skip to main content
10.1145/1029146.1029151acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

DRM as a layered system

Published:25 October 2004Publication History

ABSTRACT

The current landscape for digital rights management(DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the DRM industry in 2004 is somewhat reminiscent of the telecommunications industry in the late 1980's. At that time various networking technologies were available, and what was needed was a technology that could integrate existing networks and provide various services to users. The OSI layered framework and the TCP/IP communications protocol suite provided a solution to this situation. The OSI model divides the process of digital data communications into layers. Likewise, in this paper we divide the process of DRM into layers in which various services are offered to the users of digital content at each layer. Three blocks of layers have been identified. The upper layers deal with the end-to-end functions of the application, the middle layers deal with rights expression and interpretation, and the lower layers ensure rights enforcement. This paper describes how responsibilities might be distributed among the various layers, and considers where in these layers it would be appropriate to define protocols and standards.

References

  1. J. Alvear. Realnetworks, Microsoft face off on DRM. streamingmedia.com, June 22, 2001.Google ScholarGoogle Scholar
  2. H. Alverstrand. The role of the standards process in shaping the internet. Proceeding of the IEEE, 92(9):1371--1374, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  3. ArtistScope. http://www.artistscope.com/copysafe/about.html.Google ScholarGoogle Scholar
  4. A. Carroll, M. Juarez, J. Polk, and T. Leininger. Microsoft palladium: A business overview. Technical report, Microsoft Content Security Business Unit, June 2002.Google ScholarGoogle Scholar
  5. V. G. Cerf. On the evolution of internet technologies. Proceeding of the IEEE, 92(9):1360--1370, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  6. D. D. Clark. The design philosophy of the DARPA internet protocols. In ACM SIGCOMM, pages 106--114, Stanford, CA, Aug. 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Clark. IBM closes cryptolopes unit, 2002. http://news.com.com/2100-1001-206465.html?legacy=cnet.Google ScholarGoogle Scholar
  8. Contentguard. XrML 2.0 Technical Overview, March 2002.Google ScholarGoogle Scholar
  9. I. J. Cox, M. L. Miller, and J. A. Bloom. Digital Watermarking. Morgan Kaufmann, San Francisco, CA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. The DRM vendor graveyard. http://www.info-mech.com/drm_vendor_graveyard.html.Google ScholarGoogle Scholar
  11. J. Feigenbaum, D. Boneh, and R. Venkatesan. Report on the DIMACS workshop on management of digital intellectual property. Technical report, DIMACS, Apr. 2000. http://dimacs.rutgers.edu/Workshops/Management2/.Google ScholarGoogle Scholar
  12. H. Goldstein, G. L. Heileman, M. D. Heileman, T. Nicolakis, C. E. Pizano, B. Prumo, and M. Webb. Protecting digital archives at the greek orthodox archdiocese of america. In Proceedings of the Third ACM Workshop on Digital Rights Management, pages 13--26, Washington, DC, Oct. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Y. Halpern and V. Weissman. A formal foundation for XrML licenses. In Proceedings of the 17th IEEE Computer Security Foundations Workshop, pages 251--265, Asilomar, CA, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. L. Heileman and C. E. Pizano. An overview of digital rights enforcement and the MediaRights technology. Technical report, Elisar Software Corporation, Apr. 2001.Google ScholarGoogle Scholar
  15. R. Iannella. Open digital rights language (ODRL), Version 0.7. http://odrl.net/ODRL-07.pdf, Oct. 2000.Google ScholarGoogle Scholar
  16. M. A. Kaplan. IBM cryptolopes, superdistribution and digital rights management, 1996. http://researchweb.watson.ibm.com/people/k/kaplan/cryptolope-docs/crypap.html.Google ScholarGoogle Scholar
  17. U. Kohl, J. Lotspiech, and M. A. Kaplan. Safeguarding digital library contents and users: Protecting documents rather than channels. D-Lib Magazine, Sept. 1997.Google ScholarGoogle ScholarCross RefCross Ref
  18. M. Krochmal. Alchemedia protects pictures with plug-ins. TechWeb News, Oct. 28, 1999. http://www.techweb.com/wire/story/TWB19991028S0012.Google ScholarGoogle Scholar
  19. M. McKenzie. Copyright protection: Understanding your options. Technical Report 4, The Seybold Report on Internet Publishing, Dec. 1996.Google ScholarGoogle Scholar
  20. MPEG-21 Committee. Information technology --- multimedia framework (MPEG-21) --- part 1: Vision, technologies and strategy. Working document: ISO/IEC JTC1/SC29/WG11 N 4333, July 2001.Google ScholarGoogle Scholar
  21. M. L. Nelson, B. Argue, M. Efron, S. Denn, and M. Pattuelli. A survey of complex object technologies for digital libraries. Technical report, NASA TM-2001-211426, 2001.Google ScholarGoogle Scholar
  22. B. C. Popescu, F. L. A. J. Kamperman, B. Crispo, and A. S. Tanenbaum. A DRM security architecture for home networks. To appear in DRM'04, Washington, D.C., Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Pucella and V. Weissman. A logic for reasoning about digital rights. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, pages 282--294, Nova Scotia, Canada, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Rosenblatt, B. Trippe, and S. Mooney. Digital Rights Mangement: Business and Technology. M&T Books, New York, NY, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions in Computer Systems, 2(4):277--288, Nov. 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. F. B. Schneider, editor. Trust in Cyberspace. National Academy Press, Washington, D.C., 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Schneier. The fallacy of trusted client software (cryptorhythms column). Information Security Magazine, Aug. 2000.Google ScholarGoogle Scholar
  28. N. Shivakumar. Detecting Digital Copyright Violations on the Internet. PhD thesis, Stanford University, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. O. Sibert, D. Bernstein, and D. Van Wie. Securing the content, not the wire, for information commerce. Technical report, InterTrust Technologies Corp., 1996.Google ScholarGoogle Scholar
  30. A. S. Tanenbaum. Computer Networks. Prentice Hall, 4th edition, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. The eXtensible Media Commerce Language (XMCL). http://www.xmcl.org.Google ScholarGoogle Scholar

Index Terms

  1. DRM as a layered system

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            DRM '04: Proceedings of the 4th ACM workshop on Digital rights management
            October 2004
            120 pages
            ISBN:1581139691
            DOI:10.1145/1029146

            Copyright © 2004 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 25 October 2004

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader