The authors assemble new, breakthrough technologies that focus on the fundamentals of rights mana... more The authors assemble new, breakthrough technologies that focus on the fundamentals of rights management, namely content identifiers, stakeholder identifiers, metadata associations, authoritative assertions, and the use of trusted, multi-party, distributed, dynamic data management systems to create and share Rights Management Information. By providing trustworthy Rights Information, the provenance, authenticity, and compliance with agreements enable the automated distribution of content and associated rights compensation. The approach is minimally prescriptive but maximally supportive and inclusive. It allows many solutions to be used while enabling numerous ways in which individuals and organisations can cooperate in originating, enriching, governing, and distributing trusted Information, helping streamline current processes and trigger innovative businesses.
Page 1. Managing Trust in Medical Information Systems Matt Blaze Joan Feigenbaum Jack Lacy AT&... more Page 1. Managing Trust in Medical Information Systems Matt Blaze Joan Feigenbaum Jack Lacy AT&T Labs Murray Hill, NJ 07974 {mab , jf , lacy}@research . att . ... The first three policy assertions are those of Bob, who is inclined to place a lot of trust in primary care physicians. ...
International Conference on Consumer Electronics, 1998
We describe requirements and system architectures for a new generation of Internet appliances tha... more We describe requirements and system architectures for a new generation of Internet appliances that are designed to allow consumers to locate, purchase, play, and share live and recorded music distributed over the Internet. These new portable devices can be used both on-line and off-line. We describe the advantages associated with this new technology for consumers, producers, and distributors, as well as features that encourage producers and distributors to make music available in new ways.
2007 4th IEEE Consumer Communications and Networking Conference, 2007
The use of Digital Rights Management (DRM) technologies for the enforcement of digital media usag... more The use of Digital Rights Management (DRM) technologies for the enforcement of digital media usage models is currently subject of a heated debate. Consumer organizations (1) and national governments (2) claim that DRM technology inter- feres with basic personal rights, such as the right to make copies for personal use or the right to use content on any platform of
W e identify the trust management problem as a distinct and important component of security in ne... more W e identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
The MPEG-4 standard specifies a multimedia bit stream syntax and a set of tools and interfaces fo... more The MPEG-4 standard specifies a multimedia bit stream syntax and a set of tools and interfaces for designers and builders of a wide variety of multimedia. Each of these applications has a set of requirements regarding protection of the information it manages. These applications can produce conflicting content management and protection requirements. We describe a framework for MPEG-4 Intellectual Property Management and Protection that provides applications designers with the control necessary to manage these requirements. We also provide three examples of applications that use this framework.
We identify the trust management problem as a distinct and important component of security in net... more We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and ofien do so in a manner that is appropriate to only one application. This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called Policy Maker, that will facilitate the development of security features in a wide range of network services.
Recent advances in audio compression technology coupled with trends toward higher network bandwid... more Recent advances in audio compression technology coupled with trends toward higher network bandwidth, lower memory costs and lower storage costs indicate that the obstacles to music distribution on the Internet will soon be overcome. Because it provides benefits to consumers and to music content owners alike, networked music distribution may become one of the first compelling Internet consumer services. At
The authors assemble new, breakthrough technologies that focus on the fundamentals of rights mana... more The authors assemble new, breakthrough technologies that focus on the fundamentals of rights management, namely content identifiers, stakeholder identifiers, metadata associations, authoritative assertions, and the use of trusted, multi-party, distributed, dynamic data management systems to create and share Rights Management Information. By providing trustworthy Rights Information, the provenance, authenticity, and compliance with agreements enable the automated distribution of content and associated rights compensation. The approach is minimally prescriptive but maximally supportive and inclusive. It allows many solutions to be used while enabling numerous ways in which individuals and organisations can cooperate in originating, enriching, governing, and distributing trusted Information, helping streamline current processes and trigger innovative businesses.
Page 1. Managing Trust in Medical Information Systems Matt Blaze Joan Feigenbaum Jack Lacy AT&... more Page 1. Managing Trust in Medical Information Systems Matt Blaze Joan Feigenbaum Jack Lacy AT&T Labs Murray Hill, NJ 07974 {mab , jf , lacy}@research . att . ... The first three policy assertions are those of Bob, who is inclined to place a lot of trust in primary care physicians. ...
International Conference on Consumer Electronics, 1998
We describe requirements and system architectures for a new generation of Internet appliances tha... more We describe requirements and system architectures for a new generation of Internet appliances that are designed to allow consumers to locate, purchase, play, and share live and recorded music distributed over the Internet. These new portable devices can be used both on-line and off-line. We describe the advantages associated with this new technology for consumers, producers, and distributors, as well as features that encourage producers and distributors to make music available in new ways.
2007 4th IEEE Consumer Communications and Networking Conference, 2007
The use of Digital Rights Management (DRM) technologies for the enforcement of digital media usag... more The use of Digital Rights Management (DRM) technologies for the enforcement of digital media usage models is currently subject of a heated debate. Consumer organizations (1) and national governments (2) claim that DRM technology inter- feres with basic personal rights, such as the right to make copies for personal use or the right to use content on any platform of
W e identify the trust management problem as a distinct and important component of security in ne... more W e identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
The MPEG-4 standard specifies a multimedia bit stream syntax and a set of tools and interfaces fo... more The MPEG-4 standard specifies a multimedia bit stream syntax and a set of tools and interfaces for designers and builders of a wide variety of multimedia. Each of these applications has a set of requirements regarding protection of the information it manages. These applications can produce conflicting content management and protection requirements. We describe a framework for MPEG-4 Intellectual Property Management and Protection that provides applications designers with the control necessary to manage these requirements. We also provide three examples of applications that use this framework.
We identify the trust management problem as a distinct and important component of security in net... more We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and ofien do so in a manner that is appropriate to only one application. This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called Policy Maker, that will facilitate the development of security features in a wide range of network services.
Recent advances in audio compression technology coupled with trends toward higher network bandwid... more Recent advances in audio compression technology coupled with trends toward higher network bandwidth, lower memory costs and lower storage costs indicate that the obstacles to music distribution on the Internet will soon be overcome. Because it provides benefits to consumers and to music content owners alike, networked music distribution may become one of the first compelling Internet consumer services. At
Uploads
Drafts by Jack Lacy
Papers by Jack Lacy