A DRM Solution Based on Social Networks and Enabling the Idea of Fair Use
نویسندگان
چکیده
Fair use policy allows legal owners to share products they bought with their acquaintance; it is based on the assumptions that the owners pass an original product and they cannot use it at the same time. In the digital world, we can hardly apply those assumptions since they are based on a physical availability. Furthermore, digital content providers want to have control over the distribution of their products; thus, Digital Rights Management (DRM) systems do not assist and even forbid sharing. In this paper, we describe a DRM system that takes advantage of a social network. We will describe how a model of an existing on-line social network, which includes users’ roles and trust relationships can be applied. We will present that roles and trust metrics, maintained by the users can be coupled with sharing policies controlled by the content providers. Our solution gives flexibility to the users; it still also leaves, enough control over the content distribution to the content providers. We will show how to extend an existing Digital Rights Language (DRL) to support properties defined in social networks metadata and compare it with other approaches. Finally, we will discuss if our solution introduces the fair use policy to the digital world.
منابع مشابه
A Link Prediction Method Based on Learning Automata in Social Networks
Nowadays, online social networks are considered as one of the most important emerging phenomena of human societies. In these networks, prediction of link by relying on the knowledge existing of the interaction between network actors provides an estimation of the probability of creation of a new relationship in future. A wide range of applications can be found for link prediction such as electro...
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملThe Effect of Mobile Social Networking on the Reading Habit of the Student Teachers of Frahangian University in South Khorasan Province
Purpose: Since today the use of mobile phones is extremely widespread, and individuals with different age groups and social classes devote a considerable amount of time to using these social networks, training the use of these networks can provide a platform for improving reading habits among young people. Therefore, the purpose of this study was to investigate the effect of Telegram messenger ...
متن کاملCost-aware Topology Customization of Mesh-based Networks-on-Chip
Nowadays, the growing demand for supporting multiple applications causes to use multiple IPs onto the chip. In fact, finding truly scalable communication architecture will be a critical concern. To this end, the Networks-on-Chip (NoC) paradigm has emerged as a promising solution to on-chip communication challenges within the silicon-based electronics. Many of today’s NoC architectures are based...
متن کاملPrediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
متن کامل