Back to Results
First PageMeta Content
Metadata / Trusted computing / Trusted computing base / XrML / Next-Generation Secure Computing Base / ODRL / PlayReady / The Right to Read / Trusted Platform Module / Computer security / Digital rights management / Copyright law


Key Challenges in DRM: An Industry Perspective Brian A. LaMacchia? Microsoft Corporation One Microsoft Way Redmond, WA[removed]USA
Add to Reading List

Document Date: 2008-08-19 02:49:34


Open Document

File Size: 122,96 KB

Share Result on Facebook

City

Santa Clara / Springer-Verlag / Palo Alto / /

Company

REL / RDD / DRM Systems / Xerox / Moving Picture Experts Group / Microsoft Corporation / /

Country

United States / /

/

Event

FDA Phase / /

Facility

Xerox Palo Alto Research Center / /

IndustryTerm

appropriate tools / attestable trusted computing bases / number-theoretic algorithms / Web Applications / public key infrastructure / user enrollment protocols / copyright law / Web Conference / less-efficient algorithms / long-term solutions / policy management systems / software component / trust management / administration systems / trusted computing bases / policy management / software stack / printing / digital rights management / cryptographic hardware / hardware / computing / personal computer hardware / larger and larger distributed systems / trust management algorithms / authentication protocols / security protocols / web services / /

Organization

Trusted Computing Platform Alliance / OASIS XML-Based Security Services Technical Committee / OASIS Rights Language Technical Committee / OASIS eXtensible Access Control Markup Language Technical Committee / Internet Engineering Task Force / /

Person

Brian A. LaMacchia / H. Reddy / /

/

Position

author of the content access policy / XrML evaluator / policy evaluator / author / model of distributed programming / evaluator / Chairperson / /

Product

Microsoft Corporation Portable Audio Device / OASIS Security Assertion / /

ProgrammingLanguage

XML / /

ProvinceOrState

California / /

PublishedMedium

Communications of the ACM / Lecture Notes in Computer Science / /

Technology

XML / public key infrastructure / private key / security protocols / number-theoretic algorithms / pdf / trust management algorithms / encryption / ISDN / cryptography / Public Key / content management / Cumbersome user enrollment protocols / authentication protocols / digital signature / /

URL

http /

SocialTag