Usage Control Model for Digital Rights Management in Digital Home Networks

نویسندگان

  • Zhiyong Zhang
  • Tao Huang
  • Danmei Niu
  • Lili Zhang
چکیده

The free distribution, unauthorized usage, and illicit sharing of copyrighted digital contents have become a common phenomenon with the rapid triple-play progress. The digital home network (DHN) is confronted with the open issue of digital rights management, and there is a lack of a formalized usage control model as well as some killer applications. The paper proposes a role-based cross-domain usage control model called the RCDUCM for DHN, which embraces two primary features of both role-based access control and security domain constraint management. RCDUCM is visually modeled by Unified Modeling Language to shorten the gap between the theoretical model and digital rights management applications. An application case denotes that the proposed model can implement consumer-contents-device license binding and transferring, the result of which is copyright protection of purchased digital contents against malicious piracy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مدیریت کلید در سیستم‌های مدیریت حقوق دیجیتال در حالت برون‌خطی

By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...

متن کامل

Analyzing research trends on digital rights management

Background and Aim: Current study has investigated the status of research about digital rights management and to identify the gaps and research trends in the field. Methods: Using a narrative review approach major databases such as Elsevier, Springer, Emerald, ProQuest, etc. were searched for the term “Digital Rights Management”. Results: Following the preliminary analysis, 80 research sources ...

متن کامل

Developing Digital University model

The purpose of this study was to develop a Digital University model. The research method was qualitative which was used for this purpose meta synthesis. The research population consisted of 2600 scientific papers (including articles, books, dissertations and work reports), of which 84 were selected as sample. In order to validate the research findings, the critical tool of Glynn (2006) and the ...

متن کامل

Digital Watermarking Technology in Different Domains

Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Di...

متن کامل

A Survey of Usage Control in Computer Security

Protecting access to digital resources is one of the fundamental problems recognized in computer security. It yet remains a challenging problem to work out starting from the conception till implementation. Access control is a study which deals with the ability to permit or deny the access rights to a particular resource (object) by a particular entity (subject). The three most widely implemente...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Multimedia

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011