Enter your keyword

2-s2.0-84937250237

[vc_empty_space][vc_empty_space]

Digital rights management with ABAC implementation to improve enterprise document protection

Ubaidillaha, Budimanbadarsyah I.a, Rosmansyah Y.a

a School of Electrical and Informatics Engineering, Bandung Institute of Technology, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2014 IEEE.Digital rights management has become a solution for copyright owners to protect the content in any digital object that transacted over the internet or digital storage from the risk of modifications such save a copy, edit, and illegal transfer from the irresponsible or piracy[16]. In DRM, content owners may limit the use of documents through the provision of encryption, copy control modifications, restrictions on access right and apply digital watermark so that the object has ability to protect the contents from theft and data piracy or unauthorized distribution[1]. In an organization, distribution of documents data/information is important because it may affects the performance of the company. Distribution which based on RBAC (role-based access control) with tight role permission will not effectively used when documents are distributed to 2-3 slices of different divisions interest, because it can add a bureaucracy that could hurt the company. To that end, each document should be regarded as an object/attribute (attribute-based access control (ABAC)) so that each person has the freedom to use the document while still providing protection from the contents of the documents were distributed[15]. In this paper the author tries to give an overview of the implementation of ABAC into DRM to see the extent to which access control can provide a sense of comfort and effectiveness in the use of an organization’s documents while providing protection of copyrights contained in this document.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Access rights,Attribute based access control,Copy control,Digital Objects,Digital right management,Digital Rights Management,Document protection,Role-based Access Control[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Access Control,Attribute Based Access Control,Digital Right Management,Internet of Think[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/TSSA.2014.7065920[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]