메뉴 건너뛰기




Volumn 45, Issue 1, 2010, Pages 3-20

Requirements for enforcing digital rights management in multicast content distribution

Author keywords

Content provider (CP); Digital content; Digital rights management (DRM); DRM agent (DA); End user (EU); Intellectual property; License provider (LP); Network service provider (NSP); Open mobile alliance (OMA)

Indexed keywords

CONTENT PROVIDERS; DIGITAL CONTENTS; DIGITAL RIGHTS MANAGEMENT; DIGITAL RIGHTS MANAGEMENT (DRM); END USER (EU); END USERS; NETWORK SERVICE PROVIDERS; OPEN MOBILE ALLIANCES;

EID: 77955305045     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-009-9231-4     Document Type: Article
Times cited : (7)

References (64)
  • 3
    • 0003200309 scopus 로고    scopus 로고
    • Resource ReSerVation protocol (RSVP)-version 1 functional specification
    • Braden, R. Ed., Zhang, L., Berson, S., Herzog, S., & Jamin, S. (1997). Resource ReSerVation protocol (RSVP)-version 1 functional specification. IETF RFC 2205.
    • (1997) IETF RFC , vol.2205
    • Braden, R.Ed.1    Zhang, L.2    Berson, S.3    Herzog, S.4    Jamin, S.5
  • 4
    • 49149123826 scopus 로고    scopus 로고
    • Techtarger. Accessed 12 Oct 2008
    • Techtarger (2006). Digital rights management. http://searchcio. techtarget.com/sDefinition/0,sid182-gci493373,00.html. Accessed 12 Oct 2008.
    • (2006) Digital Rights Management
  • 5
    • 79952827313 scopus 로고    scopus 로고
    • Techterms
    • Techterms (2008). DRM (digital rights management). http://www.techterms. com/definition/drm. Accessed 12 Oct 2008.
    • (2008) DRM (Digital Rights Management).
  • 6
    • 77955306253 scopus 로고    scopus 로고
    • InterTrust. http://www.intertrust.com/main/overview/drm.html.
  • 7
    • 77955308180 scopus 로고    scopus 로고
    • Digital rights management-an overview of current challenges and solutions
    • In H. S. Venter, J. H. P. Eloff, L. Labuschagne, & M. M. Eloff (Eds.), Gallagher Estate, Midrand, South Africa.
    • Arnab, A., & Hutchison, A. (2004). Digital rights management-an overview of current challenges and solutions. In H. S. Venter, J. H. P. Eloff, L. Labuschagne, & M. M. Eloff (Eds.), Proceedings information security South Africa (ISSA), Gallagher Estate, Midrand, South Africa. http://pubs.cs.uct.ac. za/archive/00000139/01/arnab-hutchison-issa2004.pdf. Accessed 11 Oct 2008.
    • (2004) Proceedings Information Security South Africa (ISSA)
    • Arnab, A.1    Hutchison, A.2
  • 8
    • 37249058817 scopus 로고    scopus 로고
    • Evolution of DRM schema: From encryption to interoperability and monitoring
    • MCAM 2007 Springer Berlin
    • Huang, T. (2007). Evolution of DRM schema: from encryption to interoperability and monitoring. In LNCS : Vol. 4577. MCAM 2007. Berlin: Springer.
    • (2007) LNCS , vol.4577
    • Huang, T.1
  • 9
    • 0003320533 scopus 로고
    • Host extensions for IP multicasting
    • Deering, S. E. (1989). Host extensions for IP multicasting. IETF RFC 1112.
    • (1989) IETF RFC , vol.1112
    • Deering, S.E.1
  • 10
    • 77955309807 scopus 로고    scopus 로고
    • Multicast Security (MSEC)
    • Multicast Security (MSEC), IETF working group. http://www.ietf.org/html. charters/msec-charter.html. 1 August 2007.
  • 11
    • 24144453074 scopus 로고    scopus 로고
    • The multicast group security architecture
    • Hardjono, T. V. (2004). The multicast group security architecture. RFC 3740.
    • (2004) RFC , vol.3740
    • Hardjono, T.V.1
  • 12
    • 34250309913 scopus 로고    scopus 로고
    • Scalable solutions for secure group communications
    • DOI 10.1016/j.comnet.2007.02.002, PII S1389128607000746
    • R. Mukherjee J. W. Atwood 2007 Scalable solutions for secure group communications Computer Networks 51 12 10.1016/j.comnet.2007.02.002 (Pubitemid 46921034)
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3525-3548
    • Mukherjee, R.1    Atwood, J.W.2
  • 13
    • 62149140567 scopus 로고    scopus 로고
    • Multicast receiver control by IGMP-AC
    • 10.1016/j.comnet.2008.12.005
    • S. Islam J. W. Atwood 2009 Multicast receiver control by IGMP-AC Computer Networks 53 7 989 1013 10.1016/j.comnet.2008.12.005
    • (2009) Computer Networks , vol.53 , Issue.7 , pp. 989-1013
    • Islam, S.1    Atwood, J.W.2
  • 14
    • 77955303346 scopus 로고    scopus 로고
    • Sender access and data distribution control for inter-domain multicast groups
    • Islam, S., & Atwood, J. W. (2008). Sender access and data distribution control for inter-domain multicast groups. Computer Networks (submitted).
    • (2008) Computer Networks
    • Islam, S.1    Atwood, J.W.2
  • 21
    • 77955307783 scopus 로고    scopus 로고
    • Conceptual model and security requirements for DRM techniques used for e-learning objects protection
    • (2007). Accessed11Oct2008
    • Nickolova, M., & Nickolov, E. (2007). Conceptual model and security requirements for DRM techniques used for e-learning objects protection. Information Technologies and Knowledge, 1(2007), 93-99. http://www.foibg.com/ ijitk/ijitk-vol01/ijitk01-1-p18.pdf. Accessed 12 Nov. 2009.
    • (2007) Information Technologies and Knowledge , vol.1 , pp. 93-99
    • Nickolova, M.1    Nickolov, E.2
  • 22
    • 77955303866 scopus 로고    scopus 로고
    • Core security requirements of DRM systems
    • ICFAI, India. Accessed11Oct2008
    • Jonker, H. L., & Mauw, S. (2007). Core security requirements of DRM systems. In Digital rights management, ICFAI book series, ICFAI, India. http://satoss.uni.lu/members/hugo/publications.php. Accessed 11 Oct 2008.
    • (2007) Digital Rights Management, ICFAI Book Series
    • Jonker, H.L.1    Mauw, S.2
  • 23
    • 77955309448 scopus 로고    scopus 로고
    • Requirement analysis of enterprise DRM systems
    • Hotel Balalaika, Sandton, Johannesburg.Access ed11Oct2008
    • Arnab, A., & Hutchion, A. (2005). Requirement analysis of enterprise DRM systems. In Proceedings information security South Africa, Hotel Balalaika, Sandton, Johannesburg. http://pubs.cs.uct.ac.za/archive/00000205/01/arnab- hutchison-issa-final.pdf. Accessed 11 Oct 2008.
    • (2005) Proceedings Information Security South Africa
    • Arnab, A.1    Hutchion, A.2
  • 24
    • 77955305459 scopus 로고    scopus 로고
    • OMA Candidate version 2.1. 10 Oct 2006
    • OMA (2006). OMA DRM requirements. Candidate version 2.1. 10 Oct 2006.
    • (2006) OMA DRM Requirements
  • 25
    • 0005097206 scopus 로고    scopus 로고
    • Digital rights management (DRM) architectures
    • Iannella, R. (2001). Digital rights management (DRM) architectures. D-Lib Magazine, 7(6). http://www.dlib.org/dlib/june01/iannella/06iannella.html. Accessed 12 Oct 2008.
    • (2001) D-Lib Magazine , vol.7 , Issue.6
    • Iannella, R.1
  • 26
    • 0041584764 scopus 로고    scopus 로고
    • Sonera Plaza Ltd. White paper.Accessed13Oct2008
    • Sonera Plaza Ltd. (2002). Digital rights management. White paper. http://www.medialab.sonera.fi/workspace/DRMWhitePaper.pdf. Accessed 13 Oct 2008.
    • (2002) Digital Rights Management
  • 28
    • 69249168719 scopus 로고    scopus 로고
    • Persistent access control: A formal model for drm
    • Alexandria, Virginia, USA.Accessed12Oct2008
    • Arnab, A., & Hutchison, A. (2007). Persistent access control: a formal model for drm. In Proceedings of the 2007 ACM workshop on digital rights management (Alexandria, Virginia, USA). http://pubs.cs.uct.ac.za/archive/ 00000411/03/acmdrm07-arnab.pdf. Accessed 12 Oct 2008.
    • (2007) Proceedings of the 2007 ACM Workshop on Digital Rights Management
    • Arnab, A.1    Hutchison, A.2
  • 30
    • 35248854501 scopus 로고    scopus 로고
    • Integration of non-repudiation services in mobile DRM scenarios
    • DOI 10.1007/s11235-007-9050-4, Special Issue: Security, Privacy and Trust in Beyond-3G Networks
    • J. A. Onieva J. Lopez R. Roman J. Zhou S. Gritzalis 2007 Integration of non-repudiation services in mobile DRM scenarios Telecommunication Systems 35 3-4 161 176 10.1007/s11235-007-9050-4 (Pubitemid 47568042)
    • (2007) Telecommunication Systems , vol.35 , Issue.3-4 , pp. 161-176
    • Onieva, J.A.1    Lopez, J.2    Roman, R.3    Zhou, J.4    Gritzalis, S.5
  • 32
    • 67549092443 scopus 로고    scopus 로고
    • Security requirement for digital rights management
    • (San Antonio): 353b
    • Kamat, M. (2002). Security requirement for digital rights management. In The proceedings of ISECON 2002 (Vol. 19) (San Antonio): 353b.
    • (2002) The Proceedings of ISECON 2002 , vol.19
    • Kamat, M.1
  • 33
    • 77955304365 scopus 로고    scopus 로고
    • Challenges standardizing renewable broadcast security
    • Accessed 12 Oct 2008
    • Bar-El, H. Challenges standardizing renewable broadcast security. WhitePaper. http://www.hbarel.com/publications/Challenges-of-Standardizing- Renewable-Broadcast-Security.pdf. Accessed 12 Oct 2008.
    • WhitePaper.
    • Bar-El, H.1
  • 35
    • 19644398268 scopus 로고    scopus 로고
    • Windows media technologies: Using windows media rights manager to protect and distribute digital media
    • December 2001. Microsoft Corporation
    • Pruneda, A. (2001). Windows media technologies: using windows media rights manager to protect and distribute digital media. MSDN Magazine. December 2001. Microsoft Corporation. http://msdn.Microsoft.com/msdnmag/issues/01/12/DRM/ default.aspx.
    • (2001) MSDN Magazine
    • Pruneda, A.1
  • 36
    • 84871538812 scopus 로고    scopus 로고
    • Open Mobile Alliance. http://www.openmobilealliance.org/. Acceseed 12 Nov. 2009.
    • Open Mobile Alliance
  • 38
    • 0041848575 scopus 로고    scopus 로고
    • Preventing privacy, reverse engineering, and tampering
    • 10.1109/MC.2003.1212692
    • G. Naumovich N. Memo 2003 Preventing privacy, reverse engineering, and tampering Computer 36 64 71 10.1109/MC.2003.1212692
    • (2003) Computer , vol.36 , pp. 64-71
    • Naumovich, G.1    Memo, N.2
  • 40
    • 0000675337 scopus 로고
    • Superdistribution: The concept and the architecture
    • Mori, R., & Kawahara, M. (1990) Superdistribution: the concept and the architecture. Transaction of the IEICE, E73(7).
    • (1990) Transaction of the IEICE , vol.E73 , Issue.7
    • Mori, R.1    Kawahara, M.2
  • 42
    • 77955307461 scopus 로고    scopus 로고
    • OMA. Candidate version 2.1-05 Aug 2008.
    • OMA (2008). DRM architecture OMA. Candidate version 2.1-05 Aug 2008. http://www.openmobilealliance.org/Technical/release-program/drm-archive.aspx. Accessed 12 Oct 2008.
    • (2008) DRM Architecture OMA
  • 43
  • 48
    • 69249168708 scopus 로고    scopus 로고
    • Ph.D., Department of Computer Science, University of Cape Town, 2007.Accessed31Ma
    • Arnab, A. (2007). Towards a general framework for digital rights management (DRM). Ph.D., Department of Computer Science, University of Cape Town, 2007. http://pubs.cs.uct.ac.za/archive/00000448/01/alapan.arnab.thesis. final.pdf. Accessed 31 March 2008.
    • (2007) Towards A General Framework for Digital Rights Management (DRM)
    • Arnab, A.1
  • 49
    • 55349113026 scopus 로고    scopus 로고
    • Accessed31March2008
    • Windows Media Digital Rights Management. http://msdn2.Microsoft.com/en- us/windowsmedia/bb190317.aspx. Accessed 31 March 2008.
    • Windows Media Digital Rights Management
  • 51
    • 77955303783 scopus 로고    scopus 로고
    • Microsoft.
    • Microsoft. Windows media rights manager providers. http://www.Microsoft. com/windows/windowsmedia/forpros/drm/supgrade.aspx. Accessed 31 March 2008.
    • Windows Media Rights Manager Providers
  • 53
    • 77955307130 scopus 로고    scopus 로고
    • Survey on the technological aspects of digital rights management
    • Ku, B., & Chi, C. (2004). Survey on the technological aspects of digital rights management. In ISC 2004.
    • (2004) ISC 2004
    • Ku, B.1    Chi, C.2
  • 56
    • 33746986988 scopus 로고    scopus 로고
    • Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments
    • DOI 10.1109/TCE.2006.1649694
    • S. Park J. Jeong T. Kwon 2006 Contents distribution system based on MPEG-4 ISMACryp in IP Set-top box environments IEEE Transactions on Consumer Electronics 52 2 660 668 10.1109/TCE.2006.1649694 (Pubitemid 44203145)
    • (2006) IEEE Transactions on Consumer Electronics , vol.52 , Issue.2 , pp. 660-668
    • Park, S.-H.1    Jeong, J.2    Kwon, T.3
  • 57
    • 77954111561 scopus 로고    scopus 로고
    • Using advanced encryption standard (AES) counter mode with ipsec encapsulating security payload (ESP)
    • Housley, R., & Security, V. (2004). Using advanced encryption standard (AES) counter mode with ipsec encapsulating security payload (ESP). IETF RFC 3686.
    • (2004) IETF RFC , vol.3686
    • Housley, R.1    Security, V.2
  • 59
    • 18444370876 scopus 로고    scopus 로고
    • A survey of Anti-Tamper technologies. CrossTalk
    • http://www.arxan.com/ATknowledgePortal/pdfs/Crosstalk-Article-A-Surve-of- AntiTamper-Technologies.pdf. Accessed 13 March 2008
    • E. D. Bryant M. J. Atallah M. R. Stytz 2004 A survey of Anti-Tamper technologies. CrossTalk The Journal of Defense Software Engineering 17 11 12 16 http://www.arxan.com/ATknowledgePortal/pdfs/Crosstalk-Article-A-Surve-of- AntiTamper-Technologies.pdf. Accessed 13 March 2008
    • (2004) The Journal of Defense Software Engineering , vol.17 , Issue.11 , pp. 12-16
    • Bryant, E.D.1    Atallah, M.J.2    Stytz, M.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.