skip to main content
10.1145/1456520.1456527acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

A four-layer model for security of digital rights management

Published: 27 October 2008 Publication History

Abstract

Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This complexity induces also that there is not one unique modeling of DRM. Each model should help to compare different DRM systems and easily highlight the differences and the similarities between them. One of the weaknesses of the current models is that none puts specifically the focus on the most important characteristics of DRM: protection of content and rights management. We propose a four-layer model that complements traditional ones. Using trust layer, rights management layer, rights enforcement layer, and content protection layer, this model is security oriented. It is suitable to describe any content protections such as DRM, conditional access, copy protection or even pre-recorded content protection systems.

References

[1]
R.H. Koenen et al., "The Long March to Interoperable Digital Rights Management," Proceedings of the IEEE, vol. 92, 2004, pp. 883--897.
[2]
W. Rosenblatt, S. Mooney, and W. Trippe, Digital Rights Management: Business and Technology, John Wiley & Sons, Inc., 2001.
[3]
A.G. GEFFROY, "Economic analysis of Copyright laws and DRMs," Feb. 2006; http://www.ist-ipmedianet.org/Economic_Analysis.pdf.
[4]
"DIGITAL RIGHTS Background, Systems, Assessment," Feb. 2002; http://ec.europa.eu/information_society/eeurope/2005/all_about/digital_rights_man/doc/workshop2002/drm_workingdoc.pdf.
[5]
"Digital Rights Management," Wikipedia; http://en.wikipedia.org/wiki/Digital_rights_management.
[6]
G. Booch, J. Rumbaugh, and I. Jacobson, The Unified Modeling Language User Guide, Addison-Wesley Professional, 1998.
[7]
B. Furht, E. Muharemagic, and D. Socek, Multimedia Encryption And Watermarking, Springer, 2005.
[8]
R. Iannella, "Digital Rights Management (DRM) Architectures," D-Lib magazine, vol. 7, Jun. 2001; http://www.dlib.org/dlib/june01/iannella/06iannella.html.
[9]
S. Guth, Interoperability of Drm Systems: Via the Exchange of Xml-based Rights Expressions, Peter Lang Pub Inc, 2006.
[10]
C.N. Chong, S. Etalle, and P.H. Hartel, Comparing Logic-based and XML-based Rights Expression Languages, Springer,.
[11]
C.A. Gunter, S.T. Weeks, and A.K. Wright, "Models and languages for digital rights," System Sciences, 2001. Proceedings of the 34th Annual Hawaii International Conference on, 2001, p. 5.
[12]
A. Arnab and A. Hutchison, "Persistent access control: a formal model for drm," Proceedings of the 2007 ACM workshop on Digital Rights Management, Alexandria, Virginia, USA: ACM, 2007, pp. 41--53; http://portal.acm.org/citation.cfm?id=1314286.
[13]
C.N. Chong, "Experiments in rights control: Expression and Enforcement. PhD thesis," Feb. 2005; http://eprints.eemcs.utwente.nl/717/.
[14]
S. Michiels et al., "Towards a software architecture for DRM," Proceedings of the 5th ACM workshop on Digital rights management, Alexandria, VA, USA: ACM, 2005, pp. 65--74; http://portal.acm.org/citation.cfm?id=1102559.
[15]
P.A. Jamkhedkar and G.L. Heileman, "DRM as a layered system," Proceedings of the 4th ACM workshop on Digital rights management, Washington DC, USA: ACM, 2004, pp. 11--21.
[16]
G.L. Heileman and P.A. Jamkhedkar, "DRM interoperability analysis from the perspective of a layered framework," Proceedings of the 5th ACM workshop on Digital rights management, Alexandria, VA, USA: ACM, 2005, pp. 17--26; http://portal.acm.org/citation.cfm?id=1102546.1102551.
[17]
N. Rump, "Definition, Aspects, and Overview," Digital Rights Management, Springer Berlin / Heidelberg, 2003, pp. 3--15.
[18]
S. Guth and R. Iannella, "Open Digital Rights Language (ODRL) Version 2 Requirements," Feb. 2005; http://odrl.net/2.0/v2req.html.
[19]
"eXtensible rights Markup Language (XrML) 2.0 specifications," 2001; http://www.xrml/org/.
[20]
P.C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Lecture Notes in Computer Science, vol. 1109, 1996, pp. 104--113.
[21]
F. Biancuzzi, "Racing against reversers," SecurityFocus, Jun. 2008; http://www.securityfocus.com/columnists/474/1.
[22]
E. Diehl and T. Furon, "copyright watermark: Closing the analog hole," Proc. IEEE Int. Conf. Consumer Electronics, 2003, pp. 52--53.
[23]
I. Cox et al., Digital Watermarking and Steganography, Morgan Kaufmann, 2007.
[24]
"Fighting audiovisual piracy: a good practice guide for the industry," 2007; http://www.cnc.fr/Site/Template/T8.aspx?SELECTID=2531&ID=1661&t=1.
[25]
"Decentralized DRM: Next generation of DRMs," Jul. 2004.
[26]
"OMA home"; http://www.openmobilealliance.org/.
[27]
Open Mobile Alliance ltd, "DRM Architecture Version 2.0.1," Feb. 2008.
[28]
R. Iannella, "Open Digital Rights Language (ODRL) Version 1.1," Sep. 2002; http://www.w3.org/TR/odrl/.
[29]
"CMLA technical specifications," Dec. 2005; http://www.cmla.com/licensing/specifications.aspx.
[30]
"DVB - Digital Video Broadcasting - Home"; http://www.dvb.org/.
[31]
Hitachi et al., "Digital Transmission Content Protection Specification Volume 1 (Informational Version)," Oct. 2007; http://www.dtcp.com/data/info%2020071001%20DTCP%20V1%201p51.pdf.
[32]
J. Kelsey, B. Schneier, and D. Wagner, "Mod n Cryptanalysis, with Applications Against RC5P and M6," Lecture Notes in Computer Science, 1999, pp. 139--155.
[33]
E. DIEHL, "MediaNet: A framework to unify different distribution channels," Oct. 2004; http://www.ist-ipmedianet.org/Medianet_position_paper_final.pdf.
[34]
"Content Protection & Copy Management Revision 2.0 Specification," Feb. 2008; http://www.dvb.org/technology/standards/a094r2.1--10.CPCM.pdf.
[35]
"Welcome to Coral Consortium"; http://www.coral-interop.org/.
[36]
"DMP Home Page"; http://www.digital-media-project.org/.
[37]
G. Fernando, T. Jacobs, and V. Swatinathan, "Project DReaM An architectural Overview," Sep. 2005.
[38]
Mc CORMAC, European Scrambling System, Waterford University Press, 1996.

Cited By

View all
  • (2024)Formal security analysis of widevine through the W3C EME standardProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699258(6399-6415)Online publication date: 14-Aug-2024
  • (2017)Enterprise Digital Rights Management for Document Protection2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA)10.1109/WAINA.2017.48(321-326)Online publication date: Mar-2017
  • (2014)Unified Model for Data Security - A Position PaperProceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2014.110(831-839)Online publication date: 24-Sep-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DRM '08: Proceedings of the 8th ACM workshop on Digital rights management
October 2008
102 pages
ISBN:9781605582900
DOI:10.1145/1456520
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital rights management
  2. drm
  3. dtcp
  4. dvb
  5. oma
  6. rights enforcement

Qualifiers

  • Research-article

Conference

CCS08
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Formal security analysis of widevine through the W3C EME standardProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699258(6399-6415)Online publication date: 14-Aug-2024
  • (2017)Enterprise Digital Rights Management for Document Protection2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA)10.1109/WAINA.2017.48(321-326)Online publication date: Mar-2017
  • (2014)Unified Model for Data Security - A Position PaperProceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2014.110(831-839)Online publication date: 24-Sep-2014
  • (2012)A Trust Distributed DRM System Using Smart CardsIEICE Transactions on Information and Systems10.1587/transinf.E95.D.2991E95.D:12(2991-3000)Online publication date: 2012
  • (2012)Tracking of Data Leaving the CloudProceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2012.282(137-144)Online publication date: 25-Jun-2012
  • (2012)An approach to the formal analysis of license interoperabilityComputers and Electrical Engineering10.1016/j.compeleceng.2012.07.00338:6(1670-1686)Online publication date: 1-Nov-2012
  • (2011)Cross-Context Transfer of Electronic Title DocumentsProceedings of the 2011 IEEE 8th International Conference on e-Business Engineering10.1109/ICEBE.2011.38(305-310)Online publication date: 19-Oct-2011
  • (2011)Efficient Access Control in Multimedia Social NetworksSocial Media Modeling and Computing10.1007/978-0-85729-436-4_7(145-165)Online publication date: 2011
  • (2010)A geometric approach for efficient licenses validation in DRMProceedings of the 7th VLDB conference on Secure data management10.5555/1889159.1889172(132-149)Online publication date: 17-Sep-2010
  • (2010)An analysis of interoperability between licensesProceedings of the tenth annual ACM workshop on Digital rights management10.1145/1866870.1866884(61-72)Online publication date: 4-Oct-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media