A Hardware Approach for Trusted Access and Usage Control - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Chapitre D'ouvrage Année : 2008

A Hardware Approach for Trusted Access and Usage Control

Résumé

This chapter advocates the convergence between Access Control (AC) models focusing on the granularity of sharing and Digital Right Management (DRM) models focusing on conditional authorizations and obligations. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must be equally protected against any form of tampering and piracy. We capitalize on the democratization of powerful secure chip platforms (e.g., smart cards, secure USB dongles) which can be plugged in a variety of client devices (PC, PDA, cell phones, consumer electronics) to design a new architecture of a trusted access and usage control system. The benefits of the proposed architecture are exemplified in two different contexts: a fair DRM scenario and a healthcare scenario.
Fichier principal
Vignette du fichier
ABP08a.pdf (244.69 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00333208 , version 1 (22-10-2008)

Identifiants

  • HAL Id : inria-00333208 , version 1

Citer

Nicolas Anciaux, Luc Bouganim, Philippe Pucheral. A Hardware Approach for Trusted Access and Usage Control. Shiguo Lian. Handbook of Research on Secure Multimedia Distribution, IGI Global Eds, 2008, 978-1605662626. ⟨inria-00333208⟩
137 Consultations
236 Téléchargements

Partager

Gmail Facebook X LinkedIn More