2010 Fourth International Conference on Network and System Security 2010
DOI: 10.1109/nss.2010.94
|View full text |Cite
|
Sign up to set email alerts
|

A Rights Management Approach to Securing Data Distribution in Coalitions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…access control mechanism, cryptography, fingerprinting, probabilistic evaluation and watermarking. [19], [20], [21], [22], [23] provide the security and privacy to data through access control mechanism. In [19], coalitions have been formed among data owners for distributing the data in a secure manner.…”
Section: Related Workmentioning
confidence: 99%
“…access control mechanism, cryptography, fingerprinting, probabilistic evaluation and watermarking. [19], [20], [21], [22], [23] provide the security and privacy to data through access control mechanism. In [19], coalitions have been formed among data owners for distributing the data in a secure manner.…”
Section: Related Workmentioning
confidence: 99%
“…Data usage control enforcement systems [23], [24] employ preventive measures to ensure that data is transferred in distributed systems in a controlled manner preserving the well-defined policies. Techniques have been developed for securely distributing data by forming coalitions among the data owners [25]. In controlled environments, such techniques can be composed with our protocols to improve data privacy.…”
Section: Other Modelsmentioning
confidence: 99%
“…Data usage control enforcement systems [41,29] employ preventive measures to ensure that data is transferred in distributed systems in a controlled manner preserving the welldefined policies. Techniques have been developed for securely distributing data by forming coalitions among the data owners [45]. In controlled environments, such techniques can be composed with our protocols to improve data privacy.…”
Section: Other Modelsmentioning
confidence: 99%