Reference Hub1
A Hardware Approach for Trusted Access and Usage Control

A Hardware Approach for Trusted Access and Usage Control

Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
Copyright: © 2009 |Pages: 23
ISBN13: 9781605662626|ISBN10: 1605662623|EISBN13: 9781605662633
DOI: 10.4018/978-1-60566-262-6.ch009
Cite Chapter Cite Chapter

MLA

Anciaux, Nicolas, et al. "A Hardware Approach for Trusted Access and Usage Control." Handbook of Research on Secure Multimedia Distribution, edited by Shiguo Lian and Yan Zhang, IGI Global, 2009, pp. 157-179. https://doi.org/10.4018/978-1-60566-262-6.ch009

APA

Anciaux, N., Bouganim, L., & Pucheral, P. (2009). A Hardware Approach for Trusted Access and Usage Control. In S. Lian & Y. Zhang (Eds.), Handbook of Research on Secure Multimedia Distribution (pp. 157-179). IGI Global. https://doi.org/10.4018/978-1-60566-262-6.ch009

Chicago

Anciaux, Nicolas, Luc Bouganim, and Philippe Pucheral. "A Hardware Approach for Trusted Access and Usage Control." In Handbook of Research on Secure Multimedia Distribution, edited by Shiguo Lian and Yan Zhang, 157-179. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-262-6.ch009

Export Reference

Mendeley
Favorite

Abstract

This chapter advocates the convergence between Access Control (AC) models, focusing on the granularity of sharing, and Digital Right Management (DRM) models focusing on conditional authorizations and obligations. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must be equally protected against any form of tampering and piracy. We capitalize on the democratization of powerful secure chip platforms (e.g., smart cards, secure USB dongles) which can be plugged in a variety of client devices (PC, PDA, cell phones, consumer electronics) to design a new architecture of a trusted access and usage control system. The benefits of the proposed architecture are exemplified in two different contexts: a fair DRM scenario and a healthcare scenario.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.