Feigenbaum et al., 2001 - Google Patents
Privacy engineering for digital rights management systemsFeigenbaum et al., 2001
View PDF- Document ID
- 13249341699346957875
- Author
- Feigenbaum J
- Freedman M
- Sander T
- Shostack A
- Publication year
- Publication venue
- ACM Workshop on Digital Rights Management
External Links
Snippet
Internet-based distribution of mass-market content provides great opportunities for producers, distributors, and consumers, but it may seriously threaten users' privacy. Some of the paths to loss of privacy are quite familiar (eg, mining of credit-card data), but some are …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Feigenbaum et al. | Privacy engineering for digital rights management systems | |
| US20230394469A1 (en) | Systems and Methods for Instant NFTs and Protection Structure, Detection of Malicious Code within Blockchain Smart Contracts, Tokens with Transfer Limitations, Mirror Tokens and Parallel Addresses, Smart Contract Risk Scoring Method, and Cross-Device Digital Rights Management | |
| US11296895B2 (en) | Systems and methods for preserving privacy and incentivizing third-party data sharing | |
| Lam et al. | Do you trust your recommendations? An exploration of security and privacy issues in recommender systems | |
| US7496540B2 (en) | System and method for securing digital content | |
| RU2541878C2 (en) | Techniques for monetising anonymised context | |
| US10931650B1 (en) | Apparatus and method for building, extending and managing interactions between digital identities and digital identity applications | |
| US20030120928A1 (en) | Methods for rights enabled peer-to-peer networking | |
| US20130332987A1 (en) | Data collection and analysis systems and methods | |
| US20090031426A1 (en) | Method and System for Protected Distribution of Digitalized Sensitive Information | |
| US20050038707A1 (en) | Methods and apparatus for enabling transactions in networks | |
| US20120246065A1 (en) | Techniques for offering context to service providers utilizing incentives | |
| US20030158960A1 (en) | System and method for establishing a privacy communication path | |
| US20110247029A1 (en) | Techniques for offering context to service providers utilizing incentives | |
| Ullah et al. | Privacy in targeted advertising: A survey | |
| US20110246213A1 (en) | Techniques for offering context to service providers utilizing an approval service and incentives utlizing online secure profile storage | |
| JP2004032220A (en) | Access right management device using electronic ticket | |
| EP1290599A1 (en) | A system and method for establishing a privacy communication path | |
| US20110246283A1 (en) | Approval service based techniques for offering context to service providers utilizing incentives | |
| US20110247030A1 (en) | Incentives based techniques for offering context to service providers utilizing syncronizing profile stores | |
| Patel et al. | A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems | |
| WO2002051057A2 (en) | Methods for rights enabled peer-to-peer networking | |
| Pearson | Trusted agents that enhance user privacy by self-profiling | |
| Feigenbaum et al. | Economic barriers to the deployment of existing privacy technologies (position paper) | |
| Xiang | Analysis of positive incentives for protecting secrets in digital rights management |