메뉴 건너뛰기




Volumn , Issue , 2008, Pages 87-94

Enforcing DRM policies across applications

Author keywords

Access control; Digital rights management; Policy enforcement; Usage control

Indexed keywords

APPLICATION-SPECIFIC; DIGITAL RIGHTS MANAGEMENT; DRM POLICY; DRM SYSTEM; JAVA APPLICATIONS; PAY-PER-USE; POLICY ENFORCEMENT; SOFTWARE-BASED; UNIQUE FEATURES; USAGE CONTROL;

EID: 70349233074     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456520.1456535     Document Type: Conference Paper
Times cited : (11)

References (13)
  • 2
    • 70349250931 scopus 로고    scopus 로고
    • Open mobile alliance digital rights management working group
    • Open mobile alliance digital rights management working group. Website, 2008. http://www.openmobilealliance.org/Technical/DRM.aspx.
    • (2008) Website
  • 3
    • 70349231998 scopus 로고    scopus 로고
    • TCG TPM specification version 1.2. Website, 2008. https://www. trustedcomputinggroup.org/specs/TPM/.
    • TCG TPM specification version 1.2. Website, 2008. https://www. trustedcomputinggroup.org/specs/TPM/.
  • 5
    • 4243136065 scopus 로고    scopus 로고
    • Fair use, DRM, and trusted computing
    • J. S. Erickson. Fair use, DRM, and trusted computing. Commun. ACM, 46(4):34-39, 2003.
    • (2003) Commun. ACM , vol.46 , Issue.4 , pp. 34-39
    • Erickson, J.S.1
  • 7
    • 58049157593 scopus 로고    scopus 로고
    • Key challenges in DRM: An industry perspective
    • B. A. LaMacchia. Key challenges in DRM: An industry perspective. In Digital Rights Management Workshop, pages 51-60, 2002.
    • (2002) Digital Rights Management Workshop , pp. 51-60
    • LaMacchia, B.A.1
  • 10
    • 3142523603 scopus 로고    scopus 로고
    • The UCONABC usage control model
    • J. Park and R. Sandhu. The UCONABC usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128-174, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 12
    • 38949184514 scopus 로고    scopus 로고
    • Toward a usage-based security framework for collaborative computing systems
    • X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu. Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur., 11(1):1-36, 2008.
    • (2008) ACM Trans. Inf. Syst. Secur , vol.11 , Issue.1 , pp. 1-36
    • Zhang, X.1    Nakae, M.2    Covington, M.J.3    Sandhu, R.4
  • 13
    • 50949130846 scopus 로고    scopus 로고
    • Security enforcement model for distributed usage control
    • 0:10-18
    • X. Zhang, J.-P. Seifert, and R. Sandhu. Security enforcement model for distributed usage control. sutc, 0:10-18, 2008.
    • (2008) sutc
    • Zhang, X.1    Seifert, J.-P.2    Sandhu, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.