The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Discovering the Core Security Requirements of DRM Systems by Means of Objective Trees
|
Author(s): Hugo Jonker (University of Luxembourg, Luxembourg and Eindhoven University of Technology, The Netherlands)and Sjouke Mauw (University of Luxembourg, Luxembourg)
Copyright: 2009
Pages: 15
Source title:
Handbook of Research on Secure Multimedia Distribution
Source Author(s)/Editor(s): Shiguo Lian (SAMI Lab, France Telecom R&D Beijing, China)and Yan Zhang (Simula Research Laboratory, Norway)
DOI: 10.4018/978-1-60566-262-6.ch005
Purchase
|
Abstract
The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider, and the user, each having their own incentives to use the system. Proper use of the system implies that these incentives can only be met if certain security requirements are fulfilled. Much attention in literature has been devoted to specific security aspects of DRM systems. The contributions of this chapter consist of deriving a systematic overview of core security requirements for DRM systems. This chapter conducts a stakeholder analysis, gives an objective tree for each relevant stakeholder, and develops a simple, generic conceptual model to arrive at the set of core security requirements.
Related Content
Nithin Kalorth, Vidya Deshpande.
© 2024.
7 pages.
|
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane.
© 2024.
24 pages.
|
T.S. Sujith.
© 2024.
13 pages.
|
C. Suganya, M. Vijayakumar.
© 2024.
11 pages.
|
B. Harry, Vijayakumar Muthusamy.
© 2024.
19 pages.
|
Munise Hayrun Sağlam, Ibrahim Kirçova.
© 2024.
19 pages.
|
Elif Karakoç Keskin.
© 2024.
19 pages.
|
|
|