-
2
-
-
3242669223
-
The darknet and the future of content distribution
-
Accessed11Oct2008
-
Biddle, P., England, P., Peinado, M., & Willman, B. (2002). The darknet and the future of content distribution. In Proceedings of 2002 ACM DRM workshop. http://msl1.mit.edu/ESD10/docs/darknet5.pdf. Accessed 11 Oct 2008.
-
(2002)
Proceedings of 2002 ACM DRM Workshop
-
-
Biddle, P.1
England, P.2
Peinado, M.3
Willman, B.4
-
3
-
-
0003200309
-
Resource ReSerVation protocol (RSVP)-version 1 functional specification
-
Braden, R. Ed., Zhang, L., Berson, S., Herzog, S., & Jamin, S. (1997). Resource ReSerVation protocol (RSVP)-version 1 functional specification. IETF RFC 2205.
-
(1997)
IETF RFC
, vol.2205
-
-
Braden, R.Ed.1
Zhang, L.2
Berson, S.3
Herzog, S.4
Jamin, S.5
-
4
-
-
49149123826
-
-
Techtarger. Accessed 12 Oct 2008
-
Techtarger (2006). Digital rights management. http://searchcio. techtarget.com/sDefinition/0,sid182-gci493373,00.html. Accessed 12 Oct 2008.
-
(2006)
Digital Rights Management
-
-
-
5
-
-
79952827313
-
-
Techterms
-
Techterms (2008). DRM (digital rights management). http://www.techterms. com/definition/drm. Accessed 12 Oct 2008.
-
(2008)
DRM (Digital Rights Management).
-
-
-
6
-
-
77955306253
-
-
InterTrust. http://www.intertrust.com/main/overview/drm.html.
-
-
-
-
7
-
-
77955308180
-
Digital rights management-an overview of current challenges and solutions
-
In H. S. Venter, J. H. P. Eloff, L. Labuschagne, & M. M. Eloff (Eds.), Gallagher Estate, Midrand, South Africa.
-
Arnab, A., & Hutchison, A. (2004). Digital rights management-an overview of current challenges and solutions. In H. S. Venter, J. H. P. Eloff, L. Labuschagne, & M. M. Eloff (Eds.), Proceedings information security South Africa (ISSA), Gallagher Estate, Midrand, South Africa. http://pubs.cs.uct.ac. za/archive/00000139/01/arnab-hutchison-issa2004.pdf. Accessed 11 Oct 2008.
-
(2004)
Proceedings Information Security South Africa (ISSA)
-
-
Arnab, A.1
Hutchison, A.2
-
8
-
-
37249058817
-
Evolution of DRM schema: From encryption to interoperability and monitoring
-
MCAM 2007 Springer Berlin
-
Huang, T. (2007). Evolution of DRM schema: from encryption to interoperability and monitoring. In LNCS : Vol. 4577. MCAM 2007. Berlin: Springer.
-
(2007)
LNCS
, vol.4577
-
-
Huang, T.1
-
9
-
-
0003320533
-
Host extensions for IP multicasting
-
Deering, S. E. (1989). Host extensions for IP multicasting. IETF RFC 1112.
-
(1989)
IETF RFC
, vol.1112
-
-
Deering, S.E.1
-
10
-
-
77955309807
-
-
Multicast Security (MSEC)
-
Multicast Security (MSEC), IETF working group. http://www.ietf.org/html. charters/msec-charter.html. 1 August 2007.
-
-
-
-
11
-
-
24144453074
-
The multicast group security architecture
-
Hardjono, T. V. (2004). The multicast group security architecture. RFC 3740.
-
(2004)
RFC
, vol.3740
-
-
Hardjono, T.V.1
-
12
-
-
34250309913
-
Scalable solutions for secure group communications
-
DOI 10.1016/j.comnet.2007.02.002, PII S1389128607000746
-
R. Mukherjee J. W. Atwood 2007 Scalable solutions for secure group communications Computer Networks 51 12 10.1016/j.comnet.2007.02.002 (Pubitemid 46921034)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3525-3548
-
-
Mukherjee, R.1
Atwood, J.W.2
-
13
-
-
62149140567
-
Multicast receiver control by IGMP-AC
-
10.1016/j.comnet.2008.12.005
-
S. Islam J. W. Atwood 2009 Multicast receiver control by IGMP-AC Computer Networks 53 7 989 1013 10.1016/j.comnet.2008.12.005
-
(2009)
Computer Networks
, vol.53
, Issue.7
, pp. 989-1013
-
-
Islam, S.1
Atwood, J.W.2
-
14
-
-
77955303346
-
Sender access and data distribution control for inter-domain multicast groups
-
Islam, S., & Atwood, J. W. (2008). Sender access and data distribution control for inter-domain multicast groups. Computer Networks (submitted).
-
(2008)
Computer Networks
-
-
Islam, S.1
Atwood, J.W.2
-
17
-
-
70349768468
-
-
draft-ietf-mboned-maccnt-req (work in progress).
-
Hayashi, T., He, H., Satou, H., Ohta, H., & Vaidya, S. (2009). Requirements for multicast AAA coordinated between content provider(s) and network service provider(s). draft-ietf-mboned-maccnt-req (work in progress).
-
(2009)
Requirements for Multicast AAA Coordinated between Content Provider(s) and Network Service Provider(s)
-
-
Hayashi, T.1
He, H.2
Satou, H.3
Ohta, H.4
Vaidya, S.5
-
18
-
-
77955305614
-
AAA and admission control framework for multicasting
-
work in progress
-
Satou, H., Ohta, H., Jacquenet, C., Hayashi, T., & He, H. (2009). AAA and admission control framework for multicasting. draft-ietf-mboned-multiaaa- framework (work in progress).
-
(2009)
Draft-ietf-mboned-multiaaa-framework
-
-
Satou, H.1
Ohta, H.2
Jacquenet, C.3
Hayashi, T.4
He, H.5
-
19
-
-
77955303194
-
-
Assigned to Sprint Communications Company L.P., Overland Park, Kans. Appl. No. 10/441,748.
-
Pankajakshan., B., & Parker., B. J. (2007). U.S. 7,191,332 B1: Digital rights management for multicasting content distribution. Assigned to Sprint Communications Company L.P., Overland Park, Kans. Appl. No. 10/441,748.
-
(2007)
U.S. 7,191,332 B1: Digital Rights Management for Multicasting Content Distribution
-
-
Pankajakshan, B.1
Parker, B.J.2
-
20
-
-
70349768468
-
-
Internet draft draft-ietf-mboned-maccnt-req-06. Accessed11Oct2008
-
Hayashi, T., He, H., Satou, H., Ohta, H., & Vaidya, S. (2008). Requirements for multicast AAA coordinated between content provider(s) and network service provider(s). Internet draft draft-ietf-mboned-maccnt-req-06. http://tools.ietf.org/html/draft-ietf-mboned-maccnt-req-06. Accessed 11 Oct 2008.
-
(2008)
Requirements for Multicast AAA Coordinated between Content Provider(s) and Network Service Provider(s)
-
-
Hayashi, T.1
He, H.2
Satou, H.3
Ohta, H.4
Vaidya, S.5
-
21
-
-
77955307783
-
Conceptual model and security requirements for DRM techniques used for e-learning objects protection
-
(2007). Accessed11Oct2008
-
Nickolova, M., & Nickolov, E. (2007). Conceptual model and security requirements for DRM techniques used for e-learning objects protection. Information Technologies and Knowledge, 1(2007), 93-99. http://www.foibg.com/ ijitk/ijitk-vol01/ijitk01-1-p18.pdf. Accessed 12 Nov. 2009.
-
(2007)
Information Technologies and Knowledge
, vol.1
, pp. 93-99
-
-
Nickolova, M.1
Nickolov, E.2
-
22
-
-
77955303866
-
Core security requirements of DRM systems
-
ICFAI, India. Accessed11Oct2008
-
Jonker, H. L., & Mauw, S. (2007). Core security requirements of DRM systems. In Digital rights management, ICFAI book series, ICFAI, India. http://satoss.uni.lu/members/hugo/publications.php. Accessed 11 Oct 2008.
-
(2007)
Digital Rights Management, ICFAI Book Series
-
-
Jonker, H.L.1
Mauw, S.2
-
23
-
-
77955309448
-
Requirement analysis of enterprise DRM systems
-
Hotel Balalaika, Sandton, Johannesburg.Access ed11Oct2008
-
Arnab, A., & Hutchion, A. (2005). Requirement analysis of enterprise DRM systems. In Proceedings information security South Africa, Hotel Balalaika, Sandton, Johannesburg. http://pubs.cs.uct.ac.za/archive/00000205/01/arnab- hutchison-issa-final.pdf. Accessed 11 Oct 2008.
-
(2005)
Proceedings Information Security South Africa
-
-
Arnab, A.1
Hutchion, A.2
-
24
-
-
77955305459
-
-
OMA Candidate version 2.1. 10 Oct 2006
-
OMA (2006). OMA DRM requirements. Candidate version 2.1. 10 Oct 2006.
-
(2006)
OMA DRM Requirements
-
-
-
25
-
-
0005097206
-
Digital rights management (DRM) architectures
-
Iannella, R. (2001). Digital rights management (DRM) architectures. D-Lib Magazine, 7(6). http://www.dlib.org/dlib/june01/iannella/06iannella.html. Accessed 12 Oct 2008.
-
(2001)
D-Lib Magazine
, vol.7
, Issue.6
-
-
Iannella, R.1
-
26
-
-
0041584764
-
-
Sonera Plaza Ltd. White paper.Accessed13Oct2008
-
Sonera Plaza Ltd. (2002). Digital rights management. White paper. http://www.medialab.sonera.fi/workspace/DRMWhitePaper.pdf. Accessed 13 Oct 2008.
-
(2002)
Digital Rights Management
-
-
-
28
-
-
69249168719
-
Persistent access control: A formal model for drm
-
Alexandria, Virginia, USA.Accessed12Oct2008
-
Arnab, A., & Hutchison, A. (2007). Persistent access control: a formal model for drm. In Proceedings of the 2007 ACM workshop on digital rights management (Alexandria, Virginia, USA). http://pubs.cs.uct.ac.za/archive/ 00000411/03/acmdrm07-arnab.pdf. Accessed 12 Oct 2008.
-
(2007)
Proceedings of the 2007 ACM Workshop on Digital Rights Management
-
-
Arnab, A.1
Hutchison, A.2
-
29
-
-
20744446893
-
Advances in digital video content protection
-
Lin, E. I., Eskicioglu, A. M., Lagendijk, R. L., & Delp, E. J. (2005). Advances in digital video content protection. In Proceedings IEEE, special issue on multimedia security for digital rights management.
-
(2005)
Proceedings IEEE, Special Issue on Multimedia Security for Digital Rights Management
-
-
Lin, E.I.1
Eskicioglu, A.M.2
Lagendijk, R.L.3
Delp, E.J.4
-
30
-
-
35248854501
-
Integration of non-repudiation services in mobile DRM scenarios
-
DOI 10.1007/s11235-007-9050-4, Special Issue: Security, Privacy and Trust in Beyond-3G Networks
-
J. A. Onieva J. Lopez R. Roman J. Zhou S. Gritzalis 2007 Integration of non-repudiation services in mobile DRM scenarios Telecommunication Systems 35 3-4 161 176 10.1007/s11235-007-9050-4 (Pubitemid 47568042)
-
(2007)
Telecommunication Systems
, vol.35
, Issue.3-4
, pp. 161-176
-
-
Onieva, J.A.1
Lopez, J.2
Roman, R.3
Zhou, J.4
Gritzalis, S.5
-
32
-
-
67549092443
-
Security requirement for digital rights management
-
(San Antonio): 353b
-
Kamat, M. (2002). Security requirement for digital rights management. In The proceedings of ISECON 2002 (Vol. 19) (San Antonio): 353b.
-
(2002)
The Proceedings of ISECON 2002
, vol.19
-
-
Kamat, M.1
-
33
-
-
77955304365
-
Challenges standardizing renewable broadcast security
-
Accessed 12 Oct 2008
-
Bar-El, H. Challenges standardizing renewable broadcast security. WhitePaper. http://www.hbarel.com/publications/Challenges-of-Standardizing- Renewable-Broadcast-Security.pdf. Accessed 12 Oct 2008.
-
WhitePaper.
-
-
Bar-El, H.1
-
35
-
-
19644398268
-
Windows media technologies: Using windows media rights manager to protect and distribute digital media
-
December 2001. Microsoft Corporation
-
Pruneda, A. (2001). Windows media technologies: using windows media rights manager to protect and distribute digital media. MSDN Magazine. December 2001. Microsoft Corporation. http://msdn.Microsoft.com/msdnmag/issues/01/12/DRM/ default.aspx.
-
(2001)
MSDN Magazine
-
-
Pruneda, A.1
-
36
-
-
84871538812
-
-
Open Mobile Alliance. http://www.openmobilealliance.org/. Acceseed 12 Nov. 2009.
-
Open Mobile Alliance
-
-
-
38
-
-
0041848575
-
Preventing privacy, reverse engineering, and tampering
-
10.1109/MC.2003.1212692
-
G. Naumovich N. Memo 2003 Preventing privacy, reverse engineering, and tampering Computer 36 64 71 10.1109/MC.2003.1212692
-
(2003)
Computer
, vol.36
, pp. 64-71
-
-
Naumovich, G.1
Memo, N.2
-
40
-
-
0000675337
-
Superdistribution: The concept and the architecture
-
Mori, R., & Kawahara, M. (1990) Superdistribution: the concept and the architecture. Transaction of the IEICE, E73(7).
-
(1990)
Transaction of the IEICE
, vol.E73
, Issue.7
-
-
Mori, R.1
Kawahara, M.2
-
42
-
-
77955307461
-
-
OMA. Candidate version 2.1-05 Aug 2008.
-
OMA (2008). DRM architecture OMA. Candidate version 2.1-05 Aug 2008. http://www.openmobilealliance.org/Technical/release-program/drm-archive.aspx. Accessed 12 Oct 2008.
-
(2008)
DRM Architecture OMA
-
-
-
43
-
-
77955307217
-
-
Approved version 2.0.1.
-
Oma, V. (2008). DRM content format. Approved version 2.0.1.
-
(2008)
DRM Content Format
-
-
Oma, V.1
-
48
-
-
69249168708
-
-
Ph.D., Department of Computer Science, University of Cape Town, 2007.Accessed31Ma
-
Arnab, A. (2007). Towards a general framework for digital rights management (DRM). Ph.D., Department of Computer Science, University of Cape Town, 2007. http://pubs.cs.uct.ac.za/archive/00000448/01/alapan.arnab.thesis. final.pdf. Accessed 31 March 2008.
-
(2007)
Towards A General Framework for Digital Rights Management (DRM)
-
-
Arnab, A.1
-
49
-
-
55349113026
-
-
Accessed31March2008
-
Windows Media Digital Rights Management. http://msdn2.Microsoft.com/en- us/windowsmedia/bb190317.aspx. Accessed 31 March 2008.
-
Windows Media Digital Rights Management
-
-
-
51
-
-
77955303783
-
-
Microsoft.
-
Microsoft. Windows media rights manager providers. http://www.Microsoft. com/windows/windowsmedia/forpros/drm/supgrade.aspx. Accessed 31 March 2008.
-
Windows Media Rights Manager Providers
-
-
-
53
-
-
77955307130
-
Survey on the technological aspects of digital rights management
-
Ku, B., & Chi, C. (2004). Survey on the technological aspects of digital rights management. In ISC 2004.
-
(2004)
ISC 2004
-
-
Ku, B.1
Chi, C.2
-
56
-
-
33746986988
-
Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments
-
DOI 10.1109/TCE.2006.1649694
-
S. Park J. Jeong T. Kwon 2006 Contents distribution system based on MPEG-4 ISMACryp in IP Set-top box environments IEEE Transactions on Consumer Electronics 52 2 660 668 10.1109/TCE.2006.1649694 (Pubitemid 44203145)
-
(2006)
IEEE Transactions on Consumer Electronics
, vol.52
, Issue.2
, pp. 660-668
-
-
Park, S.-H.1
Jeong, J.2
Kwon, T.3
-
57
-
-
77954111561
-
Using advanced encryption standard (AES) counter mode with ipsec encapsulating security payload (ESP)
-
Housley, R., & Security, V. (2004). Using advanced encryption standard (AES) counter mode with ipsec encapsulating security payload (ESP). IETF RFC 3686.
-
(2004)
IETF RFC
, vol.3686
-
-
Housley, R.1
Security, V.2
-
59
-
-
18444370876
-
A survey of Anti-Tamper technologies. CrossTalk
-
http://www.arxan.com/ATknowledgePortal/pdfs/Crosstalk-Article-A-Surve-of- AntiTamper-Technologies.pdf. Accessed 13 March 2008
-
E. D. Bryant M. J. Atallah M. R. Stytz 2004 A survey of Anti-Tamper technologies. CrossTalk The Journal of Defense Software Engineering 17 11 12 16 http://www.arxan.com/ATknowledgePortal/pdfs/Crosstalk-Article-A-Surve-of- AntiTamper-Technologies.pdf. Accessed 13 March 2008
-
(2004)
The Journal of Defense Software Engineering
, vol.17
, Issue.11
, pp. 12-16
-
-
Bryant, E.D.1
Atallah, M.J.2
Stytz, M.R.3
|