Abstract
Nowadays, interoperability of DRM is an issue in market. It can be achieved by three different approaches: full-format, configuration-driven and connected interoperability. In particular, the connected interoperability refers to devices that contact an online translation service. When the consumers want to transfer content to a different device, they access the online translation server and rely upon online services. The connected interoperability does not need defining one standard and has the ability to monitor. Therefore, the connected interoperability is used more than others in market. However, in the connected interoperability, even though two distinct DRM systems want to share the content, they cannot share the content if the online translation server does not guarantee reliability. In this paper, we propose a protection profile for connected interoperable DRM framework to solve the problem. This PP can be used to establish trust between the DRM provider and the online translation server for interoperability. If that happens, the connected interoperable DRM market will be more active than before.
This research was supported by the MKE(Ministry of Knowledge Economy), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement)(IITA-2008-C1090-0801-0016 and IITA-2008-C1090-0801-0028).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lee, S., Shin, M.: Protection Profile for Software Development Site. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 499–507. Springer, Heidelberg (2005)
Common Criteria, Common Criteria for Information Technology Security Evaluation; part 1: Introduction and general model, Version 3.1 R1, CCMB-2006-09-001 (September 2006)
Common Criteria, Common Criteria for Inofrmation Technology Security Evaluation; part 2: Security functional components, Version 3.1 R2, CCMB-2007-09-002 (September 2007)
Common Criteria, Common Criteria for Information Technology Security Evaluation; part 3: Security assurance components, Version 3.1 R2, CCMB-2007-09-003 (September 2007)
Taban, G., Cardenas, A.A., Gligor, c.d.: Towards a Secure and Interoperable DRM Architecture. In: ACM Workshop On Digital Rights Management, pp. 69–78 (October 2006)
Koenen, R.H., Lacy, J., Mackey, M., Mitchell, S.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE 92(6), 883–897 (2004)
Safavi-Naini, R., Sheppard, N.P., Uehara, T.: Import/Export in Digital Rights Management. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 99–110 (2004)
Schmidt, A.U., Tafreschi, O., Wolf, R.: Interoperability Challenges for DRM Systems. In: Second International Workshop on Virtual Goods, Ilmenau, Germany (May 2004)
Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a Software Architecture for DRM. In: Proceedings of the ACM Digital Rights Management workshop DRM 2005, pp. 65–74 (2005)
Kravitz, D.W., Messerges, T.S.: Achieving Media Portability through Local Content Translation and End-to-End Rights Management. In: Proceedings of the ACM Digital Rights Management workshop DRM 2005, pp. 27–36 (2005)
Wegner, S.: Prototype Description of an Open DRM Architecture, OPERA-Interoperability of Digital Rights Management Technologies. EURESCOM project report (December 2003)
The Informed Dialogue about Consumer Acceptability of DRM Solutions in Europe. Consumer Survey on Digital Music and DRM (May 2005)
iTunes FairPlay, http://www.apple.com/lu/support/itunes/authorization.html
Open Mobile Alliance, http://www.openmobilealliance.org/
Microsoft Windows Media Rights Manager, http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx
Intertrust’s Coral and Marlin, http://www.intertrust.com/main/research/initiatives.html
Coral Consortium, http://www.coral-interop.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, D., Cho, S., Won, D., Kim, S. (2009). Protection Profile for Connected Interoperable DRM Framework. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-00306-6_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00305-9
Online ISBN: 978-3-642-00306-6
eBook Packages: Computer ScienceComputer Science (R0)