skip to main content
10.1145/1314276.1314287acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

The drm game

Published:29 October 2007Publication History

ABSTRACT

In this paper we cast DRM in a setting that allows us to model a number of current approaches as games. The DRM game is partitioned into two subgames, one that considers the game associated with content acquisition, and a second that considers how a consumer uses the content, along with a vendor's response to this usage. Examples are provided in order to demonstrate how these subgames correspond to real situations associated with content industries, and the conditions under which Nash equilibria will exist. These subgames form the primary stage of a repeated game that models a number of important long-term interactions between consumers and vendors. We analyze current strategies that attempt to influence the outcome of the repeated game, and we also consider a new type of architectural infrastructure that makes novel use of a trust authority in order to create a suitable environment for constructing DRM games that may prove useful in the future.

References

  1. E. Adar and B.A. Huberman. Free riding on Gnutella. First Monday, 5(10), Oct. 2000. http://firstmonday.org/issues/issue5_10/adar/index.htmlGoogle ScholarGoogle Scholar
  2. A. Arnab and A. Hutchison. Fairer usage contracts for {DRM}. In Proceedings of the Fifth ACM Workshop on Digital Rights Management, pages 1--7, Alexandria, VA, Nov. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Bergemann, T. Eisenbach, J. Feigenbaum, and S. Shenker. Flexibility as an instrument in DRM systems. In Fourth Workshop on the Economics of Information Security, Kennedy School of Government, Harvard University, June 2-3 2005Google ScholarGoogle Scholar
  4. D. Berlind, Executive Editor. Content restriction annulment and protection (CRAP) video. ZDNet, http://news.zdnet.com/2036-2_22-6035707.htmlGoogle ScholarGoogle Scholar
  5. N. Christin, A. Weigend, and J. Chuang. Content availability, pollution and poisoning in file sharing peer-to-peer networks. In Proceedings of the 6th ACM Conference on Electronic Commerce, pages 68--77, New York, NY, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Dhanekula, G. L. Heileman, and B. Horne. Content spreading in peer-to-peer networks. In Proceedings of IADIS International Conference on e-Commerce 2005, pages 85--92, Porto, Portugal, Dec. 15-17 2005.Google ScholarGoogle Scholar
  7. The Digital Millennium Copyright Act, H.R. 2281, United State Code, Pub. L. No. 105-304, 112 Stat. 2860}, Oct. 28 1998.Google ScholarGoogle Scholar
  8. P. K. Dutta. Strategies and Games: Theory and Practice. MIT Press, Cambridge, MA, 1999.Google ScholarGoogle Scholar
  9. E. W. Felton. A skeptical view of DRM and fair use. Communications of the ACM, 46(4):56--59, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Free software foundation. some confusing or loaded words and phrases that are worth avoiding. www.gnu.org/philosophy/words-to-avoid.htmlGoogle ScholarGoogle Scholar
  11. G. L. Heileman and P. A. Jamkhedkar. DRM interoperability analysis from the perspective of a layered framework. In Proceedings of the Fifth ACM Workshop on Digital Rights Management, pages 17--26, Alexandria, VA, Nov. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Horne, B. Pinkas, and T. Sander. Escrow services and incentives in peer-to-peer networks. In Proceedings of the 3rd ACM Conference on Electronic Commerce, pages 85--94, Tampa, FL, Oct. 14-17 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. A. Jamkhedkar and G. L. Heileman. DRM as a layered system. In Proceedings of the Fourth ACM Workshop on Digital Rights Management, pages 11--21, Washington, DC, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. A. Jamkhedkar, G. L. Heileman, and I. Martinez-Ortiz. Middleware services for DRM. In Proceedings of the Second International Conference on Communication Systems Software and Middleware (COMSWARE), pages 1--8, Bangalore, India, Jan. 7-12 2007.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Katzenbeisser, K. Kursawe, and J. Talstra. Graceful infringement reactions in DRM systems. In Proceedings of the Sixth ACM Workshop on Digital Rights Management, pages 89--95, Alexandria, VA, Oct. 30 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. B. Margolin, M. K. Wright, and B. N. Levine. Analysis of incentives--based secrets protection system. In Proceedings of the Fourth ACM Workshop on Digital Rights Management, pages 22--30, Washington, DC, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Moulin and R. Koetter. Data-hiding codes. Proceedings of the IEEE, 93(12):2083--2126, Dec. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  18. M. J. Osborne and A. Rubinstein. A Course in Game Theory. MIT Press, 1994.Google ScholarGoogle Scholar
  19. B. C. Popescu, F. L. A. J. Kamperman, B. Crispo, and A. S. Tanenbaum. A DRM security architecture for home networks. In Proceedings of the Fourth ACM Workshop on Digital Rights Management, pages 1--10, Washington, DC, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Safavi-Naini, N. P. Sheppard, and T. Uehara. Import/export in digital rights management. In Proceedings of the Fourth ACM Workshop on Digital Rights Management, pages 99--110, Washington, DC, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. U. Schmidt, O. Tafreschi, and R. Wolf. Interoperability challenges for DRM systems. In IFIP/GI Workshop on Virtual Goods, Ilmenau, Germany, 2004. http://virtualgoods.tu-ilmenau.de/2004/program.htmlGoogle ScholarGoogle Scholar
  22. E. Van Buskirk. A poison pen from the RIAA. WIRED, Feb. 28 2007. www.wired.com/politics/onlinerights/news/2007/02/72834Google ScholarGoogle Scholar

Index Terms

  1. The drm game

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                DRM '07: Proceedings of the 2007 ACM workshop on Digital Rights Management
                October 2007
                102 pages
                ISBN:9781595938848
                DOI:10.1145/1314276

                Copyright © 2007 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 29 October 2007

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Author Tags

                Qualifiers

                • Article

                Upcoming Conference

                CCS '24
                ACM SIGSAC Conference on Computer and Communications Security
                October 14 - 18, 2024
                Salt Lake City , UT , USA

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader