Filters








5 Hits in 1.4 sec

Implementing Trusted Terminals with a and SITDRM

Sid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini
2008 Electronical Notes in Theoretical Computer Science  
A Trusted Platform Module (TPM) and a TPM-using operating system are all that may be required to construct a verifiably secure terminal.  ...  We use the Trusted Computing Group's specifications for a trusted platform upon which to build a data user terminal that can be proved to implement correct license-enforcing behavior.  ...  We discuss how SITDRM and Trusted Computing (TC) fit together, and how one can use TC to implement such a terminal.  ... 
doi:10.1016/j.entcs.2007.10.015 fatcat:h7c7c5bvfrhglnjc27vitdls5m

On implementing mpeg-21 intellectual property management and protection

Nicholas Paul Sheppard
2007 Proceedings of the 2007 ACM workshop on Digital Rights Management - DRM '07  
MPEG-21 defines the mechanism by which protected multimedia objects are associated with proprietary IPMP tools, but does not specify the interface through which IPMP tools and MPEG-21 terminals communicate  ...  MPEG-21 defines the mechanism by which protected multimedia objects are associated with proprietary IPMP tools, but does not specify the interface through which IPMP tools and MPEG-21 terminals communicate  ...  In particular, the author would like to thank Hartono Kurnio, Qiong Liu, Adam Muhlbauer, Rei Safavi-Naini, Farzad Salim and Sid Stamm for their contribution to projects surrounding the SITDRM software.  ... 
doi:10.1145/1314276.1314280 dblp:conf/drm/Sheppard07 fatcat:vdi36pdidbhp7nouwn5thjsafm

Protecting Privacy with the MPEG-21 IPMP Framework [chapter]

Nicholas Paul Sheppard, Reihaneh Safavi-Naini
2006 Lecture Notes in Computer Science  
In this paper, we describe our experiences in implementing a privacy protection system based on the Intellectual Property Management and Protection ("IPMP") components of the MPEG-21 Multimedia Framework  ...  A number of authors have observed a duality between privacy protection and copyright protection, and, in particular, observed how digital rights management technology may be used as the basis of a privacy  ...  To this end, we require that content may only be accessed by use of a secure terminal trusted to comply with the terms of any licence associated with the content; and terminals must be able to verify the  ... 
doi:10.1007/11957454_9 fatcat:qeu3ljfnqbholjnhqrihpsayma

Location constraints in digital rights management

Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Surminen
2008 Computer Communications  
This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined  ...  Digital rights management allows information owners to control the use and dissemination of electronic documents via a machinereadable licence.  ...  Assuming that the terminal is trusted, we do not require trusted distribution channels.  ... 
doi:10.1016/j.comcom.2008.01.008 fatcat:2yjqugyaffhclby24hkdv6hz5e

Enforcing P3P Policies Using a Digital Rights Management System [chapter]

Farzad Salim, Nicholas Paul Sheppard, Rei Safavi-Naini
Privacy Enhancing Technologies  
However, licenses are very detailed, may reveal the internal structure of the enterprise and need to be kept synchronous with the enterprise privacy policy.  ...  To deal with this, we employ the Platform for Privacy Preferences Language (P3P) to communicate enterprise privacy policies to consumers and enable them to easily construct data licenses.  ...  There are three types of users that interact with SITDRM: a data user, who uses a trusted terminal to use the data, a data owner who provides the data and the privacy officer, who performs the tasks necessary  ... 
doi:10.1007/978-3-540-75551-7_13 dblp:conf/pet/SalimSS07 fatcat:epqcsiyhznffdejikrqwmimkkm