Combining DRM with Trusted Computing for Effective Information Access Management
نویسندگان
چکیده
In this paper we used Digital Rights Management (DRM) associated with Trusted Computing to enforce a contentspecific fine-grained access control policy defined by content owner. This policy is associated with content, and when content is copied its access control policy is copied and bound to the target copy. This paper presents a generic approach for content protection utilising both DRM and Trusted Computing technologies. We then discuss how the proposed workflow can be used to solve problems associated with three different applications that benefits from using DRM associated with Trusted Computing services. These are clinical information system, personal networks, and corporate networks.
منابع مشابه
DRM, Trusted Computing and Operating System Architecture
Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an open computing platform such as a PC. Recent trusted computing initiatives namely, the Trusted Computing Group (TCG) specification, and Microsoft’...
متن کاملEnforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing
We present the problem of enforcing a Digital Rights Management (DRM) system that needs to consider location-dependent licensing policies and operates on top of existing conditional access standards. A major application for location-dependent DRM is Pay-TV broadcasting as rightsholders require different business models in different regions. A global provider’s enduser equipment needs to validat...
متن کاملEnterprise Digital Rights Management:Solutions against Information Theft by Insiders
Insider attack is one of the most serious cybersecurity threats to corporate America. Among all insider threats, information theft is considered the most damaging in terms of potential financial loss. Moreover, it is also especially difficult to detect and prevent, because in many cases the attacker has the proper authority to access the stolen information. Enterprise Digital Rights Management ...
متن کاملKey Challenges in DRM: An Industry Perspective
The desires for robust digital rights management (DRM) systems are not new to the commercial world. Indeed, industrial research, development and deployment of systems with DRM aspects (most notably crude copy-control schemes) have a long history. Yet to date the industry has not seen much commercial success from shipping these systems on top of platforms that support general-purpose computing. ...
متن کاملDarknets, DRM, and Trusted Computing: Economic Incentives for Platform Providers EXTENDED SUMMARY
In recent years, content providers and the computer industry have joined forces to protect intellectual property rights on digital information. Music publishers and movie studios have experimented with various digital rights management (DRM) initiatives in order to control access, use, and dissemination of their products. Software and hardware providers have developed various technological form...
متن کامل