Protection profile for connected interoperable DRM framework

Donghyun Choi, Sungkyu Cho, Dongho Won, Seung-Joo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Nowadays, interoperability of DRM is an issue in market. It can be achieved by three different approaches: full-format, configuration-driven and connected interoperability. In particular, the connected interoperability refers to devices that contact an online translation service. When the consumers want to transfer content to a different device, they access the online translation server and rely upon online services. The connected interoperability does not need defining one standard and has the ability to monitor. Therefore, the connected interoperability is used more than others in market. However, in the connected interoperability, even though two distinct DRM systems want to share the content, they cannot share the content if the online translation server does not guarantee reliability. In this paper, we propose a protection profile for connected interoperable DRM framework to solve the problem. This PP can be used to establish trust between the DRM provider and the online translation server for interoperability. If that happens, the connected interoperable DRM market will be more active than before.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages320-332
Number of pages13
Volume5379 LNCS
DOIs
Publication statusPublished - 2009 Nov 9
Externally publishedYes
Event9th International Workshop on Information Security Applications, WISA 2008 - Jeju Island, Korea, Republic of
Duration: 2008 Sep 232008 Sep 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5379 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other9th International Workshop on Information Security Applications, WISA 2008
CountryKorea, Republic of
CityJeju Island
Period08/9/2308/9/25

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Protection profile for connected interoperable DRM framework'. Together they form a unique fingerprint.

  • Cite this

    Choi, D., Cho, S., Won, D., & Kim, S-J. (2009). Protection profile for connected interoperable DRM framework. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5379 LNCS, pp. 320-332). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5379 LNCS). https://doi.org/10.1007/978-3-642-00306-6_24