{"title":"可信计算在互联网规模数字版权管理中的作用","authors":"Geoffrey Strongin","doi":"10.1145/1179474.1179483","DOIUrl":null,"url":null,"abstract":"The XRI Data Interchange (XDI) protocols and schemas provide a foundation for internet scale exchange of data between parties based on mutually agreed upon policies. Local enforcement of the policy and the preservation of the persistent binding between the data and policy imply a local policy enforcement system. This talk explores the relationship between trusted computing, remote attestation and local policy enforcement capabilities in an Internet scale environment.","PeriodicalId":401412,"journal":{"name":"Scalable Trusted Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The role of trusted computing in internet scale DRM\",\"authors\":\"Geoffrey Strongin\",\"doi\":\"10.1145/1179474.1179483\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The XRI Data Interchange (XDI) protocols and schemas provide a foundation for internet scale exchange of data between parties based on mutually agreed upon policies. Local enforcement of the policy and the preservation of the persistent binding between the data and policy imply a local policy enforcement system. This talk explores the relationship between trusted computing, remote attestation and local policy enforcement capabilities in an Internet scale environment.\",\"PeriodicalId\":401412,\"journal\":{\"name\":\"Scalable Trusted Computing\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scalable Trusted Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1179474.1179483\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scalable Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1179474.1179483","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The role of trusted computing in internet scale DRM
The XRI Data Interchange (XDI) protocols and schemas provide a foundation for internet scale exchange of data between parties based on mutually agreed upon policies. Local enforcement of the policy and the preservation of the persistent binding between the data and policy imply a local policy enforcement system. This talk explores the relationship between trusted computing, remote attestation and local policy enforcement capabilities in an Internet scale environment.