Digital Asset Protection in Personal Private Networks

نویسنده

  • Imad Abbadi
چکیده

This paper develops an approach for assessing Digital Rights Management (DRM) systems based on an ideal list of DRM requirements from the points of view of users, content providers and copyright law. In addition, it analyses the most recently discussed schemes for protecting digital assets in home networks. The assessment of these solutions focuses on protecting content while being exchanged between devices, irrespective of device type. Based on this analysis, we provide directions for future work, and conclude that current proposed solutions do not satisfy most user, content owner, and/or copyright law criteria for digital content protection and consumption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

VidShare: A Management Platform for Peer-to-Peer Multimedia Asset Distribution Across Heterogeneous Access Networks with Intellectual Property Management

The VidShare project develops a management platform for Peer-toPeer multimedia asset distribution across heterogeneous access networks, fixed and mobile, with Intellectual Property Management and Protection (IPMP). A key objective is to build an architecture that is interoperable with different content management and IPMP solutions. The project utilises MPEG REL as a rights expression language ...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

Privacy Protected Spatial Query Processing for Advanced Location Based Services

Due to the popularity of mobile devices (e.g., cell phones, PDAs, etc.), location-based services have become more and more prevalent in recent years. However, users have to reveal their location information to access location-based services with existing service infrastructures. It is possible that adversaries could collect the location information, which in turn invades user’s privacy. There a...

متن کامل

Ten rules for asset protection planning.

Asset protection planning is a highly technical area of legal planning. Because of the fraudulent transfer laws, asset protection planning must be done in advance of any claim, be technically sound, not rely upon secrecy, and avoid any number of critical mistakes including keeping personal and business assets separate. Physicians who engage in asset protection planning must avoid critical mista...

متن کامل

A Cryptanalysis of the High-Bandwidth Digital Content Protection System

We describe a practical attack on the High Bandwidth Digital Content Protection (HDCP) scheme. HDCP is a proposed identity-based cryptosystem for use over the Digital Visual Interface bus, a consumer video bus used in digital VCRs, camcorders, and personal computers. Public/private key pairs are assigned to devices by a trusted authority, which possesses a master secret. If an attacker can reco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006