首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
Protecting digital archives at the Greek Orthodox Archdiocese of America 保护美国希腊东正教大主教管区的数字档案
Pub Date : 2003-10-27 DOI: 10.1145/947380.947384
H. Goldstein, G. Heileman, M. Heileman, Theo Nicolakis, C. Pizano, Bianca Prumo, Michael D. Webb
The Greek Orthodox Archdiocese of America~(GOA) has amassed a rich and varied collection of artifacts associated with two thousand years of religious and historical tradition, as well as more than a century of chronicles in America. The items in this archive include iconography, art, photographs, letters, and other memorabilia. The GOA has endeavored to digitize these assets in order to preserve them, while at the same time make them more accessible for appropriate and beneficial uses. Specifically, the Department of Internet Ministries at the GOA was tasked with overseeing this digitization effort, as well as with the creation of appropriate tools and technology for accessing the resulting digital archive. The challenges associated with this work included the wide diversity of media types, the need to attach specific restrictions to the use of different items, and the desire to provide a user experience that was transparent and not daunting or discouraging. At a fairly early stage it was determined that emerging digital rights management (DRM) capabilities would be necessary in order to realize the goals of the project. These capabilities, however, had to be implemented while accounting for a previously deployed digital asset management (DAM) and web publishing system, not to mention the existing IT infrastructure. This paper presents a case study that describes the efforts associated with the specification, creation, and deployment of an effective DRM system that incorporates rights enforcement technology, and works in synergy with the previously deployed DAM system at the GOA.
美国希腊东正教大主教管区(GOA)收藏了丰富多样的文物,这些文物与两千年的宗教和历史传统以及一个多世纪的美国编年史有关。这个档案中的物品包括肖像、艺术品、照片、信件和其他纪念品。印度政府努力将这些资产数字化,以保存它们,同时使它们更容易获得,以供适当和有益的用途。具体而言,印度政府互联网部的任务是监督这一数字化工作,并创造适当的工具和技术来访问由此产生的数字档案。与这项工作相关的挑战包括媒体类型的广泛多样性,需要对不同项目的使用附加特定限制,以及提供透明且不令人生畏或沮丧的用户体验的愿望。在相当早期的阶段,就确定了新兴的数字版权管理(DRM)功能是实现项目目标所必需的。然而,这些功能必须在考虑先前部署的数字资产管理(DAM)和网络发布系统的同时实现,更不用说现有的IT基础设施了。本文提供了一个案例研究,描述了与规范、创建和部署一个有效的DRM系统相关的工作,该系统包含了权利执行技术,并与GOA先前部署的DAM系统协同工作。
{"title":"Protecting digital archives at the Greek Orthodox Archdiocese of America","authors":"H. Goldstein, G. Heileman, M. Heileman, Theo Nicolakis, C. Pizano, Bianca Prumo, Michael D. Webb","doi":"10.1145/947380.947384","DOIUrl":"https://doi.org/10.1145/947380.947384","url":null,"abstract":"The Greek Orthodox Archdiocese of America~(GOA) has amassed a rich and varied collection of artifacts associated with two thousand years of religious and historical tradition, as well as more than a century of chronicles in America. The items in this archive include iconography, art, photographs, letters, and other memorabilia. The GOA has endeavored to digitize these assets in order to preserve them, while at the same time make them more accessible for appropriate and beneficial uses. Specifically, the Department of Internet Ministries at the GOA was tasked with overseeing this digitization effort, as well as with the creation of appropriate tools and technology for accessing the resulting digital archive. The challenges associated with this work included the wide diversity of media types, the need to attach specific restrictions to the use of different items, and the desire to provide a user experience that was transparent and not daunting or discouraging. At a fairly early stage it was determined that emerging digital rights management (DRM) capabilities would be necessary in order to realize the goals of the project. These capabilities, however, had to be implemented while accounting for a previously deployed digital asset management (DAM) and web publishing system, not to mention the existing IT infrastructure. This paper presents a case study that describes the efforts associated with the specification, creation, and deployment of an effective DRM system that incorporates rights enforcement technology, and works in synergy with the previously deployed DAM system at the GOA.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Constructing a virtual primary key for fingerprinting relational data 构造用于识别关系数据的虚拟主键
Pub Date : 2003-10-27 DOI: 10.1145/947380.947398
Yingjiu Li, Vipin Swarup, S. Jajodia
Agrawal and Kiernan's watermarking technique for database relations [1] and Li et al's fingerprinting extension [6] both depend critically on primary key attributes. Hence, those techniques cannot embed marks in database relations without primary key attributes. Further, the techniques are vulnerable to simple attacks that alter or delete the primary key attribute.This paper proposes a new fingerprinting scheme that does not depend on a primary key attribute. The scheme constructs virtual primary keys from the most significant bits of some of each tuple's attributes. The actual attributes that are used to construct then virtual primary key differ from tuple to tuple. Attribute selection is based on a secret key that is known to the merchant only. Further, the selection does not depend on an apriori ordering over the attributes, or on knowledge of the original relation or fingerprint codeword.The virtual primary keys are then used in fingerprinting as in previous work [6]. Rigorous analysis shows that, with high probability, only embedded fingerprints can be detected and embedded fingerprints cannot be modified or erased by a variety of attacks. Attacks include adding, deleting, shuffling, or modifying tuples or attributes (including a primary key attribute if one exists), guessing secret keys, and colluding with other recipients of a relation.
Agrawal和Kiernan的数据库关系水印技术[1]和Li等人的指纹扩展[6]都严重依赖于主键属性。因此,这些技术不能在没有主键属性的数据库关系中嵌入标记。此外,这些技术很容易受到更改或删除主键属性的简单攻击。本文提出了一种新的不依赖于主键属性的指纹识别方案。该方案从每个元组的某些属性的最高有效位构造虚拟主键。用于构造虚拟主键的实际属性因元组而异。属性选择基于只有商家知道的密钥。此外,选择不依赖于对属性的先验排序,也不依赖于对原始关系或指纹码字的了解。虚拟主键然后在指纹识别中使用,就像之前的工作[6]一样。严格的分析表明,在很大的概率下,只能检测到嵌入式指纹,并且嵌入式指纹无法被各种攻击修改或擦除。攻击包括添加、删除、改组或修改元组或属性(包括主键属性,如果存在的话)、猜测密钥以及与关系的其他接收者串通。
{"title":"Constructing a virtual primary key for fingerprinting relational data","authors":"Yingjiu Li, Vipin Swarup, S. Jajodia","doi":"10.1145/947380.947398","DOIUrl":"https://doi.org/10.1145/947380.947398","url":null,"abstract":"Agrawal and Kiernan's watermarking technique for database relations [1] and Li et al's fingerprinting extension [6] both depend critically on primary key attributes. Hence, those techniques cannot embed marks in database relations without primary key attributes. Further, the techniques are vulnerable to simple attacks that alter or delete the primary key attribute.This paper proposes a new fingerprinting scheme that does not depend on a primary key attribute. The scheme constructs virtual primary keys from the most significant bits of some of each tuple's attributes. The actual attributes that are used to construct then virtual primary key differ from tuple to tuple. Attribute selection is based on a secret key that is known to the merchant only. Further, the selection does not depend on an apriori ordering over the attributes, or on knowledge of the original relation or fingerprint codeword.The virtual primary keys are then used in fingerprinting as in previous work [6]. Rigorous analysis shows that, with high probability, only embedded fingerprints can be detected and embedded fingerprints cannot be modified or erased by a variety of attacks. Attacks include adding, deleting, shuffling, or modifying tuples or attributes (including a primary key attribute if one exists), guessing secret keys, and colluding with other recipients of a relation.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127051374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Watermarking schemes provably secure against copy and ambiguity attacks 可以证明,水印方案是安全的,不受复制和歧义攻击
Pub Date : 2003-10-27 DOI: 10.1145/947380.947395
André Adelsbach, S. Katzenbeisser, H. Veith
Protocol attacks against watermarking schemes pose a threat to modern digital rights management systems; for example, a successful attack may allow to copy a watermark between two digital objects or to forge a valid watermark. Such attacks enable a traitor to hinder a dispute resolving process or accuse an innocent party of a copyright infringement. Secure DRM systems based on watermarks must therefore prevent such protocol attacks. In this paper we introduce a formal framework that enables us to assert rigorously the security of watermarks against protocol attacks. Furthermore, we show how watermarking schemes can be secured against some protocol attacks by using a cryptographic signature of a trusted third party.
针对水印方案的协议攻击对现代数字版权管理系统构成了威胁;例如,成功的攻击可能允许在两个数字对象之间复制水印或伪造有效的水印。这种攻击使叛徒能够阻碍争议解决过程或指控无辜的一方侵犯版权。因此,基于水印的安全DRM系统必须防止此类协议攻击。在本文中,我们引入了一个正式的框架,使我们能够严格地断言水印的安全性免受协议攻击。此外,我们还展示了如何通过使用可信第三方的加密签名来保护水印方案免受某些协议攻击。
{"title":"Watermarking schemes provably secure against copy and ambiguity attacks","authors":"André Adelsbach, S. Katzenbeisser, H. Veith","doi":"10.1145/947380.947395","DOIUrl":"https://doi.org/10.1145/947380.947395","url":null,"abstract":"Protocol attacks against watermarking schemes pose a threat to modern digital rights management systems; for example, a successful attack may allow to copy a watermark between two digital objects or to forge a valid watermark. Such attacks enable a traitor to hinder a dispute resolving process or accuse an innocent party of a copyright infringement. Secure DRM systems based on watermarks must therefore prevent such protocol attacks. In this paper we introduce a formal framework that enables us to assert rigorously the security of watermarks against protocol attacks. Furthermore, we show how watermarking schemes can be secured against some protocol attacks by using a cryptographic signature of a trusted third party.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123686950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Content and expression-based copy recognition for intellectual property protection 基于内容和表达的知识产权保护复制识别
Pub Date : 2003-10-27 DOI: 10.1145/947380.947393
Özlem Uzuner, Randall Davis
Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years. This paper presents a way of fingerprinting text documents that can be used to identify content and expression similarities in documents, as a way of facilitating tracking of digital copies of works, to ensure proper compensation to content owners.The fingerprints we collected consist of surface, syntactic, and semantic features of documents. Because they reflect mostly how things are said, we call these features stylistic fingerprints. However, how things are said are not independent of what is said, therefore these features have predictive power with respect to both content and expression.We tested the ability of these stylistic fingerprints to identify content and expression similarities between documents using a corpus of translated novels. On this corpus, these fingerprints identified the source of a given book chapter (content) successfully 90% of the time and the translator of the chapter (expression) 67% of the time using ten-fold cross validation and decision trees.In comparison, fingerprints based on the vocabularies of documents recognized the source of a given book chapter accurately 93% of the time and the expression of a particular translator 61% of the time.We believe that the right fingerprints can identify modified and literal copies of works, securing revenues for content owners. Enabling the content owners to secure revenues from distribution of their works can alleviate the digital copyright problem and reduce the need to prevent distribution, giving a chance to solutions that promote uninhibited distribution and use of works by the public.
近年来,保护数字世界的版权和内容所有者的收入变得越来越重要。本文提出了一种文本文档指纹识别方法,可用于识别文档中的内容和表达相似性,以方便对作品的数字副本进行跟踪,以确保对内容所有者进行适当的补偿。我们收集的指纹包括文档的表面、语法和语义特征。因为它们主要反映了说话的方式,我们把这些特征称为风格指纹。然而,说话的方式并不独立于所说的内容,因此这些特征在内容和表达方面都具有预测能力。我们使用翻译的小说语料库测试了这些风格指纹识别文档之间内容和表达相似性的能力。在这个语料库上,使用十倍交叉验证和决策树,这些指纹识别出给定书籍章节(内容)的来源的成功率为90%,章节(表达)的译者的成功率为67%。相比之下,基于文件词汇表的指纹识别给定书籍章节来源的准确率为93%,特定译者的表达准确率为61%。我们相信,正确的指纹可以识别作品的修改和文字副本,为内容所有者确保收入。使内容所有者能够从其作品的发行中获得收入,可以缓解数字版权问题,减少防止发行的需要,从而为促进公众不受限制地分发和使用作品的解决方案提供机会。
{"title":"Content and expression-based copy recognition for intellectual property protection","authors":"Özlem Uzuner, Randall Davis","doi":"10.1145/947380.947393","DOIUrl":"https://doi.org/10.1145/947380.947393","url":null,"abstract":"Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years. This paper presents a way of fingerprinting text documents that can be used to identify content and expression similarities in documents, as a way of facilitating tracking of digital copies of works, to ensure proper compensation to content owners.The fingerprints we collected consist of surface, syntactic, and semantic features of documents. Because they reflect mostly how things are said, we call these features stylistic fingerprints. However, how things are said are not independent of what is said, therefore these features have predictive power with respect to both content and expression.We tested the ability of these stylistic fingerprints to identify content and expression similarities between documents using a corpus of translated novels. On this corpus, these fingerprints identified the source of a given book chapter (content) successfully 90% of the time and the translator of the chapter (expression) 67% of the time using ten-fold cross validation and decision trees.In comparison, fingerprints based on the vocabularies of documents recognized the source of a given book chapter accurately 93% of the time and the expression of a particular translator 61% of the time.We believe that the right fingerprints can identify modified and literal copies of works, securing revenues for content owners. Enabling the content owners to secure revenues from distribution of their works can alleviate the digital copyright problem and reduce the need to prevent distribution, giving a chance to solutions that promote uninhibited distribution and use of works by the public.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Broadcast encryption with short keys and transmissions 使用短密钥和传输的广播加密
Pub Date : 2003-10-27 DOI: 10.1145/947380.947388
Nuttapong Attrapadung, K. Kobara, H. Imai
Broadcast Encryption allows a broadcaster to broadcast an encrypted message so that only a dynamically changing designated group of users can decrypt it. The stateless setting considers the case where the private key at each user is never updated. A central open problem in this area is to design a stateless scheme where both the size of transmission header which encapsulates the session key and the size of private key at each user are small and independent of the number of users (all/privileged/revoked users). We propose schemes that meet this requirement by providing a tradeoff between security against collusion and non-secret storage size. The proposed schemes are based upon new notions of one-way accumulators which are of independent interest.
广播加密允许广播者广播加密的消息,以便只有动态更改的指定用户组才能解密它。无状态设置考虑的情况是,每个用户的私钥永远不会更新。该领域的一个中心开放问题是设计一个无状态方案,其中封装会话密钥的传输头的大小和每个用户的私钥的大小都很小,并且与用户(所有/特权/撤销用户)的数量无关。我们提出的方案通过在抗勾结安全性和非秘密存储大小之间提供权衡来满足这一要求。所提出的方案是基于单向累加器的新概念,这是独立的兴趣。
{"title":"Broadcast encryption with short keys and transmissions","authors":"Nuttapong Attrapadung, K. Kobara, H. Imai","doi":"10.1145/947380.947388","DOIUrl":"https://doi.org/10.1145/947380.947388","url":null,"abstract":"Broadcast Encryption allows a broadcaster to broadcast an encrypted message so that only a dynamically changing designated group of users can decrypt it. The stateless setting considers the case where the private key at each user is never updated. A central open problem in this area is to design a stateless scheme where both the size of transmission header which encapsulates the session key and the size of private key at each user are small and independent of the number of users (all/privileged/revoked users). We propose schemes that meet this requirement by providing a tradeoff between security against collusion and non-secret storage size. The proposed schemes are based upon new notions of one-way accumulators which are of independent interest.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The effects of invisible watermarking on satellite image classification 不可见水印对卫星图像分类的影响
Pub Date : 2003-10-27 DOI: 10.1145/947380.947396
G. Heileman, Yunlong Yang
Remotely sensed satellite images are an important source of geographical data commonly used as input for various types of classification algorithms. For example, these algorithms are commonly used to classify earth land cover, analyze crop conditions, assess mineral and petroleum deposits, and quantify urban growth. Many vendors of digital images are using or are considering the use of invisible watermarking as a means of protecting their images from theft or unauthorized usage. Indeed, the use of invisible watermarking is routinely considered for use in emerging digital rights management~(DRM) systems that may be deployed to manage and protect the rights associated with satellite imagery, or types of "scientific" imagery~(e.g., in the medical field) that routinely have mathematical analyses applied to them. The concern then is how this watermarking impacts subsequent analyses. Specifically, the invisible watermarking process involves making imperceptible modifications to the pixel values of an image. However, even though these changes may be imperceptible to the human observer, they must be of sufficient magnitude to allow for watermark detection. Because of this, the use of invisible watermarking can also impact the performance of image classification algorithms. This paper is concerned with quantifying the impact that invisible watermarks have on satellite image classification. In particular, Landsat satellite images were watermarked using a number of well-known techniques, and the misclassification that resulted from this watermarking was measured. Experimental results show that even weak watermarking can lead to significant misclassification when common image classification algorithms are applied. Thus, the use of watermarking within DRM systems needs to be carefully considered, with particular attention given to the type of content that the watermarking will be applied to.
遥感卫星图像是地理数据的重要来源,常用作各类分类算法的输入。例如,这些算法通常用于对地球土地覆盖进行分类,分析作物状况,评估矿产和石油储量,以及量化城市增长。许多数字图像供应商正在使用或正在考虑使用不可见的水印作为保护其图像免遭盗窃或未经授权使用的一种手段。实际上,在新兴的数字版权管理(DRM)系统中,通常会考虑使用隐形水印,这些系统可用于管理和保护与卫星图像或“科学”图像相关的权利。(在医学领域)通常会用到数学分析。接下来的问题是这种水印如何影响后续的分析。具体来说,不可见水印过程涉及对图像的像素值进行不可察觉的修改。然而,即使这些变化对人类观察者来说是难以察觉的,它们也必须有足够的幅度来允许水印检测。因此,不可见水印的使用也会影响图像分类算法的性能。研究了不可见水印对卫星图像分类的影响。特别是,陆地卫星图像使用了一些众所周知的技术进行了水印,并且测量了这种水印所导致的错误分类。实验结果表明,在使用常用的图像分类算法时,即使是弱水印也会导致严重的误分类。因此,需要仔细考虑在DRM系统中使用水印,特别要注意将应用水印的内容类型。
{"title":"The effects of invisible watermarking on satellite image classification","authors":"G. Heileman, Yunlong Yang","doi":"10.1145/947380.947396","DOIUrl":"https://doi.org/10.1145/947380.947396","url":null,"abstract":"Remotely sensed satellite images are an important source of geographical data commonly used as input for various types of classification algorithms. For example, these algorithms are commonly used to classify earth land cover, analyze crop conditions, assess mineral and petroleum deposits, and quantify urban growth. Many vendors of digital images are using or are considering the use of invisible watermarking as a means of protecting their images from theft or unauthorized usage. Indeed, the use of invisible watermarking is routinely considered for use in emerging digital rights management~(DRM) systems that may be deployed to manage and protect the rights associated with satellite imagery, or types of \"scientific\" imagery~(e.g., in the medical field) that routinely have mathematical analyses applied to them. The concern then is how this watermarking impacts subsequent analyses. Specifically, the invisible watermarking process involves making imperceptible modifications to the pixel values of an image. However, even though these changes may be imperceptible to the human observer, they must be of sufficient magnitude to allow for watermark detection. Because of this, the use of invisible watermarking can also impact the performance of image classification algorithms. This paper is concerned with quantifying the impact that invisible watermarks have on satellite image classification. In particular, Landsat satellite images were watermarked using a number of well-known techniques, and the misclassification that resulted from this watermarking was measured. Experimental results show that even weak watermarking can lead to significant misclassification when common image classification algorithms are applied. Thus, the use of watermarking within DRM systems needs to be carefully considered, with particular attention given to the type of content that the watermarking will be applied to.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126180529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Digital rights management in a 3G mobile phone and beyond 3G手机及以后的数字版权管理
Pub Date : 2003-10-27 DOI: 10.1145/947380.947385
T. S. Messerges, E. A. Dabbish
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requirements for digital rights management are reviewed. Next, a framework for protecting digital content in the embedded environment of a mobile phone is proposed and the elements in this system are defined. The means to enforce security in this system are described and a novel "Family Domain" approach to content management is introduced. Our new approach uses key sharing to help alleviate bad user experiences that are associated with some rights management systems. Examples outlining the enrollment of devices and the acquisition, rendering, and superdistribution of content are shown. Our proposed system is not only applicable to a mobile phone system, but may also be extended to other embedded systems, such as personal digital assistants, set-top boxes, or personal computers.
在本文中,我们研究了如何在3G移动电话和其他设备中安全地管理数字项目的版权保护。首先,回顾了数字版权管理的基本概念、策略和要求。其次,提出了一个在手机嵌入式环境中保护数字内容的框架,并定义了该系统中的元素。描述了在该系统中加强安全性的方法,并介绍了一种新的“家族域”内容管理方法。我们的新方法使用密钥共享来帮助减轻与某些权限管理系统相关的不良用户体验。给出了概述设备注册以及内容的获取、呈现和超分发的示例。我们提出的系统不仅适用于移动电话系统,还可以扩展到其他嵌入式系统,如个人数字助理、机顶盒或个人电脑。
{"title":"Digital rights management in a 3G mobile phone and beyond","authors":"T. S. Messerges, E. A. Dabbish","doi":"10.1145/947380.947385","DOIUrl":"https://doi.org/10.1145/947380.947385","url":null,"abstract":"In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requirements for digital rights management are reviewed. Next, a framework for protecting digital content in the embedded environment of a mobile phone is proposed and the elements in this system are defined. The means to enforce security in this system are described and a novel \"Family Domain\" approach to content management is introduced. Our new approach uses key sharing to help alleviate bad user experiences that are associated with some rights management systems. Examples outlining the enrollment of devices and the acquisition, rendering, and superdistribution of content are shown. Our proposed system is not only applicable to a mobile phone system, but may also be extended to other embedded systems, such as personal digital assistants, set-top boxes, or personal computers.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133146221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Breaking and repairing optimistic fair exchange from PODC 2003 打破和修复乐观的公平交易从PODC 2003
Pub Date : 2003-10-27 DOI: 10.1145/947380.947387
Y. Dodis, L. Reyzin
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already in the registration phase: the honest-but-curious arbitrator can easily determine the signer's secret key.On a positive note, the authors of [22] informally introduced a connection between fair exchange and "sequential two-party multisignature schemes" (which we call two-signatures), but used an insecure two-signature scheme in their actual construction. Nonetheless, we show that this connection can be properly formalized to imply provably secure fair exchange protocols. By utilizing the state-of-the-art non-interactive two-signature of Boldyreva [6], we obtain an efficient and provably secure (in the random oracle model) fair exchange protocol, which is based on GDH signatures [9].Of independent interest, we introduce a unified model for non-interactive fair exchange protocols, which results in a new primitive we call verifiably committed signatures. Verifiably committed signatures generalize (non-interactive) verifiably encrypted signatures [8] and two-signatures, both of which are sufficient for fair exchange.
在PODC 2003中,Park, Chong, Siegel和Ray[22]提出了一种基于RSA签名的公平交换乐观协议。我们证明了他们的协议在注册阶段就已经是完全可破坏的:诚实但好奇的仲裁员可以很容易地确定签名者的密钥。积极的一面是,[22]的作者非正式地引入了公平交换和“顺序两方多重签名方案”(我们称之为双签名)之间的联系,但在实际构建中使用了不安全的双签名方案。尽管如此,我们证明了这种连接可以适当地形式化,以暗示可证明的安全公平交换协议。利用Boldyreva[6]的最先进的非交互式双签名,我们获得了一种高效且可证明安全的(在随机oracle模型中)基于GDH签名的公平交换协议[9]。我们为非交互式公平交换协议引入了一个统一的模型,它产生了一个新的原语,我们称之为可验证的提交签名。可验证提交签名推广了(非交互的)可验证加密签名[8]和双签名,这两种签名都足以进行公平交换。
{"title":"Breaking and repairing optimistic fair exchange from PODC 2003","authors":"Y. Dodis, L. Reyzin","doi":"10.1145/947380.947387","DOIUrl":"https://doi.org/10.1145/947380.947387","url":null,"abstract":"In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already in the registration phase: the honest-but-curious arbitrator can easily determine the signer's secret key.On a positive note, the authors of [22] informally introduced a connection between fair exchange and \"sequential two-party multisignature schemes\" (which we call two-signatures), but used an insecure two-signature scheme in their actual construction. Nonetheless, we show that this connection can be properly formalized to imply provably secure fair exchange protocols. By utilizing the state-of-the-art non-interactive two-signature of Boldyreva [6], we obtain an efficient and provably secure (in the random oracle model) fair exchange protocol, which is based on GDH signatures [9].Of independent interest, we introduce a unified model for non-interactive fair exchange protocols, which results in a new primitive we call verifiably committed signatures. Verifiably committed signatures generalize (non-interactive) verifiably encrypted signatures [8] and two-signatures, both of which are sufficient for fair exchange.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 138
The IP war: apocalypse or revolution? IP战争:末日还是革命?
Pub Date : 2003-10-27 DOI: 10.1145/947380.947381
T. Gal, H. Singer, Laird Popkin
In the Foundation series, Asimov predicted a 1,000 years of darkness following the fall of the galactic empire. In the book Noir, K.W Jeter describes a world where IP is the ultimate war. Combine them together and you have likely scenario No. 1.The Internet era enabled communication and information exchange on a global scale. But it also opened the door to copyright infringement on a global scale. Music, books, movies, software, games, speeches, research papers - everything is now fair game. The only protection the movie studios ever had was bandwidth - and it is quickly evaporating due to faster network connectivity via broadband and smarter downloading technologies such as BitTorrent.Intellectual property, copyrights and the like are the key to a democratic, free-market civilization and greed is a prime mover - so if all is 'free' and we have a 'constitutional right' to 'share' - where is the future of innovation and creativity?This paper will describe the current state of the great IP war (early stages of border unrest and some commando activity), outline potential futures, and make some suggestions as to how to help direct the world toward a reasonable future.In each case, we will cover the business, legal, and social implications of the scenario and we will discuss the various ways the computing industry can help to influence the future outcome.
在《基地》系列中,阿西莫夫预言银河帝国灭亡后会有1000年的黑暗。在《黑色》一书中,k.w. Jeter描述了一个IP是终极战争的世界。把它们结合在一起,你可能会得到第一种情况。互联网时代使全球范围内的通信和信息交流成为可能。但它也为全球范围内的版权侵权打开了大门。音乐、书籍、电影、软件、游戏、演讲、研究论文——现在一切都是公平的。电影制片厂唯一的保护就是带宽——由于宽带更快的网络连接和更智能的下载技术(如BitTorrent),带宽正在迅速消失。知识产权、版权等是民主、自由市场文明的关键,贪婪是原动力——所以如果一切都是“自由的”,我们有“宪法权利”来“分享”——创新和创造力的未来在哪里?本文将描述伟大的IP战争的当前状态(边境动乱和一些突击队活动的早期阶段),概述潜在的未来,并提出一些建议,如何帮助引导世界走向一个合理的未来。在每种情况下,我们都将讨论该场景的业务、法律和社会含义,并讨论计算行业可以帮助影响未来结果的各种方法。
{"title":"The IP war: apocalypse or revolution?","authors":"T. Gal, H. Singer, Laird Popkin","doi":"10.1145/947380.947381","DOIUrl":"https://doi.org/10.1145/947380.947381","url":null,"abstract":"In the Foundation series, Asimov predicted a 1,000 years of darkness following the fall of the galactic empire. In the book Noir, K.W Jeter describes a world where IP is the ultimate war. Combine them together and you have likely scenario No. 1.The Internet era enabled communication and information exchange on a global scale. But it also opened the door to copyright infringement on a global scale. Music, books, movies, software, games, speeches, research papers - everything is now fair game. The only protection the movie studios ever had was bandwidth - and it is quickly evaporating due to faster network connectivity via broadband and smarter downloading technologies such as BitTorrent.Intellectual property, copyrights and the like are the key to a democratic, free-market civilization and greed is a prime mover - so if all is 'free' and we have a 'constitutional right' to 'share' - where is the future of innovation and creativity?This paper will describe the current state of the great IP war (early stages of border unrest and some commando activity), outline potential futures, and make some suggestions as to how to help direct the world toward a reasonable future.In each case, we will cover the business, legal, and social implications of the scenario and we will discuss the various ways the computing industry can help to influence the future outcome.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130522797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts 从基于odrl的数字合同中提取的访问权的执行经验
Pub Date : 2003-10-27 DOI: 10.1145/947380.947392
S. Guth, G. Neumann, Mark Strembeck
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (CoSa) which is an approach to provide a generic representation of contract information on top of rights expression languages. We give an overview of the design and implementation of the xoRELInterpreter software component. In particular, the xoRELInterpreter interprets digital contracts that are based on rights expression languages (e.g. ODRL or XrML) and builds a runtime CoSa object model. We describe how the xorbac access control component and the xoRELInterpreter component are used to enforce access rights that we extract from ODRL-based digital contracts. Thus, our approach describes how ODRL-based contracts can be used as a means to disseminate certain types of access control information in distributed systems.
在本文中,我们介绍了从基于odrl的数字合同中提取的访问权的执行经验。我们引入了广义契约模式(CoSa),它是在权利表达语言之上提供契约信息的通用表示的一种方法。我们概述了xoRELInterpreter软件组件的设计和实现。特别是,xoRELInterpreter解释基于权利表达语言(例如ODRL或xml)的数字合同,并构建运行时CoSa对象模型。我们描述了如何使用xorbac访问控制组件和xoRELInterpreter组件来执行我们从基于odrl的数字合同中提取的访问权限。因此,我们的方法描述了如何将基于odrl的契约用作在分布式系统中传播某些类型的访问控制信息的手段。
{"title":"Experiences with the enforcement of access rights extracted from ODRL-based digital contracts","authors":"S. Guth, G. Neumann, Mark Strembeck","doi":"10.1145/947380.947392","DOIUrl":"https://doi.org/10.1145/947380.947392","url":null,"abstract":"In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (CoSa) which is an approach to provide a generic representation of contract information on top of rights expression languages. We give an overview of the design and implementation of the xoRELInterpreter software component. In particular, the xoRELInterpreter interprets digital contracts that are based on rights expression languages (e.g. ODRL or XrML) and builds a runtime CoSa object model. We describe how the xorbac access control component and the xoRELInterpreter component are used to enforce access rights that we extract from ODRL-based digital contracts. Thus, our approach describes how ODRL-based contracts can be used as a means to disseminate certain types of access control information in distributed systems.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1