Skip to main content

Protection Profile for Connected Interoperable DRM Framework

  • Conference paper
Information Security Applications (WISA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5379))

Included in the following conference series:

  • 716 Accesses

Abstract

Nowadays, interoperability of DRM is an issue in market. It can be achieved by three different approaches: full-format, configuration-driven and connected interoperability. In particular, the connected interoperability refers to devices that contact an online translation service. When the consumers want to transfer content to a different device, they access the online translation server and rely upon online services. The connected interoperability does not need defining one standard and has the ability to monitor. Therefore, the connected interoperability is used more than others in market. However, in the connected interoperability, even though two distinct DRM systems want to share the content, they cannot share the content if the online translation server does not guarantee reliability. In this paper, we propose a protection profile for connected interoperable DRM framework to solve the problem. This PP can be used to establish trust between the DRM provider and the online translation server for interoperability. If that happens, the connected interoperable DRM market will be more active than before.

This research was supported by the MKE(Ministry of Knowledge Economy), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement)(IITA-2008-C1090-0801-0016 and IITA-2008-C1090-0801-0028).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, S., Shin, M.: Protection Profile for Software Development Site. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 499–507. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Common Criteria, Common Criteria for Information Technology Security Evaluation; part 1: Introduction and general model, Version 3.1 R1, CCMB-2006-09-001 (September 2006)

    Google Scholar 

  3. Common Criteria, Common Criteria for Inofrmation Technology Security Evaluation; part 2: Security functional components, Version 3.1 R2, CCMB-2007-09-002 (September 2007)

    Google Scholar 

  4. Common Criteria, Common Criteria for Information Technology Security Evaluation; part 3: Security assurance components, Version 3.1 R2, CCMB-2007-09-003 (September 2007)

    Google Scholar 

  5. Taban, G., Cardenas, A.A., Gligor, c.d.: Towards a Secure and Interoperable DRM Architecture. In: ACM Workshop On Digital Rights Management, pp. 69–78 (October 2006)

    Google Scholar 

  6. Koenen, R.H., Lacy, J., Mackey, M., Mitchell, S.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE 92(6), 883–897 (2004)

    Article  Google Scholar 

  7. Safavi-Naini, R., Sheppard, N.P., Uehara, T.: Import/Export in Digital Rights Management. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 99–110 (2004)

    Google Scholar 

  8. Schmidt, A.U., Tafreschi, O., Wolf, R.: Interoperability Challenges for DRM Systems. In: Second International Workshop on Virtual Goods, Ilmenau, Germany (May 2004)

    Google Scholar 

  9. Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a Software Architecture for DRM. In: Proceedings of the ACM Digital Rights Management workshop DRM 2005, pp. 65–74 (2005)

    Google Scholar 

  10. Kravitz, D.W., Messerges, T.S.: Achieving Media Portability through Local Content Translation and End-to-End Rights Management. In: Proceedings of the ACM Digital Rights Management workshop DRM 2005, pp. 27–36 (2005)

    Google Scholar 

  11. Wegner, S.: Prototype Description of an Open DRM Architecture, OPERA-Interoperability of Digital Rights Management Technologies. EURESCOM project report (December 2003)

    Google Scholar 

  12. The Informed Dialogue about Consumer Acceptability of DRM Solutions in Europe. Consumer Survey on Digital Music and DRM (May 2005)

    Google Scholar 

  13. iTunes FairPlay, http://www.apple.com/lu/support/itunes/authorization.html

  14. Open Mobile Alliance, http://www.openmobilealliance.org/

  15. Microsoft Windows Media Rights Manager, http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx

  16. Intertrust’s Coral and Marlin, http://www.intertrust.com/main/research/initiatives.html

  17. Coral Consortium, http://www.coral-interop.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, D., Cho, S., Won, D., Kim, S. (2009). Protection Profile for Connected Interoperable DRM Framework. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00306-6_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00305-9

  • Online ISBN: 978-3-642-00306-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics