skip to main content
10.1145/1655048.1655052acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On the operational semantics of rights expression languages

Published:09 November 2009Publication History

ABSTRACT

We propose an operational model for formalising and enforcing rights expression languages based on the concept of a rights expression compiler. Our compiler transforms an XML-based rights expression into a programme for a virtual machine. This approach provides a formal way of defining semantics for rights expression languages that can be directly used in practice to enforce the expressions while ensuring their consistency and correctness. We further argue that our model eliminates a number of limitations in previous attempts to associate rights expression languages with formal semantics. We demonstrate the power and practicality of our model by using it to develop operational semantics for the OMA Rights Expression Language, from which a real interpreter can be derived with relatively little effort.

References

  1. A. Arnab and A. Hutchison. Persistent access control: A formal model for DRM. In ACM Workshop on Digital Rights Management, pages 41--53, Alexandria, Virginia, USA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Barth and J. C. Mitchell. Managing digital rights using linear logic. In Annual IEEE Symposium on Logic and Computer Science, pages 127--136, Seattle, Washington, USA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J.-W. Byun and N. Li. Purpose based access control for privacy protection in relational database systems. The VLDB Journal, 17:603--619, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. N. Chong, R. Corin, S. Etalle, P. H. Hartel, W. Jonker, and Y. W. Law. LicenseScript: A novel digital rights language and its semantics. In Third International Conference on the Web Delivery of Music, pages 122--129, Los Alamitos, USA, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ContentGuard. Extensible Rights Markup Language. http://www.xrml.org, 2004.Google ScholarGoogle Scholar
  6. S. Fischer-Hubner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. Springer, Berlin, Germany, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. A. Gunter, S. T. Weeks, and A. K. Wright. Models and languages for digital rights. In Hawaii International Conference on System Sciences, Maui, Hawaii, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Guth, G. Neumann, and M. Strembeck. Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. In ACM Workshop on Digital Rights Management, pages 90--102, Washington, DC, USA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Y. Halpern and V. Weissman. A formal foundatinon for XrML. Journal of the ACM, 55(1), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Holzer, S. Katzenbeisser, and C. Schallhart. Towards a formal semantics for ODRL. In International ODRL Workshop, Vienna, Austria, 2004.Google ScholarGoogle Scholar
  11. P. A. Jamkhedkar and G. L. Heileman. DRM as a layered system. In ACM Workshop on Digital Rights Management, pages 11--21, Washington, DC, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. A. Jamkhedkar and G. L. Heileman. A formal conceptual model for rights. In ACM Workshop on Digital Rights Management, pages 29--38, Alexandria, Virginia, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Marlin Developer Community. Marlin -- the content sharing platform for consumer devices and multimedia services. http://www.marlin-community.com, 2008.Google ScholarGoogle Scholar
  14. Open Digital Rights Language Initiative. The Open Digital Rights Language Initiative. http://odrl.net, 2004.Google ScholarGoogle Scholar
  15. Open Mobile Alliance. DRM rights expression language. Approved Version 2.1, 14 October 2008.Google ScholarGoogle Scholar
  16. R. Pucella and V. Weissman. A logic for reasoning about digital rights. In IEEE Computer Security Foundations Workshop, pages 282--294, Cape Breton, Nova Scotia, Canada, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Pucella and V. Weissman. A formal foundation for ODRL. Technical Report arXiv:cs/0601085v1, arXiv, 2006.Google ScholarGoogle Scholar
  18. N. Rump and C. Barlas. When ``playing'' isn't ``playing'' or how to achieve semantic interoperability. INDICARE Monitor, 1(8), 2005. http://www.indicare.org/tiki-read_article.php?articleId=68.Google ScholarGoogle Scholar
  19. R. Safavi-Naini, N. P. Sheppard, and T. Uehara. Import/export in digital rights management. In ACM Workshop on Digital Rights Management, pages 99--110, Washington, DC, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. W3 Consortium. XML path language (XPath) version 1.0. http://www.w3.org/TR/xpath, 16 November 1999.Google ScholarGoogle Scholar
  21. H. Xiang, D. Bjorner, and K. Futatsugi. Formal digital license language with OTS/CafeOBJ method. In ACS/IEEE International Conference on Computer Systems and Applications, pages 652--660, Doha, Qatar, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the operational semantics of rights expression languages

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          DRM '09: Proceedings of the nineth ACM workshop on Digital rights management
          November 2009
          104 pages
          ISBN:9781605587790
          DOI:10.1145/1655048

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader