{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:31Z","timestamp":1750308031807,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314276.1314286","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"41-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Persistent access control"],"prefix":"10.1145","author":[{"given":"Alapan","family":"Arnab","sequence":"first","affiliation":[{"name":"University of Cape Town, Rondebosch, South Africa"}]},{"given":"Andrew","family":"Hutchison","sequence":"additional","affiliation":[{"name":"University of Cape Town, Rondebosch, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"unstructured":"eXtensible rights Markup Language (XrML) 2.0 Specification 2001.  eXtensible rights Markup Language (XrML) 2.0 Specification 2001.","key":"e_1_3_2_1_1_1"},{"volume-title":"Houghton Mifflin Company","year":"2000","author":"AMERICAN HERITAGE DICTIONARIES Ed.","key":"e_1_3_2_1_2_1"},{"volume-title":"Proceedings of the 2nd International ODRL Workshop","year":"2005","author":"ARNAB A.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1102546.1102548"},{"unstructured":"ARNAB A. AND HUTCHISON A. DRM use license negotiations using ODRL v2.0 2006. Submitted to the discussions in the 9th General Assembly of the Digital Media Project (DMP) Laussanne Switzerland.  ARNAB A. AND HUTCHISON A. DRM use license negotiations using ODRL v2.0 2006. Submitted to the discussions in the 9th General Assembly of the Digital Media Project (DMP) Laussanne Switzerland.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1179509.1179514"},{"unstructured":"BECHTOLD S. Digital Rights Management in the United States and Europe. IVir Buma\/Stemra - Copyright and the Music Industry: Digital Dilemmas.  BECHTOLD S. Digital Rights Management in the United States and Europe. IVir Buma\/Stemra - Copyright and the Music Industry: Digital Dilemmas.","key":"e_1_3_2_1_7_1"},{"unstructured":"BELL D. E. AND LAPADULA L. J. Secure computer system: Unified exposition and multics interpretation. Mtr-2997 rev. 1 The MITRE Corporation. Online last accessed: 2006-05-06. URL: http:\/\/csrc.nist.gov\/publications\/history\/bell76.pdf.  BELL D. E. AND LAPADULA L. J. Secure computer system: Unified exposition and multics interpretation. Mtr-2997 rev. 1 The MITRE Corporation. Online last accessed: 2006-05-06. URL: http:\/\/csrc.nist.gov\/publications\/history\/bell76.pdf.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"229","volume":"4","author":"BELL D. E.","year":"1973","journal-title":"Journal of Computer Security"},{"volume-title":"Library of Congress, USA","year":"2004","author":"COYLE K.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","first-page":"230","volume-title":"Proceedings of the 6th World Multiconference on Systemics, Cybernetics, and Informatics","author":"DAI J.","year":"2002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/641205.641232"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/300830.300834"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/270152.270165"},{"volume-title":"Proceedings of the 15th NIST-NSA National Computer Security Conference","year":"1992","author":"FERRAIOLO D. F.","key":"e_1_3_2_1_15_1"},{"volume-title":"OASIS, 2003","year":"2003","author":"GODIK S.","key":"e_1_3_2_1_16_1"},{"unstructured":"GONZLEZ R. G. A Semantic Web Approach to Digital Rights Management. PhD thesis 2005. Online: http:\/\/rhizomik.net\/%7Eroberto\/thesis\/Thesis.pdf.  GONZLEZ R. G. A Semantic Web Approach to Digital Rights Management. PhD thesis 2005. Online: http:\/\/rhizomik.net\/%7Eroberto\/thesis\/Thesis.pdf.","key":"e_1_3_2_1_17_1"},{"volume-title":"Peter Lang","year":"2006","author":"GUTH S.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/947380.947392"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.5555\/1009380.1009679"},{"volume-title":"IPR Systems Pty Ltd.","year":"2002","author":"IANNELLA R.","key":"e_1_3_2_1_21_1"},{"unstructured":"IANNELLA R. AND GUTH S. Eds. ODRL V2.0 - Model Semantics. 04 May 2006. URL: http:\/\/odrl.net\/2.0\/WD-ODRL-Model.html last accessed: 2006-06-05.  IANNELLA R. AND GUTH S. Eds. ODRL V2.0 - Model Semantics. 04 May 2006. URL: http:\/\/odrl.net\/2.0\/WD-ODRL-Model.html last accessed: 2006-06-05.","key":"e_1_3_2_1_22_1"},{"unstructured":"IANNELLA R. AND GUTH S. Eds. Open Digital Rights Language (ODRL) Version 2 Requirements. 13 Feb 2005. URL: http:\/\/odrl.net\/2.0\/v2req.html.  IANNELLA R. AND GUTH S. Eds. Open Digital Rights Language (ODRL) Version 2 Requirements. 13 Feb 2005. URL: http:\/\/odrl.net\/2.0\/v2req.html.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.5555\/882493.884380"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1029146.1029151"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1179509.1179522"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/352600.352613"},{"volume-title":"A. Implementing Copyright Limitations in Rights Expression Languages. In Proceedings of the 2002 ACM workshop on Digital Rights Management","year":"2002","author":"MULLIGAN D.","key":"e_1_3_2_1_28_1"},{"unstructured":"NATIONAL COMPUTER SECURITY CENTER. A guide to understanding discretionary access control in trusted systems. NCSC-TG-003 September 1987.  NATIONAL COMPUTER SECURITY CENTER. A guide to understanding discretionary access control in trusted systems. NCSC-TG-003 September 1987.","key":"e_1_3_2_1_29_1"},{"unstructured":"PUCELLA R. AND WEISSMAN V. A logic for reasoning about digital rights. CoRR cs.CR\/0405066 (2004).  PUCELLA R. AND WEISSMAN V. A logic for reasoning about digital rights. CoRR cs.CR\/0405066 (2004).","key":"e_1_3_2_1_30_1"},{"unstructured":"PUCELLA R. AND WEISSMAN V. A formal foundation for ODRL. CoRR cs.LO\/0601085 (2006).  PUCELLA R. AND WEISSMAN V. A formal foundation for ODRL. CoRR cs.LO\/0601085 (2006).","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","volume-title":"Trusted Computing and Operating System Architecture. In Conferences in Research and Practice in Information Techology","volume":"44","author":"REID J. F.","year":"2005"},{"unstructured":"RHODES T. Chapter 15 - Mandatory Access Control. FreeBSD Handbook FreeBSD.org. Online last accessed: 2006-05-06. URL: http:\/\/www.freebsd.org\/doc\/handbook\/mac.html.  RHODES T. Chapter 15 - Mandatory Access Control. FreeBSD Handbook FreeBSD.org. Online last accessed: 2006-05-06. URL: http:\/\/www.freebsd.org\/doc\/handbook\/mac.html.","key":"e_1_3_2_1_33_1"},{"volume-title":"Giantsteps Media Technology Strategies","year":"2003","author":"ROSENBLATT B.","key":"e_1_3_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/2.485845"},{"volume-title":"IFIP\/GI WOrkshop on Virtual Goods","year":"2004","author":"SCHMIDT A. U.","key":"e_1_3_2_1_36_1"},{"volume-title":"LTD","year":"2002","author":"SHARROCK R.","key":"e_1_3_2_1_37_1"},{"doi-asserted-by":"crossref","unstructured":"SHIREY R. RFC 2828 - Internet security glossary 2000. URL: http:\/\/www.faqs.org\/rfcs\/rfc2828.html.   SHIREY R. RFC 2828 - Internet security glossary 2000. URL: http:\/\/www.faqs.org\/rfcs\/rfc2828.html.","key":"e_1_3_2_1_38_1","DOI":"10.17487\/rfc2828"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1016\/0167-4048(94)90049-3"},{"volume-title":"Proceedings of the Fourteenth European Conference on Artificial Intelligence (ECAI--2000)","year":"2000","author":"WOOLDRIDGE M.","key":"e_1_3_2_1_40_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS07","name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Alexandria Virginia USA"},"container-title":["Proceedings of the 2007 ACM workshop on Digital Rights Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314276.1314286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:14:06Z","timestamp":1750259646000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314286"}},"subtitle":["a formal model for drm"],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":40,"alternative-id":["10.1145\/1314276.1314286","10.1145\/1314276"],"URL":"https:\/\/doi.org\/10.1145\/1314276.1314286","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}