopus 로고
    • R. Role-based access control (RBAC): Features and motivations
    • IEEE Computer Society Press. Available online
    • FERRAIOLO, D. F., CUGINI, J. A., AND KUHN, D. R. Role-based access control (RBAC): Features and motivations. In Annual Computer Security Applications Conference (1995), IEEE Computer Society Press. Available online: http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf.
    • Annual Computer Security Applications Conference (1995)
    • Ferraiolo, D.F.1    Cugini, J.A.2    Kuhn, D.3
  • 23
    • 79959847199 scopus 로고    scopus 로고
    • 13 Jan last accessed: 2007-08-23
    • IANNELLA, R., AND GUTH, S., Eds. ODRL V2.0 - Model Semantics. 13 Jan 2007. URL: http://odrl.net/2.0/WD-ODRL-Model-20070113.html last accessed: 2007-08-23.
    • (2007) ODRL V2.0 - Model Semantics
    • Iannella, R.1    Guth, S.2
  • 33
    • 79959843588 scopus 로고    scopus 로고
    • Mandatory Access Control
    • Chapter 15 FreeBSD.org. Online, last accessed: 2006-05-06
    • RHODES, T. Chapter 15 - Mandatory Access Control. FreeBSD Handbook, FreeBSD.org. Online, last accessed: 2006-05-06. URL: http://www.freebsd.org/doc/ handbook/mac.html.
    • FreeBSD Handbook
    • Rhodes, T.1
  • 34
    • 77954344689 scopus 로고    scopus 로고
    • Integrating content management with digital rights management - Imperatives and opportunities for digital content lifecycles
    • White paper
    • ROSENBLATT, B., AND DYKSTRA, G. Integrating content management with digital rights management - imperatives and opportunities for digital content lifecycles. White paper, Giantsteps Media Technology Strategies, 2003. URL: http://www.giantstepsmts.com/drm-cm-white-paper.htm.
    • (2003) Giantsteps Media Technology Strategies
    • Rosenblatt, B.1    Dykstra, G.2
  • 38
    • 0742292799 scopus 로고    scopus 로고
    • Internet security glossary
    • SHIREY, R. RFC 2828 - Internet security glossary, 2000. URL: http://www.faqs.org/rfcs/rfc2828.html.
    • (2000) RFC , vol.2828
    • Shirey, R.1
  • 39
    • 0028714663 scopus 로고
    • The management of computer security profiles using a role-oriented approach
    • VON SOLMS, S. H., AND VAN DER MERWE, I. The management of computer security profiles using a role-oriented approach. Computers and Security 13, 8 (1994), 673-680.
    • (1994) Computers and Security , vol.13 , Issue.8 , pp. 673-680
    • Von Solms, S.H.1    Van Der Merwe, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.