Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Serrão, C., Torres, V., Delgado, J. & Dias, M. (2006). Interoperability mechanisms for registration and authentication on different open DRM platforms. International Journal of Computer Science and Network Security. 6 (12), 291-303
Exportar Referência (IEEE)
C. J. Serrão et al.,  "Interoperability mechanisms for registration and authentication on different open DRM platforms", in Int. Journal of Computer Science and Network Security, vol. 6, no. 12, pp. 291-303, 2006
Exportar BibTeX
@article{serrão2006_1716160128254,
	author = "Serrão, C. and Torres, V. and Delgado, J. and Dias, M.",
	title = "Interoperability mechanisms for registration and authentication on different open DRM platforms",
	journal = "International Journal of Computer Science and Network Security",
	year = "2006",
	volume = "6",
	number = "12",
	pages = "291-303",
	url = "http://ijcsns.org/"
}
Exportar RIS
TY  - JOUR
TI  - Interoperability mechanisms for registration and authentication on different open DRM platforms
T2  - International Journal of Computer Science and Network Security
VL  - 6
IS  - 12
AU  - Serrão, C.
AU  - Torres, V.
AU  - Delgado, J.
AU  - Dias, M.
PY  - 2006
SP  - 291-303
SN  - 1738-7906
UR  - http://ijcsns.org/
AB  - The DRM interoperability problem is a very complex problem. Even big software companies have already admitted that DRM as it is today is too complex ? complex for end-users, complex for content providers and complex for content handling devices manufactures. There are different approaches to deal with this problem and there are different levels to address the problem. This article addresses the DRM interoperability issues from a security point of view, and as an example the authors take two open-specification DRM architectures ? MIPAMS and OpenSDRM ? to identify a strategy to interoperate some of the basic security mechanisms. In this article the authors will concentrate in the DRM components and user’s registration, authentication and verification process and will derive a mechanism to handle and support both.
ER  -