메뉴 건너뛰기




Volumn 44, Issue , 2005, Pages 127-136

DRM, trusted computing and operating system architecture

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; COMPUTING PLATFORM; DIGITAL CONTENTS; DISCRETIONARY ACCESS CONTROL; DRM CLIENT; ENFORCEMENT MECHANISMS; MANDATORY ACCESS CONTROL; MICROSOFT; NEXT-GENERATION SECURE COMPUTING BASE; OPERATING SYSTEM ARCHITECTURE; PRIVILEGED PROCESS; PROTECTION ARCHITECTURE; REFERENCE MONITORS; REMOTE ATTESTATION; TRUSTED COMPUTING; TRUSTED COMPUTING GROUPS;

EID: 71049135827     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Article
Times cited : (21)

References (27)
  • 1
    • 0004200684 scopus 로고
    • Computer Security Technology Planning Study. ESD-TR-73-51
    • Hanscom AFB, Bedford, MA
    • Anderson, J.P. (1972). Computer Security Technology Planning Study. ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA.
    • (1972) Air Force Electronic Systems Division
    • Anderson, J.P.1
  • 5
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • The MITRE Corp., Bedford MA
    • Bell, D.E. and LaPadula, L.J (1973). Secure computer systems: Mathematical foundations and model. Technical Report M74 244, The MITRE Corp., Bedford MA.
    • (1973) Technical Report M74 , vol.244
    • Bell, D.E.1    Lapadula, L.J.2
  • 8
    • 0038570707 scopus 로고    scopus 로고
    • Digital Rights Management Report
    • CEN/ISSS, Accessed 18 August 2004
    • CEN/ISSS, (2003). Digital Rights Management Report http://europa.eu.int/comm/enterprise/ict/policy/doc/drm.pdf. Accessed 18 August 2004.
    • (2003)
  • 13
    • 0003262137 scopus 로고    scopus 로고
    • The inevitability of failure: The flawed assumption of security in modern computing environments
    • Arlington, VA., August
    • Loscocco, P.A. Smalley, S.D. et al. (1998). The inevitability of failure: The flawed assumption of security in modern computing environments. In 21st National Information Systems Security Conference, Arlington, VA., August.
    • (1998) In 21st National Information Systems Security Conference
    • Loscocco, P.A.1    Smalley, S.D.2
  • 15
    • 84944878354 scopus 로고    scopus 로고
    • Handbook of Applied Cryptography
    • CRC Press, ISBN 0849385237
    • Menezes, A.J. Van Oorschot, P.C. and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press, ISBN 0849385237.
    • (1996)
    • Menezes, A.J.1    Oorschot, P.C.V.2    Vanstone, S.A.3
  • 16
    • 84871254090 scopus 로고    scopus 로고
    • Next Generation Secure Computing Base-Product Information
    • Microsoft, accessed 20 July 2004, available at
    • Microsoft, (2004), Next Generation Secure Computing Base-Product Information, available at: http://www.microsoft.com/resources/ngscb/productinfo.mspx, accessed 20 July 2004.
    • (2004)
  • 18
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the Intel Pentium' s ability to support a secure virtual machine monitor
    • Denver, Colorado, USA, August 14-17
    • Robin, J. and Irvine, C. (2000). Analysis of the Intel Pentium' s ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17.
    • (2000) In Proceedings of the 9th USENIX Security Symposium
    • Robin, J.1    Irvine, C.2
  • 19
    • 84871219465 scopus 로고    scopus 로고
    • Microsoft Shelves NGSCB Project as NX Moves to Centre Stage. 5 May 2004
    • accessed 7 May 2004
    • Rooney, P. (2004). Microsoft Shelves NGSCB Project as NX Moves to Centre Stage. 5 May 2004, http://www.crn.com/sections/BreakingNews/dailyarchives.asp?ArticleID=49936 accessed 7 May 2004.
    • (2004)
    • Rooney, P.1
  • 20
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego, August 9-13
    • Sailer, R. Zhang, X. et al. (2004). Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th Usenix Security Symposium, San Diego, August 9-13.
    • (2004) In Proceedings of the 13th Usenix Security Symposium
    • Sailer, R.1    Zhang, X.2
  • 21
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • Saltzer, J.H. and Schroeder, M.D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 23
    • 0032657326 scopus 로고    scopus 로고
    • Access Control to Prevent Piracy of Digital Information
    • Schneck, P. (1999). Access Control to Prevent Piracy of Digital Information. Proceedings of the IEEE, 87(7):1239-1250.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1239-1250
    • Schneck, P.1
  • 25
    • 0003337920 scopus 로고    scopus 로고
    • Shifting the Possible: How Trusted Systems and Digital Property Rights Challenge Us to Rethink Digital Publishing
    • 137-159
    • Stefik, M. (1997). Shifting the Possible: How Trusted Systems and Digital Property Rights Challenge Us to Rethink Digital Publishing. Berkeley Technology Law Journal Vol. 12. No.1. pp 137-159.
    • (1997) Berkeley Technology Law Journal , vol.12 , Issue.1
    • Stefik, M.1
  • 26
    • 14844287953 scopus 로고    scopus 로고
    • Trusted Platform Module Main Specification
    • Trusted Computing Group, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, October 2003, Version 1.2, Revision 62, available at, accessed 26 May 2004
    • Trusted Computing Group, (2003), Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, October 2003, Version 1.2, Revision 62, available at http://www.trustedcomputinggroup.org, accessed 26 May 2004.
    • (2003)
  • 27
    • 84871248861 scopus 로고    scopus 로고
    • World Intellectual Property Organization
    • WIPO, Accessed 15 April 2004.
    • WIPO, (1996). World Intellectual Property Organization. Wipo copyright treaty. http://www.wipo.org/eng/diplconf/distrib/treaty01.htm Accessed 15 April 2004.
    • (1996) Wipo copyright treaty


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.