Approximation algorithms for facility location problems (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Greedy strikes back: improved facility location algorithms
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
Communications of the ACM - Digital rights management
Modeling and implementation of digital rights
Journal of Systems and Software
A DRM Architecture to Distribute and Protect Digital Contents Using Digital Licenses
AICT-SAPIR-ELETE '05 Proceedings of the Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop
Privacy-enhanced superdistribution of layered content with trusted access control
Proceedings of the ACM workshop on Digital rights management
Towards a secure and interoperable DRM architecture
Proceedings of the ACM workshop on Digital rights management
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Digital rights management architectures
Computers and Electrical Engineering
Secure multimedia content delivery with multiparty multilevel DRM architecture
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Privacy preserving DRM solution with content classification and superdistribution
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Privacy preserving multiparty multilevel DRM architecture
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Survey on anonymous communications in computer networks
Computer Communications
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Access policy based key management in multi-level multi-distributor DRM architecture
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Secure anonymous communication with conditional traceability
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
A privacy preserving content distribution mechanism for drm without trusted third parties
ICME '11 Proceedings of the 2011 IEEE International Conference on Multimedia and Expo
Unlinkable content playbacks in a multiparty DRM system
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Hi-index | 0.00 |
Traditional Digital Rights Management (DRM) systems are one level distributor system which involve single distributor. However, for a flexible and scalable content distribution mechanism, it is necessary to accommodate multiple distributors in DRM model so that different strategies can be implemented in diverse geographical areas. We develop a multiparty multilevel DRM model using facility location and design a prototype DRM system that provides transparent and flexible content distribution mechanism while maintaining the users' privacy along with accountability in the system.