Digital rights management, spyware, and security

被引:10
|
作者
Felten, EW [1 ]
Halderman, JA
机构
[1] Princeton Univ, Ctr Informat Technol, Princeton, NJ 08544 USA
[2] Princeton Univ, Dept Comp Sci, Princeton, NJ 08544 USA
关键词
D O I
10.1109/MSP.2006.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The anti-copying technologies, shipped by Sony-BMG, the world's second largest record company, was discovered by Mark Russinovich of Sysinternals. This will have a far reaching effect on the fate of anticopying technologies, and on music and movie companies' market strategies in general. Sony-BMG has shipped discs with two such systems: XCP from the BRitish company First4Internet, and MEdiaMAx from the US company SunnComm. Both technologies target Microsoft Windows computers, but they pose no real barrier to copying on other operating systems.
引用
收藏
页码:18 / 23
页数:6
相关论文
共 50 条
  • [1] Security and rights management in digital cinema
    Bloom, JA
    2003 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PROCEEDINGS: SIGNAL PROCESSING FOR COMMUNICATIONS SPECIAL SESSIONS, 2003, : 712 - 715
  • [2] Security in mobile digital rights management
    Ericsson Nikola Tesla, Zagreb; et al; Koncar - Electrical lndustries, Croatia; Siemens, Croatia; T-Croatian Telecom; T-Mobile Croatia (Croatian Society for Information and Communication Technology):
  • [3] Security and rights management in digital cinema
    Bloom, JA
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, 2003, : 621 - 624
  • [4] MULTIMEDIA SECURITY TECHNOLOGIES FOR DIGITAL RIGHTS MANAGEMENT
    Gonzalez, Millie
    JOURNAL OF WEB LIBRARIANSHIP, 2007, 1 (02) : 95 - 96
  • [5] Security attributes based digital rights management
    Chong, CN
    van Buuren, R
    Hartel, PH
    Kleinhuis, G
    PROTOCOLS AND SYSTEMS FOR INTERACTIVE DISTRIBUTED MULTIMEDIA, PROCEEDINGS, 2002, 2515 : 339 - 352
  • [6] Security and trust in digital rights management: A survey
    Zhang, Zhiyong
    Pei, Qingqi
    Ma, Jianfeng
    Yang, Lin
    International Journal of Network Security, 2009, 9 (03) : 247 - 263
  • [7] Security Management of Spyware via the Authentication of Web Communication
    Clutterbuck, Peter
    PROCEEDINGS OF THE 4TH EUROPEAN CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2010, : 34 - 42
  • [8] IMPROVING SECURITY AND EFFICIENCY OF ENTERPRISE DIGITAL RIGHTS MANAGEMENT
    Soliman, Ahmed H.
    Ibrahim, Maged H.
    El-Hennawy, Adel E.
    2015 6TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2015, : 294 - 300
  • [9] Aspects of digital rights management and the use of hardware security devices
    Kravitz, DW
    FINANCIAL CRYTOGRAPHY, PROCEEDINGS, 2002, 2339 : 54 - 58
  • [10] FUZZY RISK ASSESSMENTS ON SECURITY POLICIES FOR DIGITAL RIGHTS MANAGEMENT
    Zhang, Zhiyong
    Lian, Shiguo
    Pei, Qingqi
    Pu, Jiexin
    NEURAL NETWORK WORLD, 2010, 20 (03) : 265 - 284