-
1
-
-
33847140217
-
DRM, law and technology: An American perspective
-
Rosenblatt B.: DRM, law and technology: an American perspective, Online Information Review, 31, 1, 2007, pp. 73-84.
-
(2007)
Online Information Review
, vol.31
, Issue.1
, pp. 73-84
-
-
Rosenblatt, B.1
-
2
-
-
33144462443
-
Mission oriented risk and design analysis of critical information systems
-
Buckshaw D., Pamell G., Unkenholz W.: Mission Oriented Risk and Design Analysis of Critical Information Systems, Military Operations Research, 10, 2, 2005, pp. 19-38. (Pubitemid 43264848)
-
(2005)
Military Operations Research
, vol.10
, Issue.2
, pp. 19-38
-
-
Buckshaw, D.L.1
Parnell, G.S.2
Unkenholz, W.L.3
Parks, D.L.4
Wallner, J.M.5
Saydjari, O.S.6
-
6
-
-
36649031019
-
-
DRM Rights Expression Language Candidate Version 2.1. July
-
DRM Rights Expression Language Candidate Version 2.1. Open Mobile Alliance, July 2007.
-
(2007)
Open Mobile Alliance
-
-
-
8
-
-
40549112646
-
A formal foundation for XrML
-
Halpern J., Weissman V.: A formal foundation for XrML, Journal of the ACM, 55, 1, 2008, pp. 4-45.
-
(2008)
Journal of the ACM
, vol.55
, Issue.1
, pp. 4-45
-
-
Halpern, J.1
Weissman, V.2
-
9
-
-
60349107939
-
A fine-grained digital rights transfer policy and trusted distribution and enforcement
-
IEEE Computer Society Press, Suzhou, China, Dec
-
Zhang Z., Pei Q., Ma J., Yang L., Fan K.: A Fine-grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement. In: Proceedings of International Conference of Computational Intelligence and Security, IEEE Computer Society Press, Suzhou, China, Dec, 2008.
-
(2008)
Proceedings of International Conference of Computational Intelligence and Security
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
Fan, K.5
-
11
-
-
36649031019
-
-
DRM Architecture Candidate Version 2.1. Jul
-
DRM Architecture Candidate Version 2.1. Open Mobile Alliance, Jul, 2007.
-
(2007)
Open Mobile Alliance
-
-
-
12
-
-
36348944463
-
Introduction of the domain issuer in OMA DRM
-
Las Vegas, NV, United States
-
Koster P., Montaner J., Koraichi N., Iacob S.: Introduction of the domain issuer in OMA DRM. In: Proceedings of 2007 4th Annual IEEE Consumer Communications and Networking Conference, Las Vegas, NV, United States, 2007, pp. 940-944.
-
(2007)
Proceedings of 2007 4th Annual IEEE Consumer Communications and Networking Conference
, pp. 940-944
-
-
Koster, P.1
Montaner, J.2
Koraichi, N.3
Iacob, S.4
-
13
-
-
34547441019
-
Digital rights management with right delegation for home networks
-
M. S. Rhee and B. Lee (Eds.): LNCS 4296
-
Kim H., Lee Y., Chung B., Yoon H., Lee J., Jung K.: Digital Rights Management with right delegation for home networks. In: Proceedings of 9th International Conference on Information Security and Cryptology, M. S. Rhee and B. Lee (Eds.): LNCS 4296, 2006, pp. 233-245.
-
(2006)
Proceedings of 9th International Conference on Information Security and Cryptology
, pp. 233-245
-
-
Kim, H.1
Lee, Y.2
Chung, B.3
Yoon, H.4
Lee, J.5
Jung, K.6
-
14
-
-
36348983252
-
Identity-based DRM: Personal entertainment domain
-
LNCS 4300
-
Koster P., Kamperman F., Lenoir P., Vrielink K.: Identity-based DRM: personal entertainment domain. In: Proceeding of Transactions on Data Hiding and Multimedia Security, LNCS 4300, 2006, pp. 104-122.
-
(2006)
Proceeding of Transactions on Data Hiding and Multimedia Security
, pp. 104-122
-
-
Koster, P.1
Kamperman, F.2
Lenoir, P.3
Vrielink, K.4
-
16
-
-
34547468412
-
Towards an open, trusted digital rights management platform
-
Alexandria, Virginia, USA, Oct.
-
Cooper A., Martin A.: Towards an Open, Trusted Digital Rights Management Platform. In: Proceedings of 2006 ACM Workshop on Digital Rights Management. Alexandria, Virginia, USA, Oct. 2006.
-
(2006)
Proceedings of 2006 ACM Workshop on Digital Rights Management
-
-
Cooper, A.1
Martin, A.2
-
19
-
-
63749132915
-
Cooperative and Non-coopcrative game-theoretic analyses of adoptions of security policies for DRM
-
Las Vegas, Nevada, U.S.A., Jan.
-
Zhang Z., Pei Q., Ma J., Yang L., Fan K.: Cooperative and Non-Coopcrative Game-Theoretic Analyses of Adoptions of Security Policies for DRM. In: Proceedings of 5th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications, Satellite Workshop of 6th IEEE Consumer Communications & Networking Conference, Las Vegas, Nevada, U.S.A., Jan. 2009.
-
(2009)
Proceedings of 5th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications, Satellite Workshop of 6th IEEE Consumer Communications & Networking Conference
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
Fan, K.5
-
20
-
-
69249198262
-
Establishing multi-party trust architecture for DRM by using game-theoretic analysis of security policies
-
Zhang Z., Pei Q., Ma J., Yang L.: Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of Security Policies, Chinese Journal of Electronics, 18, 3, 2009, pp. 519-524.
-
(2009)
Chinese Journal of Electronics
, vol.18
, Issue.3
, pp. 519-524
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
-
23
-
-
77955200750
-
-
Swarm Development Group
-
Swarm Development Group, http://www.swarm.org
-
-
-
-
25
-
-
33846813917
-
Information lifecycle security risk assessment: A tool for closing security gaps
-
Bernard R.: Information Lifecycle Security Risk Assessment: A tool for closing security gaps, Computers and Security, 26, 1, 2007, pp. 26-30.
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 26-30
-
-
Bernard, R.1
-
26
-
-
63349110076
-
AURUM: A framework for information security risk management
-
Waikoloa, HI, United States
-
Ekclhart A., Fenz S., Neubauer T.: AURUM: A framework for information security risk management. In: Proc. of the 42nd Annual Hawaii International Conference on System Sciences, Waikoloa, HI, United States, 2009.
-
(2009)
Proc. of the 42nd Annual Hawaii International Conference on System Sciences
-
-
Ekclhart, A.1
Fenz, S.2
Neubauer, T.3
-
27
-
-
33748439950
-
A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property
-
Andrijcic E., Horowitz B.: A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property, Risk Analysis, 26, 4, 2006, pp. 907-923.
-
(2006)
Risk Analysis
, vol.26
, Issue.4
, pp. 907-923
-
-
Andrijcic, E.1
Horowitz, B.2
-
28
-
-
34247091938
-
A strategic modeling technique for information security risk assessment
-
Misra S., Kumar V., Kumar U.: A strategic modeling technique for information security risk assessment, Information Management and Computer Security, 15, 1, 2007, pp. 64-77.
-
(2007)
Information Management and Computer Security
, vol.15
, Issue.1
, pp. 64-77
-
-
Misra, S.1
Kumar, V.2
Kumar, U.3
-
29
-
-
51349136634
-
Security policy pre-evaluation towards risk analysis
-
Busan, Korea
-
Yi H., Hori Y., Sakurai K.: Security policy pre-evaluation towards risk analysis. In: Proc. of the 2nd International Conference on Information Security and Assurance, Busan, Korea, 2008, pp. 415-420.
-
(2008)
Proc. of the 2nd International Conference on Information Security and Assurance
, pp. 415-420
-
-
Yi, H.1
Hori, Y.2
Sakurai, K.3
-
30
-
-
33845423962
-
Quantitative evaluation of systems with security patterns using a fuzzy approach
-
Halkidis S., Chatzigeorgiou A., Stephanides G.: Quantitative evaluation of systems with security patterns using a fuzzy approach, Lecture Notes in Computer Science, 4277, 2006, pp. 554-564.
-
(2006)
Lecture Notes in Computer Science
, vol.4277
, pp. 554-564
-
-
Halkidis, S.1
Chatzigeorgiou, A.2
Stephanides, G.3
|