Quantitative Evaluation of Enterprise DRM Technology
نویسندگان
چکیده
منابع مشابه
Quantitative Evaluation of Enterprise DRM Technology
It is of critical business importance for organizations to keep confidential digital documents secure, as the potential cost and damage incurred from the loss of confidential digital documents have increased significantly in recent years. Digital Rights Management (DRM) was developed to help organizations keep digital documents secure, as one of many digital information security solutions. In t...
متن کاملRequirement Analysis of Enterprise DRM Systems
Digital Rights Management or DRM has been mainly used to provide access control protection for multimedia products marketed to consumers, like music and movies. There are also a number of DRM products, like Authentica and Microsoft’s RMS, that aim to protect documents for enterprises. However, none of these products provide for all the needs of an enterprise, and furthermore these products do n...
متن کاملIndirect DRM Evaluation Architecture
In this paper we consider some of the basic design principles that should support the development of future DRM systems. We begin by discussing some of the problems associated with current DRM environments, and how they might be alleviated through the adoption of an open architectural framework based on basic design principles. We then demonstrate a particular implementation referred to as the ...
متن کاملFrontiers of DRM Knowledge and Technology
In today’s digital world digital information can be copied and distributed with ease and little expense. While this makes life easier for law-abiding citizens, it also facilitates misuse, mass piracy and the violation of Intellectual Property Rights (IPR) causing revenue loss to many rights holders. Consumers are also concerned about their privacy, and therefore experience a need to be able to ...
متن کاملSecure Anonymously Authenticated and Traceable Enterprise DRM System
Anonymity is one of the important services that must be available to users in the digital world as long as they behave honestly. Users’ communication must be kept authenticated and anonymous unless malicious behaviors are detected. In this case the accused user’s clear identity must be traced and revealed by the system to solve accusations. Enterprise Digital Rights Management (E-DRM) protects ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2011
ISSN: 1571-0661
DOI: 10.1016/j.entcs.2011.09.011