Filters








1,685 Hits in 3.7 sec

Enforcing DRM policies across applications

Srijith K. Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo
2008 Proceedings of the 8th ACM workshop on Digital rights management - DRM '08  
T-UCON is designed to be capable of enforcing not only application-specific policies, as any existing software-based DRM solution does, but also DRM policies across applications.  ...  This is achieved by binding the DRM policy only to the content it protects with no relations to the application(s) which will use this content.  ...  Unlike traditional DRM solutions that restrict policy enforcement to specific applications, T-UCON is capable of enforcing policies independent of and across applications.  ... 
doi:10.1145/1456520.1456535 dblp:conf/drm/NairTGC08 fatcat:evylqwhu4vgcjmr776x5rrv7la

The technical and legal dangers of code-based fair use enforcement

J.S. ERICKSON, D.K. MULLIGAN
2004 Proceedings of the IEEE  
It reviews the concepts and architecture of policy specification and enforcement, citing examples from the special case of DRM, and provides a detailed discussion of how usage control policies are evaluated  ...  This paper focuses on policy enforcement in the specific context of content use.  ...  model for content across applications. 4 Both the application-hooking and repository approaches depend upon external PDPs implemented as system-level extensions.  ... 
doi:10.1109/jproc.2004.827365 fatcat:bjebl2flnfcurnm3wel3brg4ya

Middleware Services for DRM

Pramod A. Jamkhedkar, Gregory L. Heileman, Ivan Martinez-Ortiz
2007 2007 2nd International Conference on Communication Systems Software and Middleware  
Many functionalities are common to most DRM applications and by nature are highly distributed.  ...  In this paper we point out the need for middleware services required to develop digital rights management (DRM) applications.  ...  Figure 1 shows how these services can can be implemented across a network and used by DRM applications on the server and the client side.  ... 
doi:10.1109/comswa.2007.382563 dblp:conf/comsware/JamkhedkarHM07 fatcat:odcumvtuprejbgimwamwwmb2eq

DRM as a layered system

Pramod A. Jamkhedkar, Gregory L. Heileman
2004 Proceedings of the 4th ACM workshop on Digital rights management - DRM '04  
The upper layers deal with the endto-end functions of the application, the middle layers deal with rights expression and interpretation, and the lower layers ensure rights enforcement.  ...  The fragmented nature of the DRM industry in 2004 is somewhat reminiscent of the telecommunications industry in the late 1980's.  ...  They do not enforce or mandate any policies for DRM, but provide the mechanisms to express them. Examples include XrML, ODRML, and XMCL [8, 15, 31] .  ... 
doi:10.1145/1029146.1029151 dblp:conf/drm/JamkhedkarH04 fatcat:wuajrsjv4bbxvlcxavb6i4q4gm

Experiences in Implementing a Kernel-Level DRM Controller

Alapan Arnab, Marlon Paulse, Duncan Bennett, Andrew Hutchison
2007 Third International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'07)  
The enforcement of DRM licenses is performed by a DRM controller, and it can be implemented at the application level, the operating system level and at a hardware level.  ...  This paper investigates the feasibility of creating a transparent, application independent DRM controller and the performance implications thereof.  ...  Park et al. discussed three types of control sets -the fixed control set, where the DRM policies are set with the DRM controller, the embedded control set, where the DRM policies are combined with the  ... 
doi:10.1109/axmedis.2007.25 fatcat:ogihnml3fbh3jmyt7pqv2zatna

Data Usage Control for the Cloud

F. Kelbert
2013 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing  
To this end, this thesis contributes by tackling four related subproblems: (1) tracking data flows across systems and propagating corresponding data usage policies, (2) taking distributed policy decisions  ...  This PhD thesis investigates the distributed aspects of usage control, with the goal to enforce usage control requirements on data that flows between systems, services and applications that may be distributed  ...  To enforce data deletion across all involved systems (web and email service, computing cluster, and text processing service), the data flow across these systems must have been tracked and policies must  ... 
doi:10.1109/ccgrid.2013.35 dblp:conf/ccgrid/Kelbert13 fatcat:uia24eyoojblrgzz2hjmszd6r4

A Pervasive Application Rights Management Architecture (PARMA) based on ODRL

Dominik Dahlem, Ivana Dusparic, Jim Dowling
2004 Open Digital Rights Language  
Our rights specification model uses aspectoriented programming to generate modularized rights enforcement behaviour, which reduces development time for rights models such as feature-based usage rights  ...  This paper presents an open-source pervasive application rights management architecture (PARMA) for fixed network and mobile applications that supports the specification of application rights in a rights  ...  The rules need to be transformed via XSL/T from the policies (rights) in the DRM agreement.  ... 
dblp:conf/odrl/DahlemDD04 fatcat:mpyq34me7vfknhlv5pp4vcr6i4

Do we have the time for IRM?: Service denial attacks and SDN-based defences [article]

Ryan Shah, Shishir Nagaraja
2018 arXiv   pre-print
Before data is sent to the cloud, it is encrypted on the device at the application level, with a policy which defines authorised use of the data.  ...  This includes the control of access, modification and distribution of content, and the systems that enforce these policies [15] .  ... 
arXiv:1812.10875v1 fatcat:kztjh4vdp5e2zie446bslbzj4q

Do we have the time for IRM?

Ryan Shah, Shishir Nagaraja
2019 Proceedings of the 20th International Conference on Distributed Computing and Networking - ICDCN '19  
Before data is sent to the cloud, it is encrypted on the device at the application level, with a policy which defines authorised use of the data.  ...  This includes the control of access, modification and distribution of content, and the systems that enforce these policies [15] .  ... 
doi:10.1145/3288599.3295582 dblp:conf/icdcn/ShahN19 fatcat:cnieyd3evnbebom7kqghacqpti

Persistent access control

Alapan Arnab, Andrew Hutchison
2007 Proceedings of the 2007 ACM workshop on Digital Rights Management - DRM '07  
Digital rights management (DRM) can be considered to be a mechanism to enforce access control over a resource without considering its location.  ...  A formal notation allows for an uniform and unambiguous interpretation and implementation of the access control policies.  ...  We also discussed the interpretation of LiREL, and the implications for the enforcement of DRM policies expressed in LiREL, including multiple conflicting licenses.  ... 
doi:10.1145/1314276.1314286 dblp:conf/drm/ArnabH07 fatcat:pgwczcasjnfvpb5ojq3xior7jm

The need for a digital rights management framework for the next generation of e-government services

Habtamu Abie, Bent Foyn, Jon Bing, Bernd Blobel, Peter Pharow, Jaime Delgado, Stamatis Karnouskos, Olli Pitkanen, Dimitrios Tzovaras
2004 Electronic Government, an International Journal  
Therefore, we propose to establish a Network of Excellence (NoE) for a Framework for Policy, Privacy, Security, Trust and Risk Management for DRM.  ...  citizen interaction with governmental services (especially benefiting rural and traditionally under-served communities); make government more accountable by making its operations transparent, and allow policy-based  ...  The ultimate goal is to create one single virtual research organisation in DRM issues across the Globe in order to co-ordinate DRM future research.  ... 
doi:10.1504/eg.2004.004134 fatcat:znwwvrbf3ffdzbarqafhtdzsbq

Self Protecting Data for De-perimeterised Information Sharing

Pete Burnap, Jeremy Hilton
2009 2009 Third International Conference on Digital Society  
that can be enforced through a DRM style application at each client location in a collaborative working environment.  ...  Policy Enforcement Once the policy has been defined for the resource, it can be distributed.  ... 
doi:10.1109/icds.2009.41 dblp:conf/icds/BurnapH09 fatcat:zsucmoihnfdxtmaejbgnwri2r4

Secure information sharing enabled by Trusted Computing and PEI models

Ravi Sandhu, Kumar Ranganathan, Xinwen Zhang
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
For each of these policy categories various enforcement and implementation models can be developed.  ...  This paper focusses on the policy and enforcement layers with only passing mention of the implementation layer.  ...  Reliance on appropriate application software to actually enforce the security policy is an integral part of this approach.  ... 
doi:10.1145/1128817.1128820 dblp:conf/ccs/SandhuRZ06 fatcat:japdpt7f7nf3bbz6733o7y4xue

SecureGov

John (Jong Uk) Choi, Soon Ae Chun, Dong Hwa Kim, Angelos Keromytis
2013 Proceedings of the 14th Annual International Conference on Digital Government Research - dg.o '13  
This "paperless" government facilitates the transparency of government and fosters collaboration across government agencies and among citizens.  ...  The layered security framework uses combined technologies, including a usage control scheme called Enterprise Digital Rights Management (E-DRM) to prevent illegal use and leakage, a forgery prevention  ...  Therefore, based on the access control triple, E-DRM evaluates and enforces the access control policies for the shared documents or data.  ... 
doi:10.1145/2479724.2479745 dblp:conf/dgo/ChoiCKK13 fatcat:azbqd3aqljdnnl3pekblf6kk2e

Digital Rights Management: The Librarian's Guide

A. Robin Bowles
2018 Journal of the Medical Library Association  
It also explores how DRM can both be both a blessing and a curse for the continued evolution of electronic information.  ...  Digital Rights Management: The Librarian's Guide offers a comprehensive view of how digital rights management (DRM) shapes all kinds of library decision-making regarding acquisition, access, and management  ...  should work closely together or be merged into combined departments to ensure that DRM issues are handed holistically across library functions.  ... 
doi:10.5195/jmla.2018.461 fatcat:2o3ltvb4fza2tkvsqovaxhtmqq
« Previous Showing results 1 — 15 out of 1,685 results