Security Specification for Conversion Technologies of Heterogeneous DRM Systems

  • Authors:
  • Heasuk Jo;Woongryul Jeon;Yunho Lee;Seungjoo Kim;Dongho Won

  • Affiliations:
  • Information Security Group, Sungkyunkwan University, Gyeonggi-do, Korea 440-746;Information Security Group, Sungkyunkwan University, Gyeonggi-do, Korea 440-746;Information Security Group, Sungkyunkwan University, Gyeonggi-do, Korea 440-746;Information Security Group, Sungkyunkwan University, Gyeonggi-do, Korea 440-746;Information Security Group, Sungkyunkwan University, Gyeonggi-do, Korea 440-746

  • Venue:
  • ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Digital Right Management (DRM) can be used to prohibit illegal reproduction, and redistribution of digital content, to protect copyrights. However, current DRM systems are incompatible and lack of interoperability which exchange of data, different platform, designed and protected by different content providers. To overcome these drawbacks, three ways of interoperability are full-formation interoperability, connected interoperability, configuration-driven interoperability, allowing consumers to use the purchased content in their equipments of choice. In this paper, we study on the security specification of configuration-driven interoperability for heterogeneous DRM systems, using the Common Criteria. Then, we study security boundary, security environment, security objectives, and rationale of an CTHDS_PP(Conversion Technologies of Heterogeneous DRM Systems Protection Profile) to find important security features. The CTHDS_PP gives a discussion covered the current security problems to conversion technologies and lists threats to solve those problems. Moreover, this CTHDS_PP can be used for potential developers and system integrators, and reviewed and assessed by evaluators.