Quantitative Evaluation of Enterprise DRM Technology

نویسندگان

  • Wen Zeng
  • Aad P. A. van Moorsel
چکیده

It is of critical business importance for organizations to keep confidential digital documents secure, as the potential cost and damage incurred from the loss of confidential digital documents have increased significantly in recent years. Digital Rights Management (DRM) was developed to help organizations keep digital documents secure, as one of many digital information security solutions. In this study, the functions of eight popular DRM products currently available on the market are reviewed, and the impact of using of these DRM products is evaluated quantitatively. A group of security metrics are defined as a means of measuring the impact of using DRM systems. The metrics reflect the incorporate potential costs and impact to the organization incurred by implementing DRM products. Stochastic models are used to quantitatively evaluate the costs and impact of implementing a particular DRM product. In this study, it is found that although DRM products protect digital assets by encryption and by providing a central control on information within the organization, this comes at a cost, since these security mechanisms typically reduce the productivity of the staff. The reduction in productivity is in turn measured in the form of non-productive time (NPT) which is an inherent part of the stochastic modeling process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management

Digital Rights Management (DRM) is a type of access-control technology that is used by diverse content providers to restrict the use of digital content. Enterprise Digital Rights Management (E-DRM) is an application of DRM techniques for managing the control of access to sensitive documents in an enterprise. In this paper, we propose a group key distribution system for E-DRM based on the concep...

متن کامل

Requirement Analysis of Enterprise DRM Systems

Digital Rights Management or DRM has been mainly used to provide access control protection for multimedia products marketed to consumers, like music and movies. There are also a number of DRM products, like Authentica and Microsoft’s RMS, that aim to protect documents for enterprises. However, none of these products provide for all the needs of an enterprise, and furthermore these products do n...

متن کامل

Indirect DRM Evaluation Architecture

In this paper we consider some of the basic design principles that should support the development of future DRM systems. We begin by discussing some of the problems associated with current DRM environments, and how they might be alleviated through the adoption of an open architectural framework based on basic design principles. We then demonstrate a particular implementation referred to as the ...

متن کامل

Towards a Global Framework for Corporate and Enterprise Digital Policy Management

While DRM has now matured to be a recognized and established domain it is currently struggling with interoperability issues mainly on a sector basis (entertainment and media, mobile, enterprise). In the enterprise sector, DRM was fueled by corporate scandals leading to compliance issues mandated by emerging regulatory frameworks. In this context, we make the case for the necessity of raising th...

متن کامل

Technical performance evaluation of ERP packages with two-stage DEA approach

Enterprise resources planning (ERP) systems attract many attentions from industry sector because of their ability to facilitate and integrate the enterprise operations. However, many expenses accompany the implementation of these systems and consecutive changes which doing a precise and comprehensive performance evaluation a necessary part of this process. These evaluations should consider oper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electr. Notes Theor. Comput. Sci.

دوره 275  شماره 

صفحات  -

تاریخ انتشار 2011