{"title":"DRM Application in UCONABC","authors":"Yonggang Ding, Junhua Zou","doi":"10.1109/ASEA.2008.14","DOIUrl":null,"url":null,"abstract":"In this paper, we introduce the elementary UCONABC models for usage control (UCON), which integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models because they address the essence of UCON. UCONABC covers traditional access controls such as mandatory, discretionary, role-based access control, digital rights management (DRM) and other modern access controls. In the later part of the paper, the example of DRM application in UCONABC model is given to support the feasibility of UCONABC in real computer and information security world.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"605 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Advanced Software Engineering and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASEA.2008.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper, we introduce the elementary UCONABC models for usage control (UCON), which integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models because they address the essence of UCON. UCONABC covers traditional access controls such as mandatory, discretionary, role-based access control, digital rights management (DRM) and other modern access controls. In the later part of the paper, the example of DRM application in UCONABC model is given to support the feasibility of UCONABC in real computer and information security world.