[go: up one dir, main page]

Feigenbaum et al., 2001 - Google Patents

Privacy engineering for digital rights management systems

Feigenbaum et al., 2001

View PDF
Document ID
13249341699346957875
Author
Feigenbaum J
Freedman M
Sander T
Shostack A
Publication year
Publication venue
ACM Workshop on Digital Rights Management

External Links

Snippet

Internet-based distribution of mass-market content provides great opportunities for producers, distributors, and consumers, but it may seriously threaten users' privacy. Some of the paths to loss of privacy are quite familiar (eg, mining of credit-card data), but some are …
Continue reading at www.cs.yale.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Feigenbaum et al. Privacy engineering for digital rights management systems
US20230394469A1 (en) Systems and Methods for Instant NFTs and Protection Structure, Detection of Malicious Code within Blockchain Smart Contracts, Tokens with Transfer Limitations, Mirror Tokens and Parallel Addresses, Smart Contract Risk Scoring Method, and Cross-Device Digital Rights Management
US11296895B2 (en) Systems and methods for preserving privacy and incentivizing third-party data sharing
Ullah et al. Privacy in targeted advertising on mobile devices: a survey
US7496540B2 (en) System and method for securing digital content
RU2541878C2 (en) Techniques for monetising anonymised context
US20030120928A1 (en) Methods for rights enabled peer-to-peer networking
US10931650B1 (en) Apparatus and method for building, extending and managing interactions between digital identities and digital identity applications
US20130332987A1 (en) Data collection and analysis systems and methods
US20090031426A1 (en) Method and System for Protected Distribution of Digitalized Sensitive Information
US20050038707A1 (en) Methods and apparatus for enabling transactions in networks
US20120246065A1 (en) Techniques for offering context to service providers utilizing incentives
US20030158960A1 (en) System and method for establishing a privacy communication path
US20110247029A1 (en) Techniques for offering context to service providers utilizing incentives
Ullah et al. Privacy in targeted advertising: A survey
Fasli On agent technology for e-commerce: trust, security and legal issues
Wang et al. Access Control Management in Cloud Environments
US20110246213A1 (en) Techniques for offering context to service providers utilizing an approval service and incentives utlizing online secure profile storage
Klopfenstein et al. " Worth one minute": An anonymous rewarding platform for crowd-sensing systems
JP2004032220A (en) Access right management device using electronic ticket
EP1290599A1 (en) A system and method for establishing a privacy communication path
US20110247030A1 (en) Incentives based techniques for offering context to service providers utilizing syncronizing profile stores
Patel et al. A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems
WO2002051057A2 (en) Methods for rights enabled peer-to-peer networking
Pearson Trusted agents that enhance user privacy by self-profiling