The design philosophy of the DARPA internet protocols
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Digital watermarking
Trust in Cyberspace
Computer Networks
Digital Rights Management: Business and Technology
Digital Rights Management: Business and Technology
A Logic for Reasoning about Digital Rights
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Detecting digital copyright violations on the internet
Detecting digital copyright violations on the internet
Protecting digital archives at the Greek Orthodox Archdiocese of America
Proceedings of the 3rd ACM workshop on Digital rights management
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
A DRM security architecture for home networks
Proceedings of the 4th ACM workshop on Digital rights management
Fairer usage contracts for DRM
Proceedings of the 5th ACM workshop on Digital rights management
DRM interoperability analysis from the perspective of a layered framework
Proceedings of the 5th ACM workshop on Digital rights management
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
The problem with rights expression languages
Proceedings of the ACM workshop on Digital rights management
On implementing mpeg-21 intellectual property management and protection
Proceedings of the 2007 ACM workshop on Digital Rights Management
Persistent access control: a formal model for drm
Proceedings of the 2007 ACM workshop on Digital Rights Management
Proceedings of the 2007 ACM workshop on Digital Rights Management
A four-layer model for security of digital rights management
Proceedings of the 8th ACM workshop on Digital rights management
A formal conceptual model for rights
Proceedings of the 8th ACM workshop on Digital rights management
Digital rights management architectures
Computers and Electrical Engineering
On the operational semantics of rights expression languages
Proceedings of the nineth ACM workshop on Digital rights management
DRM based on rights claim tags for large-scale live streaming
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
An interoperable usage management framework
Proceedings of the tenth annual ACM workshop on Digital rights management
A domain specific language for usage management
Proceedings of the 11th annual ACM workshop on Digital rights management
Effective content tracking for digital rights management in digital libraries
ECDL'06 Proceedings of the 10th European conference on Research and Advanced Technology for Digital Libraries
DRM architecture for mobile VOD services
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Constructing a wrapper-based DRM system for digital content protection in digital libraries
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
Hi-index | 0.00 |
The current landscape for digital rights management(DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the DRM industry in 2004 is somewhat reminiscent of the telecommunications industry in the late 1980's. At that time various networking technologies were available, and what was needed was a technology that could integrate existing networks and provide various services to users. The OSI layered framework and the TCP/IP communications protocol suite provided a solution to this situation. The OSI model divides the process of digital data communications into layers. Likewise, in this paper we divide the process of DRM into layers in which various services are offered to the users of digital content at each layer. Three blocks of layers have been identified. The upper layers deal with the end-to-end functions of the application, the middle layers deal with rights expression and interpretation, and the lower layers ensure rights enforcement. This paper describes how responsibilities might be distributed among the various layers, and considers where in these layers it would be appropriate to define protocols and standards.