A Comparison of Traditional Access Control Models and Digital Rights Management
نویسندگان
چکیده
Access control mechanisms currently employed in various applications lack the power to provide (express and enforce) complex, dynamic relationships between users and resources in a scalable and consistent way. The problem escalates when we consider dynamic ad-hoc environments where security associations between users and objects continuously change and are not known prior to a decision. This paper compares traditional Access Control (AC) models to Digital Rights Management (DRM) in order to provide some insight to these problems. These two are often thought to be independent mechanisms that both control access to and usage of tangible and intangible assets. It is demonstrated that they do exhibit many common characteristics and that some of the ideas behind DRM apply to a variety of AC problems, particularly when dealing with commercially driven dynamic relationships and context aware environments as is the case with many modern applications and services.
منابع مشابه
A Survey of Usage Control in Computer Security
Protecting access to digital resources is one of the fundamental problems recognized in computer security. It yet remains a challenging problem to work out starting from the conception till implementation. Access control is a study which deals with the ability to permit or deny the access rights to a particular resource (object) by a particular entity (subject). The three most widely implemente...
متن کاملUsage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in the computer security. It yet remains a challenging problem to work out starting from the design of a system till its implementation. Access control is defined as the ability to permit or deny to access a particular resource (object) to a particular entity (subject). Three most widely used traditional access...
متن کاملمدیریت کلید در سیستمهای مدیریت حقوق دیجیتال در حالت برونخطی
By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملUsing Digital Right Management technology in IRANDOC ETD System
Background and Aim: Easing the probability of violation of intellectual property rights and unauthorized access of digital resources is one of the most important consequences of information and communication technologies like Internet. The purpose of this research is to identify the state of Using Digital Right Management technology in IRANDOC ETD system. Method: This research is an applied re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003