A Network-Centric DRM For Online Scenarios

被引:1
|
作者
Mampaey, Marcel [1 ]
Nunez Villegas, Alvaro [2 ,3 ]
机构
[1] Alcatel Lucent Bell Labs, Technol Advisory Grp, Antwerp, Belgium
[2] Alcatel Lucent, Madrid, Spain
[3] Motorola Inc, Schaumburg, IL 60196 USA
关键词
D O I
10.1002/bltj.21563
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter presents recent technical trends to improve the secure handling of content decryption keys and usage rights in digital rights management (DRM) solutions. Attacks against DRM often consist of recovering keys such as content encryption keys and tampering with entitlements describing the user's content usage rights. This has led to demand from content providers such as movie studios for better methods to secure and exchange keys. This letter presents Online DRM, a network-centric approach to this problem, and analyzes the security implications of hosting more DRM intelligence in the network. (c) 2012 Alcatel-Lucent.
引用
收藏
页码:129 / 133
页数:5
相关论文
共 50 条
  • [1] In a Network-centric World
    Hsu, John C.
    [J]. MOVING INTEGRATED PRODUCT DEVELOPMENT TO SERVICE CLOUDS IN THE GLOBAL ECONOMY, 2014, 1 : 17 - 25
  • [2] Network-centric military communications
    Maseng, Torleiv
    Landry, Randall
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (10) : 42 - +
  • [3] Architectures for network-centric warfare
    Salasin, J
    [J]. BATTLESPACE DIGITIZATION AND NETWORK-CENTRIC WARFARE, 2001, 4396 : 82 - 86
  • [4] Network-centric military communications
    Maseng, Torleiv
    Nissen, Chris
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (11) : 36 - 36
  • [5] OverMesh: Network-centric computing
    Vicente, John
    Rungta, Sanjay
    Ding, Gang
    Krishnaswamy, Dilip
    Chan, Winson
    Miao, Kai
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (02) : 126 - 133
  • [6] Network-centric policy design
    Araz Taeihagh
    [J]. Policy Sciences, 2017, 50 : 317 - 338
  • [7] Network-centric policy design
    Taeihagh, Araz
    [J]. POLICY SCIENCES, 2017, 50 (02) : 317 - 338
  • [8] Network-centric terrorist operations
    Gagnon, Benoit
    [J]. CRIMINOLOGIE, 2006, 39 (01) : 23 - 42
  • [9] Network-centric data fusion
    Nicholson, D
    Lloyd, CM
    Collins, PR
    [J]. BATTLESPACE DIGITIZATION AND NETWORK-CENTRIC WARFARE II, 2002, 4741 : 222 - 228
  • [10] OPERATIONS IN THE NETWORK-CENTRIC ENVIRONMENT
    Wolejszo, Jaroslaw
    [J]. IDIMT-2009: SYSTEM AND HUMANS, A COMPLEX RELATIONSHIP, 2009, 29 : 363 - 376