Abstract
Digital Right Management (DRM) can be used to prohibit illegal reproduction, and redistribution of digital content, to protect copyrights. However, current DRM systems are incompatible and lack of interoperability which exchange of data, different platform, designed and protected by different content providers. To overcome these drawbacks, three ways of interoperability are full-formation interoperability, connected interoperability, configuration-driven interoperability, allowing consumers to use the purchased content in their equipments of choice. In this paper, we study on the security specification of configuration-driven interoperability for heterogeneous DRM systems, using the Common Criteria. Then, we study security boundary, security environment, security objectives, and rationale of an CTHDS_PP(Conversion Technologies of Heterogeneous DRM Systems Protection Profile) to find important security features. The CTHDS_PP gives a discussion covered the current security problems to conversion technologies and lists threats to solve those problems. Moreover, this CTHDS_PP can be used for potential developers and system integrators, and reviewed and assessed by evaluators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Microsoft Windows Media Rights Manager, http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx
iTunes FairPlay, http://www.apple.com/lu/support/itunes/authetication.html
PachyDRM, http://pachydrm.com
Secure Digital Container, http://www.digicont.com
International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 1 (2005)
International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 2 (2005)
International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 3 (2005)
International Standard ISO/IEC 15408, Common Methodology for Information Technology Security Evaluation, Evaluation methodology (2005)
http://digital-lifestyles.info/drm-interchange-alive-and-living-in-korea/
Herrmann, D.S.: Using the Common Criteria for IT Security Evaluation. Auerbach publications (2003)
Open Mobile Alliance, DRM Architecture Approved Version 2.0 (2006)
Apple Inc. Common Criteria Certification: Apple’s Ongoing Commitment to Security, Whitepaper
Jaafari, A.B.: Common Criteria for Information Technology Security Evaluation Mobile Phone Digital Rights Management Protection Profile, Polytechnic University (2004)
Jaafari, A.B.: Protection Profile Reuse: Case Study of the reusability of the Smart Card Protection Profile for producing the Mobile Phone Digital Rights Management Protction Profile, Polytechnic University (2004)
Naini, R.S., Sheppard, N.P., Uehara, T.: Import/Export in Digital Rights Management. In: ACM Workshop on Digital Rights Management (2004)
Koenen, R.H., Lacy, J., Mackay, M., Mitchell, S.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE 92, 883–897 (2004)
Bradley, W., Maher, D.: The NEMO P2P service orchestration framework. In: Proc. 37th Annu. Hawaii Int. Conf. System Sciences (2004)
Torres, V., Serrao, C., Dias, M.S., Delgado, J.: Open DRM and the Future of Media. IEEE Computer Society, Los Alamitos (2008)
Rump, N.: Can digital rights management be standardized? IEEE Signal Processing Magazine (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jo, H., Jeon, W., Lee, Y., Kim, S., Won, D. (2009). Security Specification for Conversion Technologies of Heterogeneous DRM Systems. In: Bao, F., Li, H., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2009. Lecture Notes in Computer Science, vol 5451. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00843-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-00843-6_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00842-9
Online ISBN: 978-3-642-00843-6
eBook Packages: Computer ScienceComputer Science (R0)