Protecting Software Code by Guards
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Proceedings of the 4th ACM workshop on Digital rights management
Mobile DRM: usability out the door?
Telematics and Informatics - Special issue: Copyright: rights-holders, users and innovators
DRMs, fair use and users' experience of sharing music
Proceedings of the 5th ACM workshop on Digital rights management
Communications of the ACM - Privacy and security in highly dynamic systems
A trustworthy end-to-end key management scheme for digital rights management
MULTIMEDIA '06 Proceedings of the 14th annual ACM international conference on Multimedia
A secure and traceable E-DRM system based on mobile device
Expert Systems with Applications: An International Journal
Problem Analyses and Recommendations in DRM Security Policies
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Digital contents interoperability between diverse DRM systems in mobile environment
CSECS'08 Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing
Caching Content under Digital Rights Management
Approximation and Online Algorithms
Reusing web contents: a DOM approach
Software—Practice & Experience
Hash-Based Key Management Schemes for MPEG4-FGS
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Service-oriented grid computing system for digital rights management (GC-DRM)
Expert Systems with Applications: An International Journal
Secure multimedia content delivery with multiparty multilevel DRM architecture
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Pricing schemes for digital content with DRM mechanisms
Decision Support Systems
Fingerprinting compressed multimedia signals
IEEE Transactions on Information Forensics and Security
DRM based on rights claim tags for large-scale live streaming
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A ticket based digital rights management model
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Privacy preserving multiparty multilevel DRM architecture
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
REDMAN: An optimistic replication middleware for read-only resources in dense MANETs
Pervasive and Mobile Computing
A digital rights management architecture for multimedia in P2P
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A digital rights management model for healthcare
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Threshold based group-oriented nominative proxy signature scheme for digital rights management
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Using social factors in digital rights management
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
A control point for reducing root abuse of file-system privileges
Proceedings of the 17th ACM conference on Computer and communications security
Using digital rights management for securing data in a medical research environment
Proceedings of the tenth annual ACM workshop on Digital rights management
Usage control enforcement - a survey
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
A rights management approach to protection of privacy in a cloud of electronic health records
Proceedings of the 11th annual ACM workshop on Digital rights management
Access policy based key management in multi-level multi-distributor DRM architecture
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Protecting intellectual property rights and the JPEG2000 coding standard
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
A flexible DRM system considering ubiquitous environment
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
User centric intelligent IPMPS in ubi-home
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
An adaptive approach to hardware alteration for digital rights management
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Photo agent: an agent-based p2p sharing system
AP2PC'04 Proceedings of the Third international conference on Agents and Peer-to-Peer Computing
Image classification for digital archive management
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
Constructing a wrapper-based DRM system for digital content protection in digital libraries
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
Lost in translation: understanding the possession of digital things in the cloud
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Mobile music distribution: a multichannel approach
Advances in Multimedia
Survey: Usage control in computer security: A survey
Computer Science Review
A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
An efficient and secure rights sharing method for DRM system against replay attack
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Data usage control enforcement in distributed systems
Proceedings of the third ACM conference on Data and application security and privacy
A chapter preloading mechanism for e-reader in mobile environment
Information Sciences: an International Journal
Computation time efficient approach for licenses validation in DRM systems
Multimedia Tools and Applications
AtDRM: a DRM architecture with rights transfer and revocation capability
Proceedings of the 6th ACM India Computing Convention
Decision-making in rights exporting: the integrated process
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Information Security Perspective of a Learning Management System: An Exploratory Study
International Journal of Knowledge Society Research
URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited
International Journal of Interdisciplinary Telecommunications and Networking
Hi-index | 0.00 |
Transferring the traditional business model for selling digital goods linked to physical media to the online world leads to the need for a system to protect digital intellectual property. Digital Rights Management(DRM) is a system to protect high-value digital assets and control the distribution and usage of those digital assets. This paper presents a review of the current state of DRM, focusing on security technologies, underlying legal implications and main obstacles to DRM deployment with the aim of providing a better understanding of what is currently happening to content management on a legal and technological basis and well prepared for grasping future prospects.