ISIE '97 Proceeding of the IEEE International Symposium on Industrial Electronics
DOI: 10.1109/isie.1997.651739
|View full text |Cite
|
Sign up to set email alerts
|

Music on the Internet and the intellectual property protection problem

Abstract: Recent advances in audio compression technology coupled with trends toward higher network bandwidth, lower memory costs and lower storage costs indicate that the obstacles to music distribution on the Internet will soon he overcome. Because it provides benefits to consumers and to music content owners alike, networked music distribution may become one of the first compelling Internet consumer services. At the same time these technological advances create opportunities for pirates. We believe that the music ind… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…The key would be bound to a license that indicated to the trust management engine that the holder of the license was authorized to access the content per the terms of the license and the local policy of the application hosting the trust management engine. An early version of these so-called DRM systems explicitly based on trust management is described in [3].…”
Section: Octopus: An Application Independent Drm Toolkitmentioning
confidence: 99%
“…The key would be bound to a license that indicated to the trust management engine that the holder of the license was authorized to access the content per the terms of the license and the local policy of the application hosting the trust management engine. An early version of these so-called DRM systems explicitly based on trust management is described in [3].…”
Section: Octopus: An Application Independent Drm Toolkitmentioning
confidence: 99%
“…PolicyMaker was introduced in the original trust-management paper by Blaze et al [1], and its compliance-checking algorithm was later fleshed out in [4]. A full description of the system can be found in [1,4], and experience using it in several applications is reported in [5][6][7]. PolicyMaker credentials and policies (collectively referred to as assertions) are fully programmable: they are represented as pairs…”
Section: Policymakermentioning
confidence: 99%
“…We give a high-level overview of the design decisions that went into PolicyMaker in this section and some technical details of the PolicyMaker compliance checker in Appendix A below. A full description of the system can be found in [5,7], and experience using it in several applications is reported in [6,18,21].…”
Section: Policy Makermentioning
confidence: 99%