Utility-Analytic Approach and Swarm Simulations of Security Policies in Digital Rights Management.
Zhiyong ZhangXinliang LiuJiexin PuPublished in: J. Multim. (2010)
Keyphrases
- security policies
- digital rights management
- access control
- digital rights
- security requirements
- security management
- access control systems
- digital content
- access control policies
- network security
- network management
- access rights
- distributed systems
- role based access control
- access control mechanism
- databases
- information security