Tcl and the Tk toolkit
An efficient fair payment system
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Strong loss tolerance of electronic coin systems
ACM Transactions on Computer Systems (TOCS)
RBAC on the Web by smart certificates
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Architectural support for copy and tamper resistant software
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
IEEE Internet Computing
Making Components Contract Aware
Computer
Electronic Lottery Tickets as Micropayments
FC '97 Proceedings of the First International Conference on Financial Cryptography
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
A Contract and Rights Management Framework Design for Interacting Brokers
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9 - Volume 9
Policies in Accountable Contracts
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Originator Control in Usage Control
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
General-purpose digital ticket framework
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
XOTcl: an object-oriented scripting language
TCLTK'00 Proceedings of the 7th conference on USENIX Tcl/Tk - Volume 7
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Import/export in digital rights management
Proceedings of the 4th ACM workshop on Digital rights management
Sharing digital rights with domain licensing
Proceedings of the 4th ACM international workshop on Contents protection and security
On-line Trading of Rights-Enabled Learning Objects
International Journal of Electronic Commerce
Persistent access control: a formal model for drm
Proceedings of the 2007 ACM workshop on Digital Rights Management
On the operational semantics of rights expression languages
Proceedings of the nineth ACM workshop on Digital rights management
Hi-index | 0.00 |
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (CoSa) which is an approach to provide a generic representation of contract information on top of rights expression languages. We give an overview of the design and implementation of the xoRELInterpreter software component. In particular, the xoRELInterpreter interprets digital contracts that are based on rights expression languages (e.g. ODRL or XrML) and builds a runtime CoSa object model. We describe how the xorbac access control component and the xoRELInterpreter component are used to enforce access rights that we extract from ODRL-based digital contracts. Thus, our approach describes how ODRL-based contracts can be used as a means to disseminate certain types of access control information in distributed systems.