Abstract
The purpose of digital rights management (DRM) is to protect the copyrights of content providers and to enable only designated user to access digital contents. For a user to share the contents among all his devices in the home network, several domain-based approaches that group multiple devices into a domain have been proposed. In these approaches, however, each device in a domain has equivalent rights on all contents although certain contents require an access control between the devices. In this paper, a new DRM system for home networks is presented. This system enables access control on the contents by a right delegation strategy with proxy certificates. Moreover, it also provides additional functionalities, including restricted sharing and temporal sharing of contents, which are necessary for ordinary scenarios in home networks.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aegis DRM, http://www.aegisdrm.com/
Bloom, J., Cox, I., Kalker, T., Linnartz, J., Miller, M., Traw, C.: Copy protection for DVD video. Proc. IEEE 87(7), 1267–1276 (1999)
Content scrambling system, http://www.dvdcca.org/css/
IBM. IBM Electronic Media Management System (EMMS), http://www-306.ibm.com/software/data/emms
Stevenson, F.A.: Cryptanalysis of Contents Scrambling System, DVD-Copy.com (November 1999)
Call for proposals for content protection & copy management technologies (July 2001)
Real Networks. Helin DRM
van den Heuval, S.A.F.A., Jonker, W., Kamperman, F.L.A.J., Lenoir, P.J.: Secure Content Management in Authorized Domains. In: Proc. IBC 2002, September 2002, pp. 467–474 (2002)
Fraunhofer Institute. Light Weight DRM (LWDRM), http://www.lwdrm.com/
OMA. Open mobile alliance, http://www.openmobilealliance.org
Popescu, B.C., Crispo, B., Kamperman, F.L.A.J., Tanenbaum, A.S.: A DRM Security Architecture for Home Networks. In: Proc. of 4th ACM Workshop on Digital Rights Management (October 2004)
Sovio, S., Asokan, N., Nyberg, K.: Defining Authorization Domains Using Virtual Devices. In: SAINT Workshops 2003, pp. 331–336 (2003)
Michiels, S., Verslype, K., Joosen, W., Decker, B.D.: Towards a Software Architecture for DRM. In: ACM DRM 2005, pp. 65–74 (2005)
Smartright techinical white paper (Janurary 2003), http://www.smartright.org/images/SMR/content/SmartRight_tech_whitepaper_jan28.pdf
Neuman, B.: Proxy-based authorization and accounting for distributed systems. In: Proc. 13th International Conference of Distributed Computing Systems, pp. 283–291 (1993)
xCP Cluster Protocol, http://www.almaden.ibm.com/software/ds/ContentAssurance/papers/xCP_DVB.pdf
Holtz, R., et al.: Guide to Home Networks, http://www.ce.org/networkguide/default.asp
Perlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile, RFC 3820 (2004)
Housley, et al.: Internet X.509 Public Key Infrastructure, RFC 2459 , The Internet Engineering Task Force (IETF) (1999), Available at: http://www.ietf.org/rfc/rfc2459.txt
The Globus Alliance, Globus Project, http://www.globus.org
Microsoft Corporation. Windows Media DRM (WMDRM) (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, H., Lee, Y., Chung, B., Yoon, H., Lee, J., Jung, K. (2006). Digital Rights Management with Right Delegation for Home Networks. In: Rhee, M.S., Lee, B. (eds) Information Security and Cryptology – ICISC 2006. ICISC 2006. Lecture Notes in Computer Science, vol 4296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11927587_20
Download citation
DOI: https://doi.org/10.1007/11927587_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49112-5
Online ISBN: 978-3-540-49114-9
eBook Packages: Computer ScienceComputer Science (R0)