Feigenbaum et al., 2001 - Google Patents
Privacy engineering for digital rights management systemsFeigenbaum et al., 2001
View PDF- Document ID
- 13249341699346957875
- Author
- Feigenbaum J
- Freedman M
- Sander T
- Shostack A
- Publication year
- Publication venue
- ACM Workshop on Digital Rights Management
External Links
Snippet
Internet-based distribution of mass-market content provides great opportunities for producers, distributors, and consumers, but it may seriously threaten users' privacy. Some of the paths to loss of privacy are quite familiar (eg, mining of credit-card data), but some are …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Feigenbaum et al. | Privacy engineering for digital rights management systems | |
US20230394469A1 (en) | Systems and Methods for Instant NFTs and Protection Structure, Detection of Malicious Code within Blockchain Smart Contracts, Tokens with Transfer Limitations, Mirror Tokens and Parallel Addresses, Smart Contract Risk Scoring Method, and Cross-Device Digital Rights Management | |
US11296895B2 (en) | Systems and methods for preserving privacy and incentivizing third-party data sharing | |
Ullah et al. | Privacy in targeted advertising on mobile devices: a survey | |
US7496540B2 (en) | System and method for securing digital content | |
RU2541878C2 (en) | Techniques for monetising anonymised context | |
US20030120928A1 (en) | Methods for rights enabled peer-to-peer networking | |
US10931650B1 (en) | Apparatus and method for building, extending and managing interactions between digital identities and digital identity applications | |
US20130332987A1 (en) | Data collection and analysis systems and methods | |
US20090031426A1 (en) | Method and System for Protected Distribution of Digitalized Sensitive Information | |
US20050038707A1 (en) | Methods and apparatus for enabling transactions in networks | |
US20120246065A1 (en) | Techniques for offering context to service providers utilizing incentives | |
US20030158960A1 (en) | System and method for establishing a privacy communication path | |
US20110247029A1 (en) | Techniques for offering context to service providers utilizing incentives | |
Ullah et al. | Privacy in targeted advertising: A survey | |
Fasli | On agent technology for e-commerce: trust, security and legal issues | |
Wang et al. | Access Control Management in Cloud Environments | |
US20110246213A1 (en) | Techniques for offering context to service providers utilizing an approval service and incentives utlizing online secure profile storage | |
Klopfenstein et al. | " Worth one minute": An anonymous rewarding platform for crowd-sensing systems | |
JP2004032220A (en) | Access right management device using electronic ticket | |
EP1290599A1 (en) | A system and method for establishing a privacy communication path | |
US20110247030A1 (en) | Incentives based techniques for offering context to service providers utilizing syncronizing profile stores | |
Patel et al. | A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems | |
WO2002051057A2 (en) | Methods for rights enabled peer-to-peer networking | |
Pearson | Trusted agents that enhance user privacy by self-profiling |