DRM and access control architectures interoperability
暂无分享,去创建一个
E. Rodriguez | J. Delgado | D. Price | A. Waller | P. de Waard | J. Delgado | D. Price | E. Rodríguez | A. Waller | P. Waard
[1] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[2] V. Torres,et al. Use of standards for implementing a multimedia information protection and management system , 2005, First International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'05).
[3] Carl M. Ellison,et al. SPKI Requirements , 1999, RFC.
[4] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[5] Jeff Hodges,et al. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2. 0 , 2001 .
[6] Russ Housley,et al. An Internet Attribute Certificate Profile for Authorization , 2010, RFC.
[7] Jaime Delgado,et al. An Implementation of a Trusted and Secure DRM Architecture , 2006, OTM Workshops.