2002
DOI: 10.1007/3-540-36166-9_29
|View full text |Cite
|
Sign up to set email alerts
|

Security Attributes Based Digital Rights Management

Abstract: Most real-life systems delegate responsibilities to different authorities. We apply this model to a digital rights management system, to achieve flexible security. In our model a hierarchy of authorities issues certificates that are linked by cryptographic means. This linkage establishes a chain of control, identity-attribute-rights, and allows flexible rights control over content. Typical security objectives, such as identification, authentication, authorization and access control can be realised. Content key… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2003
2003
2012
2012

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…In such DRM systems, Attribute-Based Credentials such as Attribute Certificates are issued after the validation of the Public Key Certificate [6]. The Attribute Certificate will be associated with the Public Key Certificate and the attribute keys.…”
Section: Comparison With Various Schemesmentioning
confidence: 99%
“…In such DRM systems, Attribute-Based Credentials such as Attribute Certificates are issued after the validation of the Public Key Certificate [6]. The Attribute Certificate will be associated with the Public Key Certificate and the attribute keys.…”
Section: Comparison With Various Schemesmentioning
confidence: 99%
“…We have implemented two types of Content Renderer, namely a plug-in to Adobe Acrobat [Chong et al, 2002] and a streaming audio player based on a tamper-resistant hardware token [Cheng et al, 2004].…”
Section: Contentmentioning
confidence: 99%
“…The Cryptographic Engine performs the necessary cryptographic operations for the License Interpreter and the Content Renderer, for instance to identify, authenticate and authorize users [Chong et al, 2002]; to decrypt licenses and content if they are encrypted ; and to encrypt audit logs that record the user's actions on the content [Chong et al, 2003c].…”
Section: Contentmentioning
confidence: 99%
“…In a digital rights management (DRM) system, we use a license to specify the rights of a user on digital content [8]. For example, a commercial software license restricts the execution of the licensed software to a particular number of times.…”
Section: Introductionmentioning
confidence: 99%