{"title":"访问-使用-控制-矩阵:用于实现选定级别的技术内容保护的启发式工具","authors":"Vural Ünlü, T. Hess","doi":"10.1109/ICECT.2005.90","DOIUrl":null,"url":null,"abstract":"Content providers are faced with massive intellectual property piracy and resort to technical protection measures encapsulated in digital rights management systems (DRMS). Given the cost-benefit trade-off of varying levels of content protection there is a need to implement a selected level of content protection. Based on a functional reference model of a DRMS, this paper proposes an access-usage-control-matrix to heuristically determine the protective strength of a given DRMS installation. The underlying assumption is that the combined robustness of the preventive security functions access control and usage control determines overall strength. The robustness of both matrix dimensions is refined with concrete authentication and client tamper-resistance methods.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"The access-usage-control-matrix: a heuristic tool for implementing a selected level of technical content protection\",\"authors\":\"Vural Ünlü, T. Hess\",\"doi\":\"10.1109/ICECT.2005.90\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Content providers are faced with massive intellectual property piracy and resort to technical protection measures encapsulated in digital rights management systems (DRMS). Given the cost-benefit trade-off of varying levels of content protection there is a need to implement a selected level of content protection. Based on a functional reference model of a DRMS, this paper proposes an access-usage-control-matrix to heuristically determine the protective strength of a given DRMS installation. The underlying assumption is that the combined robustness of the preventive security functions access control and usage control determines overall strength. The robustness of both matrix dimensions is refined with concrete authentication and client tamper-resistance methods.\",\"PeriodicalId\":312957,\"journal\":{\"name\":\"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECT.2005.90\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECT.2005.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The access-usage-control-matrix: a heuristic tool for implementing a selected level of technical content protection
Content providers are faced with massive intellectual property piracy and resort to technical protection measures encapsulated in digital rights management systems (DRMS). Given the cost-benefit trade-off of varying levels of content protection there is a need to implement a selected level of content protection. Based on a functional reference model of a DRMS, this paper proposes an access-usage-control-matrix to heuristically determine the protective strength of a given DRMS installation. The underlying assumption is that the combined robustness of the preventive security functions access control and usage control determines overall strength. The robustness of both matrix dimensions is refined with concrete authentication and client tamper-resistance methods.