Special Issue on Enabling Security Technologies for Digital Rights Management
نویسندگان
چکیده
Modern advancements in communication infrastructure, signal processing, and digital storage technologies have enabled pervasive digital media distribution. Digital distribution allows the introduction of flexible, cost-effective business models that are advantageous to multimedia commerce transactions. The digital nature of the information also enables individuals to manipulate, duplicate, or access media beyond the conditions agreed upon for a given transaction. The latter issue has resulted in tremendous concern by content vendors. The large-scale success of legal digital media distribution rests, in part, on its ability to provide legitimate services to all parties. This requires allowing consumers convenient use of digital media while equitably compensating other members of the distribution chain such as content creators, aggregators and vendors. Digital rights management (DRM) has been proposed to address these issues. DRM is the digital management of user rights to content. It links specific user rights to media in order to provide persistent governance of user activities such as viewing, duplication, and access. Ideally, a DRM system balances information protection, usability, and cost to provide a beneficial environment for all parties; this includes expanded functionality, cost effectiveness and new marketing opportunities. Overall, management is achieved through the interaction of effective economic models, social values, legal policy, and technology. At the technological level, DRM systems incorporate encryption, copy control, tagging, tracing, conditional access, and media identification. The challenge is to engineer secure systems in an environment of dynamic applications and standards for which appropriate business models and consumer expectations are only now being identified. Furthermore, controversy over the ability of DRM to create atypical licensing policies and provide more control to content vendors than traditionally accepted practices has stirred much debate on the technology. The goal of this Special Issue is to provide some principal tutorial papers and novel research contributions in the area of DRM technologies. Our objectives are to present an
منابع مشابه
Analyzing research trends on digital rights management
Background and Aim: Current study has investigated the status of research about digital rights management and to identify the gaps and research trends in the field. Methods: Using a narrative review approach major databases such as Elsevier, Springer, Emerald, ProQuest, etc. were searched for the term “Digital Rights Management”. Results: Following the preliminary analysis, 80 research sources ...
متن کاملGuest Editorial: Special issue on Next Generation Networks and Systems Security
With the emergence of the next generation networking and system technologies such as cloud computing, software defined networking, and the Internet of things, significant changes have been brought to how networks are designed, deployed, and managed. The research work of in these areas has been important and highly active in the past few years. In this context, security has been one of the major...
متن کاملUsing Digital Right Management technology in IRANDOC ETD System
Background and Aim: Easing the probability of violation of intellectual property rights and unauthorized access of digital resources is one of the most important consequences of information and communication technologies like Internet. The purpose of this research is to identify the state of Using Digital Right Management technology in IRANDOC ETD system. Method: This research is an applied re...
متن کاملAudio watermarking and partial encryption
Today two technologies are applied when protecting audio data in digital rights management (DRM) environments: Encryption and digital watermarking. Encryption renders the data unreadable for those not in the possession of a key enabling decryption. This is especially of interest for access control, as usage of the audio data is restricted to those owning a key. Digital watermarking adds additio...
متن کاملSpecial Section on Information and Communication System Security
1. Scope The major topics include, but are not limited to: ‐ Security Technologies on (Network, AdHoc Network, P2P, Sensor Network, RFID, Wireless Network, Mobile Network, Home Network, NGN, and Future Internet) ‐ Access Control, Content Security, DRM, CDN, Privacy Protection, E-Commerce, PKI, Security Architecture, Security Protocol, Security Implementation, Technologies, Secure OS, Security E...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Proceedings of the IEEE
دوره 92 شماره
صفحات -
تاریخ انتشار 2004