{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:52Z","timestamp":1750307692133,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456455.1456467","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"71-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Flexible and secure enterprise rights management based on trusted virtual domains"],"prefix":"10.1145","author":[{"given":"Yacine","family":"Gasmi","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Patrick","family":"Stewin","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Martin","family":"Unger","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Rani","family":"Husseiki","sequence":"additional","affiliation":[{"name":"Sirrix AG security technologies, Bochum, Germany"}]},{"given":"Christian","family":"St\u00fcble","sequence":"additional","affiliation":[{"name":"Sirrix AG security technologies, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adobe Systems Inc. Adobe LiveCycle Policy Server: Document-level persistent protection and dynamic control for multiformat enterprise rights management. http:\/\/www.adobe.com\/de\/products\/server\/policy\/pdfs\/ps_datasheet.pdf 2006.  Adobe Systems Inc. Adobe LiveCycle Policy Server: Document-level persistent protection and dynamic control for multiformat enterprise rights management. http:\/\/www.adobe.com\/de\/products\/server\/policy\/pdfs\/ps_datasheet.pdf 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"Information Security South Africa","author":"Arnab A.","year":"2005","unstructured":"A. Arnab and A. Hutchison . Requirement analysis of enterprise DRM systems . In Information Security South Africa , 2005 . A. Arnab and A. Hutchison. Requirement analysis of enterprise DRM systems. In Information Security South Africa, 2005."},{"key":"e_1_3_2_1_3_1","unstructured":"Authentica Inc. Page Recall: The Key to Document Protection. http:\/\/www.adobe.com\/de\/products\/server\/policy\/pdfs\/ps_datasheet.pdf 2002.  Authentica Inc. Page Recall: The Key to Document Protection. http:\/\/www.adobe.com\/de\/products\/server\/policy\/pdfs\/ps_datasheet.pdf 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.7"},{"key":"e_1_3_2_1_5_1","first-page":"21","volume-title":"USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium","author":"Berger S.","year":"2006","unstructured":"S. Berger , R. C-aceres, K. A. Goldman , R. Perez , R. Sailer , and L. van Doorn . vTPM : virtualizing the trusted platform module . In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium , pages 21 -- 21 , Berkeley, CA, USA , 2006 . USENIX Association. S. Berger, R. C-aceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 21--21, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341312.1341321"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315275"},{"key":"e_1_3_2_1_10_1","first-page":"61","volume-title":"Proceedings of the Digital Rights Management Workshop 2002","volume":"2696","author":"Dodis Y.","year":"2002","unstructured":"Y. Dodis and N. Fazio . Public key broadcast encryption for stateless receivers . In Proceedings of the Digital Rights Management Workshop 2002 , volume 2696 of LNCS, pages 61 -- 80 , 2002 . Y. Dodis and N. Fazio. Public key broadcast encryption for stateless receivers. In Proceedings of the Digital Rights Management Workshop 2002, volume 2696 of LNCS, pages 61--80, 2002."},{"key":"e_1_3_2_1_11_1","volume-title":"Towards Trustworthy Systems with Open Standards and Trusted Computing","author":"Secure Computing European Multilaterally","year":"2008","unstructured":"European Multilaterally Secure Computing Base (EMSCB) Project . Towards Trustworthy Systems with Open Standards and Trusted Computing , 2008 . http:\/\/www.emscb.de. European Multilaterally Secure Computing Base (EMSCB) Project. Towards Trustworthy Systems with Open Standards and Trusted Computing, 2008. http:\/\/www.emscb.de."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266859"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314363"},{"key":"e_1_3_2_1_14_1","unstructured":"E. Gaudet. DRM vs. ERM: battle to control data. http:\/\/www.networkworld.com\/news\/tech\/2006\/121806techupdate.html December 2006.  E. Gaudet. DRM vs. ERM: battle to control data. http:\/\/www.networkworld.com\/news\/tech\/2006\/121806techupdate.html December 2006."},{"key":"e_1_3_2_1_15_1","volume-title":"Trusted Virtual Domains: Toward Secure Distributed Services. In 1st IEEE Workshop on Hot Topics in System Dependability","author":"Griffin J. L.","year":"2005","unstructured":"J. L. Griffin , T. Jaeger , R. Perez , R. Sailer , L. van Doorn , , and R. C-aceres . Trusted Virtual Domains: Toward Secure Distributed Services. In 1st IEEE Workshop on Hot Topics in System Dependability , June 2005 . J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, , and R. C-aceres. Trusted Virtual Domains: Toward Secure Distributed Services. In 1st IEEE Workshop on Hot Topics in System Dependability, June 2005."},{"key":"e_1_3_2_1_16_1","first-page":"3","volume-title":"VM'04: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium","author":"Haldar V.","year":"2004","unstructured":"V. Haldar , D. Chandra , and M. Franz . Semantic remote attestation: a virtual machine directed approach to trusted computing . In VM'04: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium , pages 3 -- 3 , Berkeley, CA, USA , 2004 . USENIX Association. V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: a virtual machine directed approach to trusted computing. In VM'04: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium, pages 3--3, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_18_1","volume-title":"Towards Multi-Layer Trusted Virtual Domains","author":"Katsuno Y.","year":"2006","unstructured":"Y. Katsuno , M. Kudo , P. Perez , and R. Sailer . Towards Multi-Layer Trusted Virtual Domains , 2006 . Y. Katsuno, M. Kudo, P. Perez, and R. Sailer. Towards Multi-Layer Trusted Virtual Domains, 2006."},{"volume-title":"2nd Workshop on Advances in Trusted Computing.","author":"The","key":"e_1_3_2_1_19_1","unstructured":"The 2nd Workshop on Advances in Trusted Computing. The 2nd Workshop on Advances in Trusted Computing."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224075"},{"key":"e_1_3_2_1_21_1","volume-title":"http:\/\/www.tml.tkk.fi\/Publications\/C\/18\/likitalo.pdf","author":"Likitalo V.","year":"2005","unstructured":"V. Likitalo . Remote Attestation and Peer-to- Peer Net . http:\/\/www.tml.tkk.fi\/Publications\/C\/18\/likitalo.pdf , 2005 . V. Likitalo. Remote Attestation and Peer-to-Peer Net. http:\/\/www.tml.tkk.fi\/Publications\/C\/18\/likitalo.pdf, 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151454.1151500"},{"volume-title":"Whitepaper","year":"2003","key":"e_1_3_2_1_23_1","unstructured":"Microsoft. Microsoft Windows Rights Management Services for Windows Server 2003 -- Helping Organizations Safeguard Digital Information from Unauthorized Use . Whitepaper , 2003 . Microsoft. Microsoft Windows Rights Management Services for Windows Server 2003 -- Helping Organizations Safeguard Digital Information from Unauthorized Use. Whitepaper, 2003."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/784591.784757"},{"key":"e_1_3_2_1_25_1","volume-title":"Trusted Computing Platforms: TCPA Technology in Context","author":"Pearson S.","year":"2002","unstructured":"S. Pearson . Trusted Computing Platforms: TCPA Technology in Context . Prentice Hall PTR , Upper Saddle River, NJ, USA, 2002 . S. Pearson. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2002."},{"key":"e_1_3_2_1_26_1","volume-title":"DRM, Trusted Computing and Operating System Architecture","author":"Reid J.","year":"2005","unstructured":"J. Reid and W. Caelli . DRM, Trusted Computing and Operating System Architecture . 2005 . J. Reid and W. Caelli. DRM, Trusted Computing and Operating System Architecture. 2005."},{"key":"e_1_3_2_1_27_1","volume-title":"October","author":"Sadeghi A.","year":"2007","unstructured":"A. Sadeghi , M. Wolf , C. Stuble , N. Asokan , and J. Ekberg . Enabling Fairer Digital Rights Management with Trusted Computing , October 2007 . A. Sadeghi, M. Wolf, C. Stuble, N. Asokan, and J. Ekberg. Enabling Fairer Digital Rights Management with Trusted Computing, October 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.13"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251391"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128820"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064005"},{"key":"e_1_3_2_1_32_1","volume-title":"The Second Annual Workshop on Economics and Information Security","author":"Schechter S.","year":"2003","unstructured":"S. Schechter , R. Greenstadt , and M. Smith . Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment . In The Second Annual Workshop on Economics and Information Security , May 2003 . S. Schechter, R. Greenstadt, and M. Smith. Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment. In The Second Annual Workshop on Economics and Information Security, May 2003."},{"key":"e_1_3_2_1_33_1","unstructured":"E. Sebes and M. Stamp. Solvable Problems in Enterprise Digital Rights Management. http:\/\/home.earthlink.net\/~mstamp1\/papers\/DRMsebes.pdf 2004.  E. Sebes and M. Stamp. Solvable Problems in Enterprise Digital Rights Management. http:\/\/home.earthlink.net\/~mstamp1\/papers\/DRMsebes.pdf 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/998684.1006928"},{"key":"e_1_3_2_1_35_1","volume-title":"TCG Specification Architecture Overview","author":"Trusted Computing Group","year":"2003","unstructured":"Trusted Computing Group . TCG Specification Architecture Overview . Trusted Computing Group : https:\/\/www.trustedcomputinggroup.org\/groups\/TCG_1_3_Architecture_Overview.pdf, Mar. 2003 . Specification Revision 1.3 28th March 2007. Trusted Computing Group. TCG Specification Architecture Overview. Trusted Computing Group: https:\/\/www.trustedcomputinggroup.org\/groups\/TCG_1_3_Architecture_Overview.pdf, Mar. 2003. Specification Revision 1.3 28th March 2007."},{"key":"e_1_3_2_1_36_1","volume-title":"November","author":"Trusted Computing Group","year":"2003","unstructured":"Trusted Computing Group . TPM Main Specification v1.2. https:\/\/www.trustedcomputinggroup.org , November 2003 . Trusted Computing Group. TPM Main Specification v1.2. https:\/\/www.trustedcomputinggroup.org, November 2003."},{"key":"e_1_3_2_1_37_1","volume-title":"Display-Only File Server: A Solution against Information Theft Due to Insider Attack","author":"Yu Y.","year":"2004","unstructured":"Y. Yu and T. Chiueh . Display-Only File Server: A Solution against Information Theft Due to Insider Attack . October 2004 . Y. Yu and T. Chiueh. Display-Only File Server: A Solution against Information Theft Due to Insider Attack. October 2004."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 3rd ACM workshop on Scalable trusted computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456467","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456455.1456467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":36,"alternative-id":["10.1145\/1456455.1456467","10.1145\/1456455"],"URL":"https:\/\/doi.org\/10.1145\/1456455.1456467","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}