Sciweavers

186 search results - page 27 / 38
» A four-layer model for security of digital rights management
Sort
View
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
CCS
2009
ACM
14 years 8 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
ACISP
2000
Springer
13 years 12 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
SIGCSE
2008
ACM
128views Education» more  SIGCSE 2008»
13 years 7 months ago
Cybercivics: a novel approach to reaching k-12 students with the social relevance of computer science
This paper describes CyberCivics, a novel approach to computer science outreach that integrates hands-on computing experiences with the study of contemporary social and political ...
Jim Owens, Jeanna Matthews
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov