The Unified Modeling Language user guide
The Unified Modeling Language user guide
Digital Rights Management: Business and Technology
Digital Rights Management: Business and Technology
Models and Languages for Digital Rights
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 9 - Volume 9
Digital Rights Management (DRM) Architectures
Digital Rights Management (DRM) Architectures
Proceedings of the 4th ACM workshop on Digital rights management
DRM interoperability analysis from the perspective of a layered framework
Proceedings of the 5th ACM workshop on Digital rights management
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Multimedia Encryption and Watermarking (Multimedia Systems and Applications)
Multimedia Encryption and Watermarking (Multimedia Systems and Applications)
Persistent access control: a formal model for drm
Proceedings of the 2007 ACM workshop on Digital Rights Management
Threat analysis of online health information system
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
An introduction to interoperable digital rights locker
Proceedings of the tenth annual ACM workshop on Digital rights management
An analysis of interoperability between licenses
Proceedings of the tenth annual ACM workshop on Digital rights management
A geometric approach for efficient licenses validation in DRM
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
An approach to the formal analysis of license interoperability
Computers and Electrical Engineering
Hi-index | 0.00 |
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This complexity induces also that there is not one unique modeling of DRM. Each model should help to compare different DRM systems and easily highlight the differences and the similarities between them. One of the weaknesses of the current models is that none puts specifically the focus on the most important characteristics of DRM: protection of content and rights management. We propose a four-layer model that complements traditional ones. Using trust layer, rights management layer, rights enforcement layer, and content protection layer, this model is security oriented. It is suitable to describe any content protections such as DRM, conditional access, copy protection or even pre-recorded content protection systems.