메뉴 건너뛰기




Volumn 20, Issue 3, 2010, Pages 265-284

Fuzzy risk assessments on security policies for digital rights management

Author keywords

Digital rights management; Fuzzy risk assessment; Qualitative and quantitative analysis; Risk management; Security policy; Trusted computing

Indexed keywords

DIGITAL RIGHTS MANAGEMENT; FUZZY RISK; QUALITATIVE AND QUANTITATIVE ANALYSIS; SECURITY POLICY; TRUSTED COMPUTING;

EID: 77955198823     PISSN: 12100552     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (11)

References (30)
  • 1
    • 33847140217 scopus 로고    scopus 로고
    • DRM, law and technology: An American perspective
    • Rosenblatt B.: DRM, law and technology: an American perspective, Online Information Review, 31, 1, 2007, pp. 73-84.
    • (2007) Online Information Review , vol.31 , Issue.1 , pp. 73-84
    • Rosenblatt, B.1
  • 6
    • 36649031019 scopus 로고    scopus 로고
    • DRM Rights Expression Language Candidate Version 2.1. July
    • DRM Rights Expression Language Candidate Version 2.1. Open Mobile Alliance, July 2007.
    • (2007) Open Mobile Alliance
  • 8
    • 40549112646 scopus 로고    scopus 로고
    • A formal foundation for XrML
    • Halpern J., Weissman V.: A formal foundation for XrML, Journal of the ACM, 55, 1, 2008, pp. 4-45.
    • (2008) Journal of the ACM , vol.55 , Issue.1 , pp. 4-45
    • Halpern, J.1    Weissman, V.2
  • 11
    • 36649031019 scopus 로고    scopus 로고
    • DRM Architecture Candidate Version 2.1. Jul
    • DRM Architecture Candidate Version 2.1. Open Mobile Alliance, Jul, 2007.
    • (2007) Open Mobile Alliance
  • 20
    • 69249198262 scopus 로고    scopus 로고
    • Establishing multi-party trust architecture for DRM by using game-theoretic analysis of security policies
    • Zhang Z., Pei Q., Ma J., Yang L.: Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of Security Policies, Chinese Journal of Electronics, 18, 3, 2009, pp. 519-524.
    • (2009) Chinese Journal of Electronics , vol.18 , Issue.3 , pp. 519-524
    • Zhang, Z.1    Pei, Q.2    Ma, J.3    Yang, L.4
  • 23
    • 77955200750 scopus 로고    scopus 로고
    • Swarm Development Group
    • Swarm Development Group, http://www.swarm.org
  • 25
    • 33846813917 scopus 로고    scopus 로고
    • Information lifecycle security risk assessment: A tool for closing security gaps
    • Bernard R.: Information Lifecycle Security Risk Assessment: A tool for closing security gaps, Computers and Security, 26, 1, 2007, pp. 26-30.
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 26-30
    • Bernard, R.1
  • 27
    • 33748439950 scopus 로고    scopus 로고
    • A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property
    • Andrijcic E., Horowitz B.: A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property, Risk Analysis, 26, 4, 2006, pp. 907-923.
    • (2006) Risk Analysis , vol.26 , Issue.4 , pp. 907-923
    • Andrijcic, E.1    Horowitz, B.2
  • 28
    • 34247091938 scopus 로고    scopus 로고
    • A strategic modeling technique for information security risk assessment
    • Misra S., Kumar V., Kumar U.: A strategic modeling technique for information security risk assessment, Information Management and Computer Security, 15, 1, 2007, pp. 64-77.
    • (2007) Information Management and Computer Security , vol.15 , Issue.1 , pp. 64-77
    • Misra, S.1    Kumar, V.2    Kumar, U.3
  • 30
    • 33845423962 scopus 로고    scopus 로고
    • Quantitative evaluation of systems with security patterns using a fuzzy approach
    • Halkidis S., Chatzigeorgiou A., Stephanides G.: Quantitative evaluation of systems with security patterns using a fuzzy approach, Lecture Notes in Computer Science, 4277, 2006, pp. 554-564.
    • (2006) Lecture Notes in Computer Science , vol.4277 , pp. 554-564
    • Halkidis, S.1    Chatzigeorgiou, A.2    Stephanides, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.