JENC Conference procedings on 3rd joint European networking conference
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Payment switches for open networks
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
Requirements for network payment: the NetCheque perspective
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
NetBill: An Internet commerce system optimized for network delivered services
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A temporal key management scheme for secure broadcasting of XML documents
Proceedings of the 9th ACM conference on Computer and communications security
A Framework for the Encapsulation of Value-Added Services in Digital Objects
ECDL '98 Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries
SODA: Smart Objects, Dumb Archives
ECDL '99 Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries
System Infrastructure for Digital Libraries: A Survey and Outlook
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
Originator Control in Usage Control
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Classification of ad-hoc multi-lateral collaborations based on local workflow models
Proceedings of the 2003 ACM symposium on Applied computing
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Virtual leashing: creating a computational foundation for software protection
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Persistent security, privacy, and governance for healthcare information
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
Economic incentives for protecting digital rights online
Electronic Commerce Research and Applications
Design and development challenges for an E2E DRM content business integration platform
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |
Information Commerce is a business activity carried out among several parties in which information carries value and is treated as a product. The information may be content, it may be returned usage and marketing data, and it may be representative of financial transactions. In each of these cases the information is valuable and must be kept secure and private. Traditional approaches secure the transmission of that information from one point to another; there are no persistent protections. Protection of all of these components of information commerce for all parties in a transaction value chain is necessary for a robust electronic infrastructure. A prerequisite to such an environment is a cryptographically protected container for packaging information and controls that enforce information rights. This paper describes such a container, called the DigiBoxTM. EPR has submitted initial specifications for the DigiBox container to the ANSI IISP Electronic Publishing Task Force (EPUB) within the User/Content Provider Standards Working Group (WG4).