A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Enforcing DRM policies across applications
2008
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
T-UCON is designed to be capable of enforcing not only application-specific policies, as any existing software-based DRM solution does, but also DRM policies across applications. ...
This is achieved by binding the DRM policy only to the content it protects with no relations to the application(s) which will use this content. ...
Unlike traditional DRM solutions that restrict policy enforcement to specific applications, T-UCON is capable of enforcing policies independent of and across applications. ...
doi:10.1145/1456520.1456535
dblp:conf/drm/NairTGC08
fatcat:evylqwhu4vgcjmr776x5rrv7la
The technical and legal dangers of code-based fair use enforcement
2004
Proceedings of the IEEE
It reviews the concepts and architecture of policy specification and enforcement, citing examples from the special case of DRM, and provides a detailed discussion of how usage control policies are evaluated ...
This paper focuses on policy enforcement in the specific context of content use. ...
model for content across applications. 4 Both the application-hooking and repository approaches depend upon external PDPs implemented as system-level extensions. ...
doi:10.1109/jproc.2004.827365
fatcat:bjebl2flnfcurnm3wel3brg4ya
Middleware Services for DRM
2007
2007 2nd International Conference on Communication Systems Software and Middleware
Many functionalities are common to most DRM applications and by nature are highly distributed. ...
In this paper we point out the need for middleware services required to develop digital rights management (DRM) applications. ...
Figure 1 shows how these services can can be implemented across a network and used by DRM applications on the server and the client side. ...
doi:10.1109/comswa.2007.382563
dblp:conf/comsware/JamkhedkarHM07
fatcat:odcumvtuprejbgimwamwwmb2eq
DRM as a layered system
2004
Proceedings of the 4th ACM workshop on Digital rights management - DRM '04
The upper layers deal with the endto-end functions of the application, the middle layers deal with rights expression and interpretation, and the lower layers ensure rights enforcement. ...
The fragmented nature of the DRM industry in 2004 is somewhat reminiscent of the telecommunications industry in the late 1980's. ...
They do not enforce or mandate any policies for DRM, but provide the mechanisms to express them. Examples include XrML, ODRML, and XMCL [8, 15, 31] . ...
doi:10.1145/1029146.1029151
dblp:conf/drm/JamkhedkarH04
fatcat:wuajrsjv4bbxvlcxavb6i4q4gm
Experiences in Implementing a Kernel-Level DRM Controller
2007
Third International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'07)
The enforcement of DRM licenses is performed by a DRM controller, and it can be implemented at the application level, the operating system level and at a hardware level. ...
This paper investigates the feasibility of creating a transparent, application independent DRM controller and the performance implications thereof. ...
Park et al. discussed three types of control sets -the fixed control set, where the DRM policies are set with the DRM controller, the embedded control set, where the DRM policies are combined with the ...
doi:10.1109/axmedis.2007.25
fatcat:ogihnml3fbh3jmyt7pqv2zatna
Data Usage Control for the Cloud
2013
2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing
To this end, this thesis contributes by tackling four related subproblems: (1) tracking data flows across systems and propagating corresponding data usage policies, (2) taking distributed policy decisions ...
This PhD thesis investigates the distributed aspects of usage control, with the goal to enforce usage control requirements on data that flows between systems, services and applications that may be distributed ...
To enforce data deletion across all involved systems (web and email service, computing cluster, and text processing service), the data flow across these systems must have been tracked and policies must ...
doi:10.1109/ccgrid.2013.35
dblp:conf/ccgrid/Kelbert13
fatcat:uia24eyoojblrgzz2hjmszd6r4
A Pervasive Application Rights Management Architecture (PARMA) based on ODRL
2004
Open Digital Rights Language
Our rights specification model uses aspectoriented programming to generate modularized rights enforcement behaviour, which reduces development time for rights models such as feature-based usage rights ...
This paper presents an open-source pervasive application rights management architecture (PARMA) for fixed network and mobile applications that supports the specification of application rights in a rights ...
The rules need to be transformed via XSL/T from the policies (rights) in the DRM agreement. ...
dblp:conf/odrl/DahlemDD04
fatcat:mpyq34me7vfknhlv5pp4vcr6i4
Do we have the time for IRM?: Service denial attacks and SDN-based defences
[article]
2018
arXiv
pre-print
Before data is sent to the cloud, it is encrypted on the device at the application level, with a policy which defines authorised use of the data. ...
This includes the control of access, modification and distribution of content, and the systems that enforce these policies [15] . ...
arXiv:1812.10875v1
fatcat:kztjh4vdp5e2zie446bslbzj4q
Do we have the time for IRM?
2019
Proceedings of the 20th International Conference on Distributed Computing and Networking - ICDCN '19
Before data is sent to the cloud, it is encrypted on the device at the application level, with a policy which defines authorised use of the data. ...
This includes the control of access, modification and distribution of content, and the systems that enforce these policies [15] . ...
doi:10.1145/3288599.3295582
dblp:conf/icdcn/ShahN19
fatcat:cnieyd3evnbebom7kqghacqpti
Persistent access control
2007
Proceedings of the 2007 ACM workshop on Digital Rights Management - DRM '07
Digital rights management (DRM) can be considered to be a mechanism to enforce access control over a resource without considering its location. ...
A formal notation allows for an uniform and unambiguous interpretation and implementation of the access control policies. ...
We also discussed the interpretation of LiREL, and the implications for the enforcement of DRM policies expressed in LiREL, including multiple conflicting licenses. ...
doi:10.1145/1314276.1314286
dblp:conf/drm/ArnabH07
fatcat:pgwczcasjnfvpb5ojq3xior7jm
The need for a digital rights management framework for the next generation of e-government services
2004
Electronic Government, an International Journal
Therefore, we propose to establish a Network of Excellence (NoE) for a Framework for Policy, Privacy, Security, Trust and Risk Management for DRM. ...
citizen interaction with governmental services (especially benefiting rural and traditionally under-served communities); make government more accountable by making its operations transparent, and allow policy-based ...
The ultimate goal is to create one single virtual research organisation in DRM issues across the Globe in order to co-ordinate DRM future research. ...
doi:10.1504/eg.2004.004134
fatcat:znwwvrbf3ffdzbarqafhtdzsbq
Self Protecting Data for De-perimeterised Information Sharing
2009
2009 Third International Conference on Digital Society
that can be enforced through a DRM style application at each client location in a collaborative working environment. ...
Policy Enforcement Once the policy has been defined for the resource, it can be distributed. ...
doi:10.1109/icds.2009.41
dblp:conf/icds/BurnapH09
fatcat:zsucmoihnfdxtmaejbgnwri2r4
Secure information sharing enabled by Trusted Computing and PEI models
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
For each of these policy categories various enforcement and implementation models can be developed. ...
This paper focusses on the policy and enforcement layers with only passing mention of the implementation layer. ...
Reliance on appropriate application software to actually enforce the security policy is an integral part of this approach. ...
doi:10.1145/1128817.1128820
dblp:conf/ccs/SandhuRZ06
fatcat:japdpt7f7nf3bbz6733o7y4xue
SecureGov
2013
Proceedings of the 14th Annual International Conference on Digital Government Research - dg.o '13
This "paperless" government facilitates the transparency of government and fosters collaboration across government agencies and among citizens. ...
The layered security framework uses combined technologies, including a usage control scheme called Enterprise Digital Rights Management (E-DRM) to prevent illegal use and leakage, a forgery prevention ...
Therefore, based on the access control triple, E-DRM evaluates and enforces the access control policies for the shared documents or data. ...
doi:10.1145/2479724.2479745
dblp:conf/dgo/ChoiCKK13
fatcat:azbqd3aqljdnnl3pekblf6kk2e
Digital Rights Management: The Librarian's Guide
2018
Journal of the Medical Library Association
It also explores how DRM can both be both a blessing and a curse for the continued evolution of electronic information. ...
Digital Rights Management: The Librarian's Guide offers a comprehensive view of how digital rights management (DRM) shapes all kinds of library decision-making regarding acquisition, access, and management ...
should work closely together or be merged into combined departments to ensure that DRM issues are handed holistically across library functions. ...
doi:10.5195/jmla.2018.461
fatcat:2o3ltvb4fza2tkvsqovaxhtmqq
« Previous
Showing results 1 — 15 out of 1,685 results