Security Through DRM In Systems

نویسنده

  • Ramandeep Kaur
چکیده

Digital Rights Management (DRM) is a technology that is being developed as a protection against the illegal distribution of copyrighted online material such as music or documents. DRM is a technology that lets rights holders safely distribute and sell their content online in a digital form. Different security mechanisms using DRM are introduced: EMMS by IBM Corp., Rights System by InterTrust Corp., Windows Media Rights Manager by Microsoft Corp., TPM by TCG and DReaM by Sun.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Aspects of Drm Systems

Acquiring digital media over the Internet has become commonplace in recent years. Companies are looking into ways to sell their content (music, movies, etc.) over the Internet without the buyer being able to further distribute the work. Digital Rights Management (DRM) systems address this; their main goal is to enable authorised users to access a version of digital content on the terms for whic...

متن کامل

Trusted License Distribution System Based on IPSec VPN for Mobile DRM

With the rapid development of mobile applications, DRM systems used for mobile terminals and wireless environment become popular. However, the present DRM schemes are not fit for mobile applications because of the new security problems in wireless environment and the limitations of mobile terminals. In this paper, a trusted license distribution system based on IPSec VPN and its correlative issu...

متن کامل

Verification and Application of Conceptual Model and Security Requirements on Practical Drm Systems in E-learning

The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The expl...

متن کامل

Identity Based Drm System with Total Anonymity and Device Flexibility Using Ibes

Most of the Digital Rights Management (DRM) systems fail to cover all requirements like user anonymity, user fairness, security and others. Device based DRM systems, adopted by most providers, lack user fairness and mostly follow proprietary formats. On the contrary, Smart Card DRM systems satisfy user anonymity and fairness, but have certain vulnerabilities, as identified in this paper. We pro...

متن کامل

Core Security Requirements of DRM Systems

The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider and the user, each having their own incentives to use the system. Proper use of the system implies that these incentives can only be met if certain security requirements are fulfilled. Quite some attention in literature has been devoted to specific security aspect...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007