Requirement Analysis of Enterprise DRM Systems
نویسندگان
چکیده
Digital Rights Management or DRM has been mainly used to provide access control protection for multimedia products marketed to consumers, like music and movies. There are also a number of DRM products, like Authentica and Microsoft’s RMS, that aim to protect documents for enterprises. However, none of these products provide for all the needs of an enterprise, and furthermore these products do not offer all the benefits that DRM potentially offers to an enterprise. In this paper we discuss what DRM offers to enterprises, examine the base requirements for an enterprise DRM system and then analyse how well three existing enterprise DRM products satisfy the requirements of an enterprise DRM system. We have found that enterprise DRM systems have yet to mature with many requirements not satisfied.
منابع مشابه
Towards a Global Framework for Corporate and Enterprise Digital Policy Management
While DRM has now matured to be a recognized and established domain it is currently struggling with interoperability issues mainly on a sector basis (entertainment and media, mobile, enterprise). In the enterprise sector, DRM was fueled by corporate scandals leading to compliance issues mandated by emerging regulatory frameworks. In this context, we make the case for the necessity of raising th...
متن کاملCore Security Requirements of DRM Systems
The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider and the user, each having their own incentives to use the system. Proper use of the system implies that these incentives can only be met if certain security requirements are fulfilled. Quite some attention in literature has been devoted to specific security aspect...
متن کاملDistributed DRM System
There is no standardised framework for digital rights management (DRM). With the proliferation of DRM systems, there is an increasing need for portability across multiple platforms and DRM systems. Current DRM systems can also be considered incomplete. Some DRM systems are not scalable enough; some are too focused on a particular application/file format and most do not have adequate mechanisms ...
متن کاملIdentity Based Drm System with Total Anonymity and Device Flexibility Using Ibes
Most of the Digital Rights Management (DRM) systems fail to cover all requirements like user anonymity, user fairness, security and others. Device based DRM systems, adopted by most providers, lack user fairness and mostly follow proprietary formats. On the contrary, Smart Card DRM systems satisfy user anonymity and fairness, but have certain vulnerabilities, as identified in this paper. We pro...
متن کاملA multi-layered resource management framework for dynamic resource management in enterprise DRE systems
Enterprise distributed real-time and embedded (DRE) systems can benefit from dynamic management of computing and networking resources to optimize and reconfigure system resources at runtime in response to changing mission needs and/or other situations, such as failures or system overload. This paper provides two contributions to the study of dynamic resource management (DRM) for enterprise DRE ...
متن کامل