-
2
-
-
70349250931
-
-
Open mobile alliance digital rights management working group
-
Open mobile alliance digital rights management working group. Website, 2008. http://www.openmobilealliance.org/Technical/DRM.aspx.
-
(2008)
Website
-
-
-
3
-
-
70349231998
-
-
TCG TPM specification version 1.2. Website, 2008. https://www. trustedcomputinggroup.org/specs/TPM/.
-
TCG TPM specification version 1.2. Website, 2008. https://www. trustedcomputinggroup.org/specs/TPM/.
-
-
-
-
4
-
-
70349250946
-
A technical architecture for enforcing usage control requirements in service-oriented architectures
-
New York, NY, USA, ACM
-
A. Berthold, M. Alam, R. Breu, M. Hafner, A. Pretschner, J.-P. Seifert, and X. Zhang. A technical architecture for enforcing usage control requirements in service-oriented architectures. In SWS '07: Proceedings of the 2007 ACM workshop on Secure web services, pages 18-25, New York, NY, USA, 2007. ACM.
-
(2007)
SWS '07: Proceedings of the 2007 ACM workshop on Secure web services
, pp. 18-25
-
-
Berthold, A.1
Alam, M.2
Breu, R.3
Hafner, M.4
Pretschner, A.5
Seifert, J.-P.6
Zhang, X.7
-
5
-
-
4243136065
-
Fair use, DRM, and trusted computing
-
J. S. Erickson. Fair use, DRM, and trusted computing. Commun. ACM, 46(4):34-39, 2003.
-
(2003)
Commun. ACM
, vol.46
, Issue.4
, pp. 34-39
-
-
Erickson, J.S.1
-
6
-
-
70349238370
-
Beyond UCON core models with general obligation model and continuity-enhanced policy enforcement engine
-
B. Katt, X. Zhang, R. Breu, M. Hafner, and J.-P. Seifert. Beyond UCON core models with general obligation model and continuity-enhanced policy enforcement engine. ACM Symposium on Access Control Models and Technologies, 2008.
-
(2008)
ACM Symposium on Access Control Models and Technologies
-
-
Katt, B.1
Zhang, X.2
Breu, R.3
Hafner, M.4
Seifert, J.-P.5
-
7
-
-
58049157593
-
Key challenges in DRM: An industry perspective
-
B. A. LaMacchia. Key challenges in DRM: An industry perspective. In Digital Rights Management Workshop, pages 51-60, 2002.
-
(2002)
Digital Rights Management Workshop
, pp. 51-60
-
-
LaMacchia, B.A.1
-
8
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. SIGOPS Oper. Syst. Rev., 42(4):315-328, 2008.
-
(2008)
SIGOPS Oper. Syst. Rev
, vol.42
, Issue.4
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
9
-
-
39149090024
-
A virtual machine based information flow control system for policy enforcement
-
S. K. Nair, P. N. D. Simpson, B. Crispo, and A. S. Tanenbaum. A virtual machine based information flow control system for policy enforcement. Electronic Notes in Theoretical Computer Science, 197(1):3-16, 2008.
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.1
, pp. 3-16
-
-
Nair, S.K.1
Simpson, P.N.D.2
Crispo, B.3
Tanenbaum, A.S.4
-
10
-
-
3142523603
-
The UCONABC usage control model
-
J. Park and R. Sandhu. The UCONABC usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128-174, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
12
-
-
38949184514
-
Toward a usage-based security framework for collaborative computing systems
-
X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu. Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur., 11(1):1-36, 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur
, vol.11
, Issue.1
, pp. 1-36
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
-
13
-
-
50949130846
-
Security enforcement model for distributed usage control
-
0:10-18
-
X. Zhang, J.-P. Seifert, and R. Sandhu. Security enforcement model for distributed usage control. sutc, 0:10-18, 2008.
-
(2008)
sutc
-
-
Zhang, X.1
Seifert, J.-P.2
Sandhu, R.3
|