Sciweavers

20 search results - page 4 / 4
» drm 2005
Sort
View
ECWEB
2005
Springer
149views ECommerce» more  ECWEB 2005»
13 years 10 months ago
Architecture of a Semantic XPath Processor. Application to Digital Rights Management
This work describes a novel strategy for designing an XPath processor that acts over an RDF mapping of XML. We use a modelmapping approach to represent instances of XML and XML Sch...
Rubén Tous, Roberto García, Eva Rodr...
DRM
2005
Springer
13 years 10 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
DATE
2005
IEEE
102views Hardware» more  DATE 2005»
13 years 11 months ago
Modeling of a Reconfigurable OFDM IP Block Family For an RF System Simulator
The idea of design domain specific Mother Model of IP block family as a base of modeling of system integration is presented here. A common reconfigurable Mother Model for ten diff...
Hannu Heusala, Jussi Liedes
DRMTICS
2005
Springer
13 years 10 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
SAC
2005
ACM
13 years 10 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla