Next Generation Access Control
- Tags
- security
An alternative to ACM that focuses more on [see page 29, controlling the use] of documents and mitigating piracy. For example locking people from sharing purchased books with others or adding DRM.
Techniques for DRM include:
Technique | Description |
---|---|
Watermarking | Adding an indicator to content to track changes. |
Monitoring | Using software/hardware that reports usage to owners. |
Challenges and Concerns
- How to implement UA efficiently?
- How to implement UA in an open environment?
- Right to read