The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Hardware Approach for Trusted Access and Usage Control
|
Author(s): Nicolas Anciaux (INRIA Rocquencourt, France), Luc Bouganim (INRIA Rocquencourt, France)and Philippe Pucheral (INRIA Rocquencourt and University of Versailles, France)
Copyright: 2009
Pages: 23
Source title:
Handbook of Research on Secure Multimedia Distribution
Source Author(s)/Editor(s): Shiguo Lian (SAMI Lab, France Telecom R&D Beijing, China)and Yan Zhang (Simula Research Laboratory, Norway)
DOI: 10.4018/978-1-60566-262-6.ch009
Purchase
|
Abstract
This chapter advocates the convergence between Access Control (AC) models, focusing on the granularity of sharing, and Digital Right Management (DRM) models focusing on conditional authorizations and obligations. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must be equally protected against any form of tampering and piracy. We capitalize on the democratization of powerful secure chip platforms (e.g., smart cards, secure USB dongles) which can be plugged in a variety of client devices (PC, PDA, cell phones, consumer electronics) to design a new architecture of a trusted access and usage control system. The benefits of the proposed architecture are exemplified in two different contexts: a fair DRM scenario and a healthcare scenario.
Related Content
Nithin Kalorth, Vidya Deshpande.
© 2024.
7 pages.
|
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane.
© 2024.
24 pages.
|
T.S. Sujith.
© 2024.
13 pages.
|
C. Suganya, M. Vijayakumar.
© 2024.
11 pages.
|
B. Harry, Vijayakumar Muthusamy.
© 2024.
19 pages.
|
Munise Hayrun Sağlam, Ibrahim Kirçova.
© 2024.
19 pages.
|
Elif Karakoç Keskin.
© 2024.
19 pages.
|
|
|