A domain specific language for usage management

Christopher C. Lamb, Pramod A. Jamkhedkar, Mathew P. Bohnsack, Viswanath Nandina, Gregory L. Heileman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we describe the development of a domain specific language (DSL) for expressing usage management policies and associating those policies with managed artifacts. We begin by framing a model for the language, including generalized use cases, a domain model, a general supported life-cycle, and specific extension requirements. We then develop the language from that model, demonstrating key syntactic elements and highlighting the technology behind the language while tracing features back to the initial model. We then demonstrate how the DSL supports common usage management and DRM-centric environments, including creative commons, the extensible rights markup language (XrML), and the open digital rights language (ODRL).

Original languageEnglish (US)
Title of host publicationDRM'11 - Proceedings of the 11th Annual ACM Workshop on Digital Rights Management
Pages51-62
Number of pages12
DOIs
StatePublished - 2011
Externally publishedYes
Event11th Annual ACM Workshop on Digital Rights Management, DRM'11, Held in Conjunction with the 18th ACM Conference on Computer and Communications Security, CSS 2011 - Chicago, IL, United States
Duration: Oct 21 2011Oct 21 2011

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference11th Annual ACM Workshop on Digital Rights Management, DRM'11, Held in Conjunction with the 18th ACM Conference on Computer and Communications Security, CSS 2011
Country/TerritoryUnited States
CityChicago, IL
Period10/21/1110/21/11

Keywords

  • Access control
  • DRM
  • Interoperability
  • Usage management

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A domain specific language for usage management'. Together they form a unique fingerprint.

Cite this