ACM Transactions on Computer Systems (TOCS)
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency
IEEE Transactions on Software Engineering
Digital Rights Management: Business and Technology
Digital Rights Management: Business and Technology
Broadcast Encryption's Bright Future
Computer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
A Class of Flexible and Efficient Key Management Protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Defining Authorization Domains Using Virtual Devices
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Privacy in an Identity-based DRM System
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Proceedings of the 4th ACM workshop on Digital rights management
Towards a secure and interoperable DRM architecture
Proceedings of the ACM workshop on Digital rights management
Digital rights management using a mobile phone
Proceedings of the ninth international conference on Electronic commerce
Proceedings of the 2007 ACM workshop on Digital Rights Management
DRM domain authentication using electronic payment systems
Proceedings of the 10th international conference on Electronic commerce
Design rules for interoperable domains: controlling content dilution and content sharing
Proceedings of the 8th ACM workshop on Digital rights management
Problem Analyses and Recommendations in DRM Security Policies
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
An efficient contents sharing method for DRM
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A ticket based digital rights management model
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Distributed management of OMA DRM domains
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Scalable DRM system for media portability
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Digital rights management using a master control device
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A robust and flexible digital rights management system for home networks
Journal of Systems and Software
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
A rights management approach to protection of privacy in a cloud of electronic health records
Proceedings of the 11th annual ACM workshop on Digital rights management
Effective content tracking for digital rights management in digital libraries
ECDL'06 Proceedings of the 10th European conference on Research and Advanced Technology for Digital Libraries
DRM architecture for mobile VOD services
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Identity-Based DRM: personal entertainment domain
Transactions on Data Hiding and Multimedia Security I
Digital rights management with right delegation for home networks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Constructing a wrapper-based DRM system for digital content protection in digital libraries
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
Secure interoperable digital content distribution mechanisms in a multi-domain architecture
Multimedia Tools and Applications
An efficient and secure rights sharing method for DRM system against replay attack
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A secure DRM framework for user's domain and key management
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establish dynamic groups, so called "Authorized Domains", where legally acquired copyrighted content can seamlessly move from device to device. This greatly improves the end-user experience, preserves "fair use" expectations, and enables the development of new business models by content providers. Key to our design is a hybrid compliance checking and group establishment protocol, based on pre-distributed symmetric keys, with minimal reliance on public key cryptographic operations. Our architecture does not require continuous network connectivity between devices, and allows for efficient and flexible key updating and revocation.