The art of computer programming, volume 3: (2nd ed.) sorting and searching
The art of computer programming, volume 3: (2nd ed.) sorting and searching
Proceedings of the 7th ACM conference on Computer and communications security
Fast Algorithms for Mining Association Rules in Large Databases
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Digital rights management for content distribution
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach
Data Mining and Knowledge Discovery
Import/export in digital rights management
Proceedings of the 4th ACM workshop on Digital rights management
Modeling and implementation of digital rights
Journal of Systems and Software
MAFIA: A Maximal Frequent Itemset Algorithm
IEEE Transactions on Knowledge and Data Engineering
Towards multilateral secure digital rights distribution infrastructures
Proceedings of the 5th ACM workshop on Digital rights management
Summarizing Evolving Data Streams using Dynamic Prefix Trees
WI '07 Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence
Mining top-k frequent patterns in the presence of the memory constraint
The VLDB Journal — The International Journal on Very Large Data Bases
A Web Ontology for Copyright Contract Management
International Journal of Electronic Commerce
Digital rights management architectures
Computers and Electrical Engineering
Multi-level Frequent Pattern Mining
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Next Generation IPTV Services and Technologies
Next Generation IPTV Services and Technologies
Replay Attack of Dynamic Rights within an Authorised Domain
SECURWARE '09 Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies
Mining frequent itemsets from uncertain data
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Aggregate licenses validation for digital rights violation detection
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
A policy language for distributed usage control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
Digital rights management (DRM) systems are employed to securely deliver the digital contents from owners/creators to consumers. Often multiple middle level distributors are involved in the distribution process. Initially, the owner issues redistribution licenses to its distributors. The distributors in turn using their received redistribution licenses can issue new redistribution licenses to other distributors and usage licenses to consumers. However, distributors may be involved in violation of the rights given to them in redistribution licenses. Thus, for the rights violation detection, these newly issued licenses must be validated against the received redistribution licenses. The validation becomes complex when there exist multiple redistribution licenses for contents. Then it requires validation using an exponential number of validation inequalities and each inequality may contain up to an exponential number of summation terms. This makes the validation process computationally intensive and necessitates to do the validation efficiently. Thus, in this paper, we propose a method to reduce the validation time by deriving a relationship between different validation inequalities and then designing a data structure to do efficient validation using the derived relationship. The theoretical and experimental analysis show that the proposed method can do the validation efficiently as compared to the other existing approaches for the validation.