Usage Control Model for Digital Rights Management in Digital Home Networks
نویسندگان
چکیده
The free distribution, unauthorized usage, and illicit sharing of copyrighted digital contents have become a common phenomenon with the rapid triple-play progress. The digital home network (DHN) is confronted with the open issue of digital rights management, and there is a lack of a formalized usage control model as well as some killer applications. The paper proposes a role-based cross-domain usage control model called the RCDUCM for DHN, which embraces two primary features of both role-based access control and security domain constraint management. RCDUCM is visually modeled by Unified Modeling Language to shorten the gap between the theoretical model and digital rights management applications. An application case denotes that the proposed model can implement consumer-contents-device license binding and transferring, the result of which is copyright protection of purchased digital contents against malicious piracy.
منابع مشابه
مدیریت کلید در سیستمهای مدیریت حقوق دیجیتال در حالت برونخطی
By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...
متن کاملAnalyzing research trends on digital rights management
Background and Aim: Current study has investigated the status of research about digital rights management and to identify the gaps and research trends in the field. Methods: Using a narrative review approach major databases such as Elsevier, Springer, Emerald, ProQuest, etc. were searched for the term “Digital Rights Management”. Results: Following the preliminary analysis, 80 research sources ...
متن کاملDeveloping Digital University model
The purpose of this study was to develop a Digital University model. The research method was qualitative which was used for this purpose meta synthesis. The research population consisted of 2600 scientific papers (including articles, books, dissertations and work reports), of which 84 were selected as sample. In order to validate the research findings, the critical tool of Glynn (2006) and the ...
متن کاملDigital Watermarking Technology in Different Domains
Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Di...
متن کاملA Survey of Usage Control in Computer Security
Protecting access to digital resources is one of the fundamental problems recognized in computer security. It yet remains a challenging problem to work out starting from the conception till implementation. Access control is a study which deals with the ability to permit or deny the access rights to a particular resource (object) by a particular entity (subject). The three most widely implemente...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Multimedia
دوره 6 شماره
صفحات -
تاریخ انتشار 2011