Oasis extensible access control markup language. Website, 2008. http://www.oasis-open.org/committees/xacml/.
Open mobile alliance digital rights management working group. Website, 2008. http://www.openmobilealliance.org/Technical/DRM.aspx.
TCG TPM specification version 1.2. Website, 2008. https://www. trustedcomputinggroup.org/specs/TPM/.
A. Berthold, M. Alam, R. Breu, M. Hafner, A. Pretschner, J.-P. Seifert, and X. Zhang. A technical architecture for enforcing usage control requirements in service-oriented architectures. In SWS '07: Proceedings of the 2007 ACM workshop on Secure web services, pages 18-25, New York, NY, USA, 2007. ACM.
J. S. Erickson. Fair use, DRM, and trusted computing. Commun. ACM, 46(4):34-39, 2003.
B. Katt, X. Zhang, R. Breu, M. Hafner, and J.-P. Seifert. Beyond UCON core models with general obligation model and continuity-enhanced policy enforcement engine. ACM Symposium on Access Control Models and Technologies, 2008.
B. A. LaMacchia. Key challenges in DRM: An industry perspective. In Digital Rights Management Workshop, pages 51-60, 2002.
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. SIGOPS Oper. Syst. Rev., 42(4):315-328, 2008.
S. K. Nair, P. N. D. Simpson, B. Crispo, and A. S. Tanenbaum. A virtual machine based information flow control system for policy enforcement. Electronic Notes in Theoretical Computer Science, 197(1):3-16, 2008.
J. Park and R. Sandhu. The UCONABC usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128-174, 2004.
C. Schaefer. Usage control reference monitor architecture. Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. Third International Workshop on, July.
X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu. Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur., 11(1):1-36, 2008.
X. Zhang, J.-P. Seifert, and R. Sandhu. Security enforcement model for distributed usage control. sutc, 0:10-18, 2008.