Brain Dump

Next Generation Access Control

Tags
security

An alternative to ACM that focuses more on [see page 29, controlling the use] of documents and mitigating piracy. For example locking people from sharing purchased books with others or adding DRM.

Techniques for DRM include:

TechniqueDescription
WatermarkingAdding an indicator to content to track changes.
MonitoringUsing software/hardware that reports usage to owners.

Challenges and Concerns

  • How to implement UA efficiently?
  • How to implement UA in an open environment?
  • Right to read