TY - GEN
T1 - Security specification for conversion technologies of heterogeneous drm systems
AU - Jo, Heasuk
AU - Jeon, Woongryul
AU - Lee, Yunho
AU - Kim, Seungjoo
AU - Won, Dongho
PY - 2009
Y1 - 2009
N2 - Digital Right Management (DRM) can be used to prohibit illegal reproduction, and redistribution of digital content, to protect copyrights. However, current DRM systems are incompatible and lack of interoperability which exchange of data, different platform, designed and protected by different content providers. To overcome these drawbacks, three ways of interoperability are full-formation interoperability, connected interoperability, configuration-driven interoperability, allowing consumers to use the purchased content in their equipments of choice. In this paper, we study on the security specification of configuration-driven interoperability for heterogeneous DRM systems, using the Common Criteria. Then, we study security boundary, security environment, security objectives, and rationale of an CTHDS-PP(Conversion Technologies of Heterogeneous DRM Systems Protection Profile) to find important security features. The CTHDS-PP gives a discussion covered the current security problems to conversion technologies and lists threats to solve those problems. Moreover, this CTHDS-PP can be used for potential developers and system integrators, and reviewed and assessed by evaluators.
AB - Digital Right Management (DRM) can be used to prohibit illegal reproduction, and redistribution of digital content, to protect copyrights. However, current DRM systems are incompatible and lack of interoperability which exchange of data, different platform, designed and protected by different content providers. To overcome these drawbacks, three ways of interoperability are full-formation interoperability, connected interoperability, configuration-driven interoperability, allowing consumers to use the purchased content in their equipments of choice. In this paper, we study on the security specification of configuration-driven interoperability for heterogeneous DRM systems, using the Common Criteria. Then, we study security boundary, security environment, security objectives, and rationale of an CTHDS-PP(Conversion Technologies of Heterogeneous DRM Systems Protection Profile) to find important security features. The CTHDS-PP gives a discussion covered the current security problems to conversion technologies and lists threats to solve those problems. Moreover, this CTHDS-PP can be used for potential developers and system integrators, and reviewed and assessed by evaluators.
KW - Common Criteria(CC)
KW - Digital rights management(DRM)
KW - Interoperability
KW - Protection Profile(PP)
UR - http://www.scopus.com/inward/record.url?scp=70350623253&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-00843-6_15
DO - 10.1007/978-3-642-00843-6_15
M3 - Conference contribution
AN - SCOPUS:70350623253
SN - 3642008429
SN - 9783642008429
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 159
EP - 170
BT - Information Security Practice and Experience - 5th International Conference, ISPEC 2009, Proceedings
T2 - 5th International Conference on Information Security Practice and Experience, ISPEC 2009
Y2 - 13 April 2009 through 15 April 2009
ER -