-
1
-
-
79957583392
-
Access Controls in the Digital Era and the Fair Use/First Sale Doctrines
-
Hinkes EM, "Access Controls in the Digital Era and the Fair Use/First Sale Doctrines", Santa Clara Computer and High-Technology Law Journal, vol. 23, no.4, pp.685-726, 2007.
-
(2007)
Santa Clara Computer and High-Technology Law Journal
, vol.23
, Issue.4
, pp. 685-726
-
-
Hinkes, E.M.1
-
2
-
-
33847140217
-
DRM, Law and Technology: An American Perspective
-
Rosenblatt B, "DRM, Law and Technology: an American Perspective", Online Information Review, vol. 31, no.1, pp.73-84, 2007.
-
(2007)
Online Information Review
, vol.31
, Issue.1
, pp. 73-84
-
-
Rosenblatt, B.1
-
5
-
-
50449100622
-
Commercial Piracy and Intellectual Property Policy
-
Kiema I, "Commercial Piracy and Intellectual Property Policy", Journal of Economic Behavior & Organization, vol. 68, no.1, pp.304-318, 2008.
-
(2008)
Journal of Economic Behavior & Organization
, vol.68
, Issue.1
, pp. 304-318
-
-
Kiema, I.1
-
6
-
-
70449526423
-
An Artist Life Cycle Model for Digital Media Content: Strategies for the Light Web and the Dark Web
-
Regner T, Barria JA, Pitt JV, et al, "An Artist Life Cycle Model for Digital Media Content: Strategies for the Light Web and the Dark Web", Electronic Commerce Research and Applications, vol. 8, no. 6, pp.334-342, 2009.
-
(2009)
Electronic Commerce Research and Applications
, vol.8
, Issue.6
, pp. 334-342
-
-
Regner, T.1
Barria, J.A.2
Pitt, J.V.3
-
7
-
-
44649121444
-
Digital Rights Management and Individualized Pricing
-
Lesk M, Stytz MR, Trope RL, "Digital Rights Management and Individualized Pricing", IEEE Security & Privacy, vol. 6, no.3, pp.76-79, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.3
, pp. 76-79
-
-
Lesk, M.1
Stytz, M.R.2
Trope, R.L.3
-
8
-
-
72049102600
-
Pricing schemes for digital content with DRM mechanisms
-
Li YM, Lin CH, "Pricing schemes for digital content with DRM mechanisms", Decision Support Systems, vol.47, no.4, pp.528-539, 2009.
-
(2009)
Decision Support Systems
, vol.47
, Issue.4
, pp. 528-539
-
-
Li, Y.M.1
Lin, C.H.2
-
9
-
-
85008030270
-
Integrated Digital Rights Management for Mobile IPTV Using Broadcasting and Communications
-
Nishimoto Y, Imaizumi H, Mita N, "Integrated Digital Rights Management for Mobile IPTV Using Broadcasting and Communications", IEEE Transactions on Broadcasting, vol. 55, no. 2, pp.419-424, 2009.
-
(2009)
IEEE Transactions on Broadcasting
, vol.55
, Issue.2
, pp. 419-424
-
-
Nishimoto, Y.1
Imaizumi, H.2
Mita, N.3
-
10
-
-
67649764018
-
A Personal Mobile DRM Manager for Smartphones
-
Bhatt S, Sion R, Carbunar B, "A Personal Mobile DRM Manager for Smartphones", Computers & Security, vol. 28, no. 6, pp.327-340, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 327-340
-
-
Bhatt, S.1
Sion, R.2
Carbunar, B.3
-
11
-
-
58849155076
-
Problem Analyses and Recommendations in DRM Security Policies
-
In
-
Kim Y, Howard J, Ravindranath S, et al, "Problem Analyses and Recommendations in DRM Security Policies", In Proceedings of the First European Conference on Intelligence and Security, pp.165-178, 2008.
-
(2008)
Proceedings of the First European Conference on Intelligence and Security
, pp. 165-178
-
-
Kim, Y.1
Howard, J.2
Ravindranath, S.3
-
12
-
-
78650041109
-
Digital rights management for multimedia content over 3G mobile networks
-
Wu CC, Lin CC, Chang CC, "Digital rights management for multimedia content over 3G mobile networks", Expert Systems with Applications, vol. 37, no. 10, pp.6787-6797, 2010.
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.10
, pp. 6787-6797
-
-
Wu, C.C.1
Lin, C.C.2
Chang, C.C.3
-
13
-
-
67349104991
-
DFT-Based SoC/VLSI IP Protection and Digital Rights Management Platform
-
Fan YC, Shen JH, "DFT-Based SoC/VLSI IP Protection and Digital Rights Management Platform", IEEE Transactions on Instrumentation and Measurement, vol. 58, no. 6, pp.2026-2033, 2009.
-
(2009)
IEEE Transactions on Instrumentation and Measurement
, vol.58
, Issue.6
, pp. 2026-2033
-
-
Fan, Y.C.1
Shen, J.H.2
-
14
-
-
67849135864
-
Optimal Subset-Difference Broadcast Encryption with Free Riders
-
Ak M, Kaya K, Selcuk AA, "Optimal Subset-Difference Broadcast Encryption with Free Riders", Information Sciences, vol. 179, no. 20, pp.3673-3684, 2009.
-
(2009)
Information Sciences
, vol.179
, Issue.20
, pp. 3673-3684
-
-
Ak, M.1
Kaya, K.2
Selcuk, A.A.3
-
15
-
-
77950327723
-
Integrating Fingerprint with Cryptosystem for Internet-based Live Pay-TV System
-
Hou SH, Uehara T, Satoh T, et al, "Integrating Fingerprint with Cryptosystem for Internet-based Live Pay-TV System", Security and Communication Networks, vol. 1, no. 6, pp.461-472, 2008.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.6
, pp. 461-472
-
-
Hou, S.H.1
Uehara, T.2
Satoh, T.3
-
16
-
-
69749117797
-
Secure Video Distribution Scheme Based on Partial Encryption
-
Lian S, "Secure Video Distribution Scheme Based on Partial Encryption", International Journal of Imaging Systems and Technology, vol. 19, no. 3, pp.227-235, 2009.
-
(2009)
International Journal of Imaging Systems and Technology
, vol.19
, Issue.3
, pp. 227-235
-
-
Lian, S.1
-
18
-
-
63749130532
-
Chinese MPEG-21 rights expression language: Enhancing digital rights management adoption to digital libraries in Hong Kong
-
In
-
Liu Eliot ZH, Fung Richard YK, Chung David WK, "Chinese MPEG-21 rights expression language: Enhancing digital rights management adoption to digital libraries in Hong Kong", In Proceedings of the Fifth International Workshop on Digital Rights Management Impact on Consumer Communications, pp.11-15, 2009.
-
(2009)
Proceedings of the Fifth International Workshop on Digital Rights Management Impact on Consumer Communications
, pp. 11-15
-
-
Liu Eliot, Z.H.1
Fung Richard, Y.K.2
Chung David, W.K.3
-
19
-
-
49249092646
-
Usage Control Enforcement: Present and Future
-
Pretschner A, Hilty M, Schütz F, et al, "Usage Control Enforcement: Present and Future", IEEE Security & Privacy, vol. 6, no. 4, pp.44-53, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.4
, pp. 44-53
-
-
Pretschner, A.1
Hilty, M.2
Schütz, F.3
-
20
-
-
39149126702
-
Implementing Trusted Terminals with a TPM and SITDRM
-
Stamm S, Sheppard NP, Reihaneh SN, "Implementing Trusted Terminals with a TPM and SITDRM", Electronic Notes in Theoretical Computer Science, vol. 197, no. 1, pp.73-85, 2008.
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.1
, pp. 73-85
-
-
Stamm, S.1
Sheppard, N.P.2
Reihaneh, S.N.3
-
21
-
-
70849108812
-
A novel approach to DRM systems
-
In
-
Frattolillo F, Landolfi F, Marulli F, "A novel approach to DRM systems", In Proceedings of 12th IEEE International Conference on Computational Science and Engineering, pp.492-497, 2009.
-
(2009)
Proceedings of 12th IEEE International Conference on Computational Science and Engineering
, pp. 492-497
-
-
Frattolillo, F.1
Landolfi, F.2
Marulli, F.3
-
22
-
-
70349233094
-
Flexible and Secure Enterprise Rights Management based on Trusted Virtual Domains
-
In
-
Gasmi Y, Sadeghi AR, Stewin P, et al, "Flexible and Secure Enterprise Rights Management based on Trusted Virtual Domains", In Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, pp.71-80, 2008.
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
, pp. 71-80
-
-
Gasmi, Y.1
Sadeghi, A.R.2
Stewin, P.3
-
23
-
-
70450235529
-
Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture
-
Thomas T, Emmanuel S, Subramanyam AV, et al, "Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture", IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp.758-767, 2009.
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.4
, pp. 758-767
-
-
Thomas, T.1
Emmanuel, S.2
Subramanyam, A.V.3
-
24
-
-
67649227070
-
Robust image watermarking using local Zernike moments
-
Singhal N, Lee YY, Kim CS, et al, "Robust image watermarking using local Zernike moments", Journal of Visual Communication and Image Representation, vol. 20, no. 6, pp.408-419, 2009.
-
(2009)
Journal of Visual Communication and Image Representation
, vol.20
, Issue.6
, pp. 408-419
-
-
Singhal, N.1
Lee, Y.Y.2
Kim, C.S.3
-
25
-
-
48149104075
-
Tampering with a Watermarking-based Image Authentication Scheme
-
Phan RC, "Tampering with a Watermarking-based Image Authentication Scheme", Pattern Recognition, vol. 41, no. 11, pp.3493-3496, 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.11
, pp. 3493-3496
-
-
Phan, R.C.1
-
26
-
-
76949084765
-
Metadata-based Image Watermarking for Copyright Protection
-
Huang HC, Fang WC, "Metadata-based Image Watermarking for Copyright Protection", Simulation Modelling Practice and Theory, vol. 18, no. 4, pp.436-445, 2010.
-
(2010)
Simulation Modelling Practice and Theory
, vol.18
, Issue.4
, pp. 436-445
-
-
Huang, H.C.1
Fang, W.C.2
-
27
-
-
59649117583
-
Hardware assisted watermarking for multimedia
-
Kougianos E, Mohanty SP, Mahapatra RN, "Hardware assisted watermarking for multimedia", Computers and Electrical Engineering, vol. 35, no. 2, pp.339-358, 2009.
-
(2009)
Computers and Electrical Engineering
, vol.35
, Issue.2
, pp. 339-358
-
-
Kougianos, E.1
Mohanty, S.P.2
Mahapatra, R.N.3
-
28
-
-
62249110103
-
An Improved Watermarking Technique for Multi-user, Multi-right Environments
-
Poon HT, Miriand A, Zhao JY, "An Improved Watermarking Technique for Multi-user, Multi-right Environments", Multimedia Tools and Applications, vol. 42, no. 2, pp.161-181, 2009.
-
(2009)
Multimedia Tools and Applications
, vol.42
, Issue.2
, pp. 161-181
-
-
Poon, H.T.1
Miriand, A.2
Zhao, J.Y.3
-
29
-
-
77955429108
-
Secure and traceable multimedia distribution for convergent Mobile TV services
-
Lian SG, Chen X, "Secure and traceable multimedia distribution for convergent Mobile TV services", Computer Communications, vol. 33, no. 14, pp.1664-1673, 2010.
-
(2010)
Computer Communications
, vol.33
, Issue.14
, pp. 1664-1673
-
-
Lian, S.G.1
Chen, X.2
-
30
-
-
77952597610
-
Network-Based Traitor-Tracing Technique Using Traffic Pattern
-
Nakayama H, Jamalipour A, Kato N, "Network-Based Traitor-Tracing Technique Using Traffic Pattern", IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp.300-313, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 300-313
-
-
Nakayama, H.1
Jamalipour, A.2
Kato, N.3
-
31
-
-
79957596964
-
Adaptive Traitor Tracing for Large Anonymous Attack
-
In
-
Jin HX, Lotspiech J, Nelson M, et al, "Adaptive Traitor Tracing for Large Anonymous Attack", In Proceedings of the 8th ACM Workshop on Digital Rights Management, pp 29-38, 2008.
-
(2008)
Proceedings of the 8th ACM Workshop on Digital Rights Management
, pp. 29-38
-
-
Jin, H.X.1
Lotspiech, J.2
Nelson, M.3
-
32
-
-
77952228850
-
A Prototype Design for DRM based Credit Card Transaction in E-Commerce
-
Banerjee S, Karforma S, "A Prototype Design for DRM based Credit Card Transaction in E-Commerce", ACM Ubiquity, vol. 9, no. 18, pp.1-9, 2008.
-
(2008)
ACM Ubiquity
, vol.9
, Issue.18
, pp. 1-9
-
-
Banerjee, S.1
Karforma, S.2
-
33
-
-
68949164734
-
Design and Development Challenges for an E2E DRM Content Business Integration Platform
-
Hidalgo A, Albors J, Lopez V, "Design and Development Challenges for an E2E DRM Content Business Integration Platform", International Journal of Information Management, vol. 29, no. 5, pp.389-396, 2009.
-
(2009)
International Journal of Information Management
, vol.29
, Issue.5
, pp. 389-396
-
-
Hidalgo, A.1
Albors, J.2
Lopez, V.3
-
34
-
-
73749086708
-
An empirical study of customers' perceptions of security and trust in epayment systems
-
Kim C, Tao W, Shin N, et al, "An empirical study of customers' perceptions of security and trust in epayment systems", Electronic Commerce Research and Applications, no. 9, pp.84-95, 2010.
-
(2010)
Electronic Commerce Research and Applications
, Issue.9
, pp. 84-95
-
-
Kim, C.1
Tao, W.2
Shin, N.3
-
35
-
-
70349384936
-
Consumer perception of interface quality, security, and loyalty in electronic commerce
-
Chang HH, Chen SW, "Consumer perception of interface quality, security, and loyalty in electronic commerce", Information & Management, no. 46, pp.411-417, 2009.
-
(2009)
Information & Management
, Issue.46
, pp. 411-417
-
-
Chang, H.H.1
Chen, S.W.2
-
36
-
-
74549134670
-
A best practice model for e-consumer protection
-
Svantesson D, Clarke R, "A best practice model for e-consumer protection", Computer Law & Security Review, vol. 2, no. 6, pp.31-37, 2010.
-
(2010)
Computer Law & Security Review
, vol.2
, Issue.6
, pp. 31-37
-
-
Svantesson, D.1
Clarke, R.2
-
37
-
-
71349085807
-
The combined model of influencing on-line consumer behavior
-
Lin WB, Wang MK, Hwang KP, "The combined model of influencing on-line consumer behavior", Expert Systems with Applications, no. 37, pp.3236-3247, 2010.
-
(2010)
Expert Systems with Applications
, Issue.37
, pp. 3236-3247
-
-
Lin, W.B.1
Wang, M.K.2
Hwang, K.P.3
-
38
-
-
77955273255
-
Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns
-
McCole P, Ramsey E, Williams J (2010) Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns. Journal of Business Research 63(9): 1018-1024
-
(2010)
Journal of Business Research
, vol.63
, Issue.9
, pp. 1018-1024
-
-
McCole, P.1
Ramsey, E.2
Williams, J.3
-
39
-
-
31044454785
-
A security framework for Content-Based Publish-Subscribe system
-
Padmavathi G, Annadurai S, "A security framework for Content-Based Publish-Subscribe system", Electronic Commerce Research and Applications, no. 5, pp.78-90, 2006.
-
(2006)
Electronic Commerce Research and Applications
, Issue.5
, pp. 78-90
-
-
Padmavathi, G.1
Annadurai, S.2
-
40
-
-
70449632795
-
Open process and open-source enterprise systems
-
Leea SM, Olsona DL, Leea SH, "Open process and open-source enterprise systems", Enterprise Information Systems, vol. 3, no. 2, pp.201-209, 2010.
-
(2010)
Enterprise Information Systems
, vol.3
, Issue.2
, pp. 201-209
-
-
Leea, S.M.1
Olsona, D.L.2
Leea, S.H.3
-
41
-
-
44949104171
-
A Secure and Traceable E-DRM System based on Mobile Device
-
Chen CL, "A Secure and Traceable E-DRM System based on Mobile Device", Expert Systems with Applications, vol. 35, no. 3, pp.878-886, 2008.
-
(2008)
Expert Systems with Applications
, vol.35
, Issue.3
, pp. 878-886
-
-
Chen, C.L.1
-
42
-
-
77953241199
-
Is DRM fit for purpose?
-
Everett C, "Is DRM fit for purpose?", Computer Fraud & Security, no. 4, pp.5-7, 2010.
-
(2010)
Computer Fraud & Security
, Issue.4
, pp. 5-7
-
-
Everett, C.1
-
43
-
-
63749132915
-
Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM
-
In
-
Zhang ZY, Pei QQ, Ma JF, et al, "Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM", In Proceedings of the Fifth International Workshop on Digital Rights Management Impact on Consumer Communications, pp.6-10, 2009.
-
(2009)
Proceedings of the Fifth International Workshop on Digital Rights Management Impact on Consumer Communications
, pp. 6-10
-
-
Zhang, Z.Y.1
Pei, Q.Q.2
Ma, J.F.3
-
44
-
-
69249198262
-
Establishing multi-party trust architecture for DRM by using gametheoretic analysis of security policies
-
Zhang ZY, Pei QQ, Yang L, et al, "Establishing multi-party trust architecture for DRM by using gametheoretic analysis of security policies", Chinese Journal of Electronics, vol. 18, no. 3, pp.519-524, 2009.
-
(2009)
Chinese Journal of Electronics
, vol.18
, Issue.3
, pp. 519-524
-
-
Zhang, Z.Y.1
Pei, Q.Q.2
Yang, L.3
-
45
-
-
77955198823
-
Fuzzy Risk Assessments on Security Policies for Digital Rights Management
-
Zhang ZY, Lian SG, Pei QQ, "Fuzzy Risk Assessments on Security Policies for Digital Rights Management", Neural Network World, vol. 20, no. 3, pp.265-284, 2010.
-
(2010)
Neural Network World
, vol.20
, Issue.3
, pp. 265-284
-
-
Zhang, Z.Y.1
Lian, S.G.2
Pei, Q.Q.3
-
46
-
-
77956977210
-
Security and Trust of Digital Rights Management: A Survey
-
Zhang ZY, Pei QQ, Yang L, et al, "Security and Trust of Digital Rights Management: A Survey", International Journal of Network Security, vol. 9, no. 3, pp.247-263, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.3
, pp. 247-263
-
-
Zhang, Z.Y.1
Pei, Q.Q.2
Yang, L.3
-
47
-
-
79957619861
-
Digital Rights Expression Languages (DRELs)
-
Barlas C, Digital Rights Expression Languages (DRELs). JISC Technology and Standards Watch, vol.6, no.3, pp.1-42, 2006.
-
(2006)
JISC Technology and Standards Watch
, vol.6
, Issue.3
, pp. 1-42
-
-
Barlas, C.1
-
49
-
-
79957611620
-
-
Version 2.0 Draft, ODRL Initiative, available at
-
Open Digital Rights Language (ODRL) Version 2.0 Draft, ODRL Initiative, 2010. (available at http://odrl.net/2.0/WD-ODRL-Vocab-20100527.html)
-
(2010)
Open Digital Rights Language (ODRL)
-
-
-
51
-
-
40549112646
-
A formal foundation for XrML
-
Halpern J, Weissman V, "A formal foundation for XrML", Journal of the ACM, vol. 55, no. 1, pp.4-45, 2004.
-
(2004)
Journal of the ACM
, vol.55
, Issue.1
, pp. 4-45
-
-
Halpern, J.1
Weissman, V.2
-
54
-
-
72849130774
-
Algebraic Specification for OMA REL licenses
-
In
-
Triantafyllou N, Ouranos I, Stefaneas P, "Algebraic Specification for OMA REL licenses", In Proceedings of 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.376-381, 2009.
-
(2009)
Proceedings of 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
, pp. 376-381
-
-
Triantafyllou, N.1
Ouranos, I.2
Stefaneas, P.3
-
56
-
-
78349284190
-
Privacy Preserving Multiparty Multilevel DRM Architecture
-
In
-
Sachana A, Emmanuela S, Dasa A, et al, "Privacy Preserving Multiparty Multilevel DRM Architecture", In Proceedings of the Fifth International Workshop on Digital Rights Management Impact on Consumer Communications, pp.1-5, 2009.
-
(2009)
Proceedings of the Fifth International Workshop on Digital Rights Management Impact on Consumer Communications
, pp. 1-5
-
-
Sachana, A.1
Emmanuela, S.2
Dasa, A.3
-
57
-
-
74049149849
-
Efficient License Validation in MPML DRM Architecture
-
In
-
Sachana A, Emmanuela S, Kankanhalli MS, "Efficient License Validation in MPML DRM Architecture", In Proceedings of the 9th ACM Workshop on Digital Rights Management, pp 73-82, 2009.
-
(2009)
Proceedings of the 9th ACM Workshop on Digital Rights Management
, pp. 73-82
-
-
Sachana, A.1
Emmanuela, S.2
Kankanhalli, M.S.3
-
59
-
-
49449088504
-
Using First-Order Logic to Reason about Policies
-
Halpern JY, Welssman V, "Using First-Order Logic to Reason about Policies", ACM Transactions on Information and Systems Security, vol. 11, no. 4, pp.1-41, 2008.
-
(2008)
ACM Transactions on Information and Systems Security
, vol.11
, Issue.4
, pp. 1-41
-
-
Halpern, J.Y.1
Welssman, V.2
-
61
-
-
59749106002
-
Digital Rights Management Architectures
-
Jamkhedkar P, Heileman G, "Digital Rights Management Architectures", Computers and Electrical Engineering, vol. 35, no. 2, pp.376-394, 2009.
-
(2009)
Computers and Electrical Engineering
, vol.35
, Issue.2
, pp. 376-394
-
-
Jamkhedkar, P.1
Heileman, G.2
-
63
-
-
77149173810
-
Content Value Chains Modeling using a Copyright Ontology
-
García R, Gil R, "Content Value Chains Modeling using a Copyright Ontology", Information Systems, vol. 35, no. 4, pp.483-495, 2010.
-
(2010)
Information Systems
, vol.35
, Issue.4
, pp. 483-495
-
-
García, R.1
Gil, R.2
-
64
-
-
72749126103
-
Copyright Licenses Reasoning an OWL-DL Ontology
-
García R, Gil R, "Copyright Licenses Reasoning an OWL-DL Ontology", Law, Ontologies and the Semantic Web, no. 188, pp.145-162, 2009.
-
(2009)
Law, Ontologies and the Semantic Web
, Issue.188
, pp. 145-162
-
-
García, R.1
Gil, R.2
-
65
-
-
70349900789
-
Improvement of MPEG-21 Right Expression Language
-
In
-
Rafi M, Eleuldj M, Guennoun Z, "Improvement of MPEG-21 Right Expression Language", In Proceedings of 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp.997-1004, 2009.
-
(2009)
Proceedings of 2009 IEEE/ACS International Conference on Computer Systems and Applications
, pp. 997-1004
-
-
Rafi, M.1
Eleuldj, M.2
Guennoun, Z.3
-
66
-
-
79957618497
-
Role-Based Access Control of Digital Right Management
-
In
-
Tsai DR, Chen WY, Liang CH, et al, "Role-Based Access Control of Digital Right Management" In Proceedings of 2009 Fifth International Joint Conference on INC, IMS and IDC, pp.1131-1134, 2009.
-
(2009)
Proceedings of 2009 Fifth International Joint Conference on INC, IMS and IDC
, pp. 1131-1134
-
-
Tsai, D.R.1
Chen, W.Y.2
Liang, C.H.3
-
68
-
-
77954332065
-
The Problem with Rights Expression Languages
-
In
-
Jamkhedkar P, Heileman G, Ortiz I, "The Problem with Rights Expression Languages", In Proceedings of 2006 6th ACM Workshop on Digital Rights Management, pp.59-67, 2006.
-
(2006)
Proceedings of 2006 6th ACM Workshop on Digital Rights Management
, pp. 59-67
-
-
Jamkhedkar, P.1
Heileman, G.2
Ortiz, I.3
-
71
-
-
79952744289
-
Cardinality Constraint Access Control Model and Implementation
-
Zhang ZK, Geng YP, Xiao JG, et al, "Cardinality Constraint Access Control Model and Implementation", Advances in Information Sciences and Service Sciences, vol. 3, no. 1, pp.10-18, 2011.
-
(2011)
Advances in Information Sciences and Service Sciences
, vol.3
, Issue.1
, pp. 10-18
-
-
Zhang, Z.K.1
Geng, Y.P.2
Xiao, J.G.3
-
72
-
-
79952743730
-
An Improved IBE Authorization Protocol on Grid Computing System
-
Cai Z, Liu MF, Guo XG, et al, "An Improved IBE Authorization Protocol on Grid Computing System", International Journal of Advancements in Computing Technology, vol. 3, no. 1, pp. 53-57, 2011.
-
(2011)
International Journal of Advancements in Computing Technology
, vol.3
, Issue.1
, pp. 53-57
-
-
Cai, Z.1
Liu, M.F.2
Guo, X.G.3
-
73
-
-
79952746097
-
Processing Logical Access Control Command in Computer System
-
Lee TY, Lee HM, Chen WY, Chen HS, "Processing Logical Access Control Command in Computer System", International Journal of Digital Content Technology and its Applications, vol. 2, no. 2, pp.11-15, 2008.
-
(2008)
International Journal of Digital Content Technology and its Applications
, vol.2
, Issue.2
, pp. 11-15
-
-
Lee, T.Y.1
Lee, H.M.2
Chen, W.Y.3
Chen, H.S.4
-
75
-
-
3142523603
-
The UCONABC Usage Control Model
-
Park J, Sandhu R, "The UCONABC Usage Control Model", ACM Transactions on Information and System Security, no. 1, pp.128-174, 2004.
-
(2004)
ACM Transactions on Information and System Security
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
76
-
-
70349233074
-
Enforcing DRM Policies Across Applications
-
In
-
Nair SK, Tanenbaum AS, Gheorghe G, et al, "Enforcing DRM Policies Across Applications", In Proceedings of 2006 6th ACM Workshop on Digital Rights Management, pp.87-94, 2008.
-
(2008)
Proceedings of 2006 6th ACM Workshop on Digital Rights Management
, pp. 87-94
-
-
Nair, S.K.1
Tanenbaum, A.S.2
Gheorghe, G.3
-
77
-
-
40949093944
-
Location constraints in digital rights management
-
Muhlbauer A, Reihaneh SN, Salim F, et al, "Location constraints in digital rights management", Computer Communications, vol. 31, no. 6, pp.1173-1180, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.6
, pp. 1173-1180
-
-
Muhlbauer, A.1
Reihaneh, S.N.2
Salim, F.3
-
78
-
-
70449480377
-
Replay Attack of Dynamic Rights within an Authorised Domain
-
In
-
Abbadi IM, Alawneh M, "Replay Attack of Dynamic Rights within an Authorised Domain", In Proceedings of 3rd International Conference on Emerging Security Information, Systems and Technologies, pp.148-154, 2009.
-
(2009)
Proceedings of 3rd International Conference on Emerging Security Information, Systems and Technologies
, pp. 148-154
-
-
Abbadi, I.M.1
Alawneh, M.2
-
79
-
-
78650167730
-
An interoperable usage management framework
-
In
-
Jamkhedkar PA, Heileman GL, Lamb CC, "An interoperable usage management framework", In Proceedings of the 10th Annual ACM Workshop on Digital Rights Management, pp.73-87, 2010.
-
(2010)
Proceedings of the 10th Annual ACM Workshop on Digital Rights Management
, pp. 73-87
-
-
Jamkhedkar, P.A.1
Heileman, G.L.2
Lamb, C.C.3
-
80
-
-
78649530400
-
Design and implementation of a context and role-based access control model for digital content
-
In
-
Wu MY, Chen YW, Ke CK, "Design and implementation of a context and role-based access control model for digital content", In Proceedings of IET International Conference on Frontier Computing-Theory, Technologies and Applications, pp.253-257, 2010.
-
(2010)
Proceedings of IET International Conference on Frontier Computing-Theory, Technologies and Applications
, pp. 253-257
-
-
Wu, M.Y.1
Chen, Y.W.2
Ke, C.K.3
-
82
-
-
78649612604
-
Towards socially-responsible management of personal information in social networks
-
Morin, Jean-Henry, Towards socially-responsible management of personal information in social networks, Lecture Notes in Computer Science, vol.6045, pp.108-115, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6045
, pp. 108-115
-
-
Morin, J.-H.1
-
83
-
-
78650363277
-
A rights management approach to securing data distribution in coalitions
-
In
-
Salim F, Sheppard NP, Reihaneh SN, "A rights management approach to securing data distribution in coalitions", In Proceedings of 4th International Conference on Network and System Security, pp.560-567, 2010.
-
(2010)
Proceedings of 4th International Conference on Network and System Security
, pp. 560-567
-
-
Salim, F.1
Sheppard, N.P.2
Reihaneh, S.N.3
-
84
-
-
79957597222
-
-
Version 2.1, Open Mobile Alliance, available at
-
DRM Rights Expression Language Candidate Version 2.1, Open Mobile Alliance, 2007. (available at http://www.openmobilealliance.org/)
-
(2007)
DRM Rights Expression Language Candidate
-
-
-
85
-
-
47849106850
-
Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology
-
In
-
Zhang ZY, Yang L, Pei QQ, et al, "Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology", In Proceedings of IFIP International Conference on Network and Parallel Computing, pp.238-243, 2007.
-
(2007)
Proceedings of IFIP International Conference on Network and Parallel Computing
, pp. 238-243
-
-
Zhang, Z.Y.1
Yang, L.2
Pei, Q.Q.3
-
86
-
-
60349107939
-
A Fine-grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement
-
In
-
Zhang ZY, Pei QQ, Ma JF, et al, "A Fine-grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement", In Proceedings of International Conference on Computational Intelligence and Security, pp. 457-462, 2008.
-
(2008)
Proceedings of International Conference on Computational Intelligence and Security
, pp. 457-462
-
-
Zhang, Z.Y.1
Pei, Q.Q.2
Ma, J.F.3
-
88
-
-
79957610637
-
-
Version 2.1, Open Mobile Alliance, available at
-
DRM Architecture Candidate Version 2.1, Open Mobile Alliance, 2007. (available at http://www.openmobilealliance.org/)
-
(2007)
DRM Architecture Candidate
-
-
-
89
-
-
34547441019
-
Digital Rights Management with Right Delegation for Home Networks
-
In
-
Kim H, Lee Y, Chung B, et al, "Digital Rights Management with Right Delegation for Home Networks", In Proceedings of the 9th International Conference on Information Security and Cryptology, pp.233-245, 2006.
-
(2006)
Proceedings of the 9th International Conference on Information Security and Cryptology
, pp. 233-245
-
-
Kim, H.1
Lee, Y.2
Chung, B.3
-
90
-
-
70350228941
-
DRM Applied Contents Share in Digital Home
-
In
-
Lee J, Jeong Y, Yoon K, et al, "DRM Applied Contents Share in Digital Home", In Proceedings of 13th IEEE International Symposium on Consumer Electronics, pp.64-66, 2009.
-
(2009)
Proceedings of 13th IEEE International Symposium on Consumer Electronics
, pp. 64-66
-
-
Lee, J.1
Jeong, Y.2
Yoon, K.3
-
91
-
-
33646121977
-
Identity-Based DRM: Personal Entertainment Domain
-
In
-
Koster P, Kamperman F, Lenoir P, et al, "Identity-Based DRM: Personal Entertainment Domain", In Proceedings of 9th IFIP International Conference on Communications and Multimedia Security, pp.42-54, 2005.
-
(2005)
Proceedings of 9th IFIP International Conference on Communications and Multimedia Security
, pp. 42-54
-
-
Koster, P.1
Kamperman, F.2
Lenoir, P.3
-
92
-
-
18844410277
-
A DRM Security Architecture for Home Networks
-
In
-
Popescu BC, Crispo B, Kampermanf F, et al, "A DRM Security Architecture for Home Networks", In Proceedings of 4th ACM Workshop on Digital Rights Management, pp.1-10, 2004.
-
(2004)
Proceedings of 4th ACM Workshop on Digital Rights Management
, pp. 1-10
-
-
Popescu, B.C.1
Crispo, B.2
Kampermanf, F.3
-
93
-
-
36348944463
-
Introduction of the domain issuer in OMA DRM
-
In
-
Koster P, Montaner J, Koraichi N, et al, "Introduction of the domain issuer in OMA DRM", In Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference, pp.940-944, 2007.
-
(2007)
Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference
, pp. 940-944
-
-
Koster, P.1
Montaner, J.2
Koraichi, N.3
-
94
-
-
77955305045
-
Requirements for enforcing digital rights management in multicast content distribution
-
Barhoush M, Atwood JW, "Requirements for enforcing digital rights management in multicast content distribution", Telecommunication Systems, no. 45, pp.3-20, 2010.
-
(2010)
Telecommunication Systems
, Issue.45
, pp. 3-20
-
-
Barhoush, M.1
Atwood, J.W.2
-
95
-
-
36248995810
-
OPA: Onion Policy Administration Model-Another Approach to Manage Rights in DRM
-
In
-
Sans T, Cuppens F, Nora CB, "OPA: Onion Policy Administration Model-Another Approach to Manage Rights in DRM", In Proceedings of 2007 IFIP International Federation for Information Processing, pp.349-360, 2007.
-
(2007)
Proceedings of 2007 IFIP International Federation for Information Processing
, pp. 349-360
-
-
Sans, T.1
Cuppens, F.2
Nora, C.B.3
-
96
-
-
68449088773
-
Redistributing Time-based Rights between Consumer Devices for Content Sharing in DRM System
-
Lee S, Kim J, Hong SJ, "Redistributing Time-based Rights between Consumer Devices for Content Sharing in DRM System", International Journal of Information Security, vol. 8, no. 4, pp.263-273, 2009.
-
(2009)
International Journal of Information Security
, vol.8
, Issue.4
, pp. 263-273
-
-
Lee, S.1
Kim, J.2
Hong, S.J.3
-
97
-
-
63749106373
-
An Efficient Contents Sharing Method for DRM
-
In
-
Feng X, Tang Z, Yu YY, "An Efficient Contents Sharing Method for DRM", In Proceedings of 2009 Consumer Communications and Networking Conference, pp.1-5, 2009.
-
(2009)
Proceedings of 2009 Consumer Communications and Networking Conference
, pp. 1-5
-
-
Feng, X.1
Tang, Z.2
Yu, Y.Y.3
-
102
-
-
50549099338
-
-
Software Architecture Description, Protocol Specification Document, NTT DoCoMo, IBM, Intel Corporation, available at
-
Trusted Mobile Platform-Hardware Architecture Description, Software Architecture Description, Protocol Specification Document, NTT DoCoMo, IBM, Intel Corporation, 2007. (available at http://xml.coverpages.org/)
-
(2007)
Trusted Mobile Platform-Hardware Architecture Description
-
-
-
107
-
-
71049135827
-
DRM, Trusted Computing and Operating System Architecture
-
In
-
Reid JF, Caelli WJ, "DRM, Trusted Computing and Operating System Architecture", In Proceedings of 2005 Australasian Information Security Workshop, pp.127-136, 2005.
-
(2005)
Proceedings of 2005 Australasian Information Security Workshop
, pp. 127-136
-
-
Reid, J.F.1
Caelli, W.J.2
-
108
-
-
27244446779
-
Secure Data Management in Trusted Computing
-
In
-
Kuhn U, Kursawe K, Lucks S, "Secure Data Management in Trusted Computing", In Proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, pp. 324-338, 2005.
-
(2005)
Proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 324-338
-
-
Kuhn, U.1
Kursawe, K.2
Lucks, S.3
-
109
-
-
70749121777
-
TBDRM: A TPM-Based Secure DRM Architecture
-
In
-
Yu AM, Feng DG, Liu R, "TBDRM: A TPM-Based Secure DRM Architecture", In Proceedings of 2009 International Conference on Computational Science and Engineering, pp.671-677, 2009.
-
(2009)
Proceedings of 2009 International Conference on Computational Science and Engineering
, pp. 671-677
-
-
Yu, A.M.1
Feng, D.G.2
Liu, R.3
-
110
-
-
29244450159
-
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms
-
In
-
Sadeghi A, Stuble C, "Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms", In Proceedings of the 2004 New Security Paradigms Workshop, pp.67-77, 2004.
-
(2004)
Proceedings of the 2004 New Security Paradigms Workshop
, pp. 67-77
-
-
Sadeghi, A.1
Stuble, C.2
-
111
-
-
34547196300
-
A Protocol for Property-Based Attestation
-
In
-
Chen L, Landfermann R, Lohr H, "A Protocol for Property-Based Attestation", In Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp.7-16, 2006.
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Lohr, H.3
-
113
-
-
70349603094
-
Implementing Trustworthy Dissemination of Digital Contents by Using a Third Party Attestation Proxy-Enabling Remote Attestation Model
-
In
-
Zhang ZY, Pei QQ, Ma JF, et al, "Implementing Trustworthy Dissemination of Digital Contents by Using a Third Party Attestation Proxy-Enabling Remote Attestation Model", In Proceedings of 2008 International Conference on MultiMedia and Information Technology, pp.322-325, 2008.
-
(2008)
Proceedings of 2008 International Conference on MultiMedia and Information Technology
, pp. 322-325
-
-
Zhang, Z.Y.1
Pei, Q.Q.2
Ma, J.F.3
|