Skip to main content

Digital Rights Management with Right Delegation for Home Networks

  • Conference paper
Book cover Information Security and Cryptology – ICISC 2006 (ICISC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4296))

Included in the following conference series:

Abstract

The purpose of digital rights management (DRM) is to protect the copyrights of content providers and to enable only designated user to access digital contents. For a user to share the contents among all his devices in the home network, several domain-based approaches that group multiple devices into a domain have been proposed. In these approaches, however, each device in a domain has equivalent rights on all contents although certain contents require an access control between the devices. In this paper, a new DRM system for home networks is presented. This system enables access control on the contents by a right delegation strategy with proxy certificates. Moreover, it also provides additional functionalities, including restricted sharing and temporal sharing of contents, which are necessary for ordinary scenarios in home networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aegis DRM, http://www.aegisdrm.com/

  2. Bloom, J., Cox, I., Kalker, T., Linnartz, J., Miller, M., Traw, C.: Copy protection for DVD video. Proc. IEEE 87(7), 1267–1276 (1999)

    Article  Google Scholar 

  3. Content scrambling system, http://www.dvdcca.org/css/

  4. IBM. IBM Electronic Media Management System (EMMS), http://www-306.ibm.com/software/data/emms

  5. Stevenson, F.A.: Cryptanalysis of Contents Scrambling System, DVD-Copy.com (November 1999)

    Google Scholar 

  6. Call for proposals for content protection & copy management technologies (July 2001)

    Google Scholar 

  7. Real Networks. Helin DRM

    Google Scholar 

  8. van den Heuval, S.A.F.A., Jonker, W., Kamperman, F.L.A.J., Lenoir, P.J.: Secure Content Management in Authorized Domains. In: Proc. IBC 2002, September 2002, pp. 467–474 (2002)

    Google Scholar 

  9. Fraunhofer Institute. Light Weight DRM (LWDRM), http://www.lwdrm.com/

  10. OMA. Open mobile alliance, http://www.openmobilealliance.org

  11. Popescu, B.C., Crispo, B., Kamperman, F.L.A.J., Tanenbaum, A.S.: A DRM Security Architecture for Home Networks. In: Proc. of 4th ACM Workshop on Digital Rights Management (October 2004)

    Google Scholar 

  12. Sovio, S., Asokan, N., Nyberg, K.: Defining Authorization Domains Using Virtual Devices. In: SAINT Workshops 2003, pp. 331–336 (2003)

    Google Scholar 

  13. Michiels, S., Verslype, K., Joosen, W., Decker, B.D.: Towards a Software Architecture for DRM. In: ACM DRM 2005, pp. 65–74 (2005)

    Google Scholar 

  14. Smartright techinical white paper (Janurary 2003), http://www.smartright.org/images/SMR/content/SmartRight_tech_whitepaper_jan28.pdf

  15. Neuman, B.: Proxy-based authorization and accounting for distributed systems. In: Proc. 13th International Conference of Distributed Computing Systems, pp. 283–291 (1993)

    Google Scholar 

  16. xCP Cluster Protocol, http://www.almaden.ibm.com/software/ds/ContentAssurance/papers/xCP_DVB.pdf

  17. Holtz, R., et al.: Guide to Home Networks, http://www.ce.org/networkguide/default.asp

  18. Perlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile, RFC 3820 (2004)

    Google Scholar 

  19. Housley, et al.: Internet X.509 Public Key Infrastructure, RFC 2459 , The Internet Engineering Task Force (IETF) (1999), Available at: http://www.ietf.org/rfc/rfc2459.txt

  20. The Globus Alliance, Globus Project, http://www.globus.org

  21. Microsoft Corporation. Windows Media DRM (WMDRM) (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, H., Lee, Y., Chung, B., Yoon, H., Lee, J., Jung, K. (2006). Digital Rights Management with Right Delegation for Home Networks. In: Rhee, M.S., Lee, B. (eds) Information Security and Cryptology – ICISC 2006. ICISC 2006. Lecture Notes in Computer Science, vol 4296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11927587_20

Download citation

  • DOI: https://doi.org/10.1007/11927587_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49112-5

  • Online ISBN: 978-3-540-49114-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics