The design philosophy of the DARPA internet protocols
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Open implementation design guidelines
ICSE '97 Proceedings of the 19th international conference on Software engineering
Component software: beyond object-oriented programming
Component software: beyond object-oriented programming
Software architecture in practice
Software architecture in practice
Communications of the ACM - Digital rights management
Fair use, DRM, and trusted computing
Communications of the ACM - Digital rights management
Dynamic Self-Checking Techniques for Improved Tamper Resistance
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Cryptography and competition policy: issues with 'trusted computing'
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Virtualization Considered Harmful: OS Design Directions for Well-Conditioned Services
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
Proceedings of the 4th ACM workshop on Digital rights management
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Towards a secure and interoperable DRM architecture
Proceedings of the ACM workshop on Digital rights management
A four-layer model for security of digital rights management
Proceedings of the 8th ACM workshop on Digital rights management
Protection Profile for Connected Interoperable DRM Framework
Information Security Applications
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Identity-based uploading content scheme in DRM
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
DRM architecture for mobile VOD services
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
A flexible and open DRM framework
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Digital rights management with right delegation for home networks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
An efficient and secure rights sharing method for DRM system against replay attack
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
AtDRM: a DRM architecture with rights transfer and revocation capability
Proceedings of the 6th ACM India Computing Convention
Hi-index | 0.00 |
The domain of digital rights management (DRM) is currently lacking a generic architecture that supports interoperability and reuse of specific DRM technologies. This lack of architectural support is a serious drawback in light of the rapid evolution of a complex domain like DRM. It is highly unlikely that a single DRM technology or standard will be able to support the diversity of devices, users, platforms, and media, or the wide variety of system requirements concerning security, flexibility, and efficiency. This paper analyses state-of-the-art DRM technologies and extracts from them high level usage scenarios according to content consumers, producers, and publishers. In addition, the key services are identified both from a functional and security perspective. Identifying key DRM services and locating them in an overall structure brings us one step closer to a software architecture for DRM. Having available a software architecture should help the DRM community in reasoning about DRM systems, and in achieving reuse and interoperability of multiple domain-specific DRM technologies and standards.