Skip to main content

Security Specification for Conversion Technologies of Heterogeneous DRM Systems

  • Conference paper
  • 1162 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5451))

Abstract

Digital Right Management (DRM) can be used to prohibit illegal reproduction, and redistribution of digital content, to protect copyrights. However, current DRM systems are incompatible and lack of interoperability which exchange of data, different platform, designed and protected by different content providers. To overcome these drawbacks, three ways of interoperability are full-formation interoperability, connected interoperability, configuration-driven interoperability, allowing consumers to use the purchased content in their equipments of choice. In this paper, we study on the security specification of configuration-driven interoperability for heterogeneous DRM systems, using the Common Criteria. Then, we study security boundary, security environment, security objectives, and rationale of an CTHDS_PP(Conversion Technologies of Heterogeneous DRM Systems Protection Profile) to find important security features. The CTHDS_PP gives a discussion covered the current security problems to conversion technologies and lists threats to solve those problems. Moreover, this CTHDS_PP can be used for potential developers and system integrators, and reviewed and assessed by evaluators.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Microsoft Windows Media Rights Manager, http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx

  2. iTunes FairPlay, http://www.apple.com/lu/support/itunes/authetication.html

  3. PachyDRM, http://pachydrm.com

  4. Secure Digital Container, http://www.digicont.com

  5. International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 1 (2005)

    Google Scholar 

  6. International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 2 (2005)

    Google Scholar 

  7. International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 3 (2005)

    Google Scholar 

  8. International Standard ISO/IEC 15408, Common Methodology for Information Technology Security Evaluation, Evaluation methodology (2005)

    Google Scholar 

  9. http://digital-lifestyles.info/drm-interchange-alive-and-living-in-korea/

  10. http://technomart.etri.re.kr

  11. Herrmann, D.S.: Using the Common Criteria for IT Security Evaluation. Auerbach publications (2003)

    Google Scholar 

  12. Open Mobile Alliance, DRM Architecture Approved Version 2.0 (2006)

    Google Scholar 

  13. Apple Inc. Common Criteria Certification: Apple’s Ongoing Commitment to Security, Whitepaper

    Google Scholar 

  14. Jaafari, A.B.: Common Criteria for Information Technology Security Evaluation Mobile Phone Digital Rights Management Protection Profile, Polytechnic University (2004)

    Google Scholar 

  15. Jaafari, A.B.: Protection Profile Reuse: Case Study of the reusability of the Smart Card Protection Profile for producing the Mobile Phone Digital Rights Management Protction Profile, Polytechnic University (2004)

    Google Scholar 

  16. Naini, R.S., Sheppard, N.P., Uehara, T.: Import/Export in Digital Rights Management. In: ACM Workshop on Digital Rights Management (2004)

    Google Scholar 

  17. Koenen, R.H., Lacy, J., Mackay, M., Mitchell, S.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE 92, 883–897 (2004)

    Article  Google Scholar 

  18. Bradley, W., Maher, D.: The NEMO P2P service orchestration framework. In: Proc. 37th Annu. Hawaii Int. Conf. System Sciences (2004)

    Google Scholar 

  19. Torres, V., Serrao, C., Dias, M.S., Delgado, J.: Open DRM and the Future of Media. IEEE Computer Society, Los Alamitos (2008)

    Google Scholar 

  20. Rump, N.: Can digital rights management be standardized? IEEE Signal Processing Magazine (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jo, H., Jeon, W., Lee, Y., Kim, S., Won, D. (2009). Security Specification for Conversion Technologies of Heterogeneous DRM Systems. In: Bao, F., Li, H., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2009. Lecture Notes in Computer Science, vol 5451. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00843-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00843-6_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00842-9

  • Online ISBN: 978-3-642-00843-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics