首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
A security architecture for pay-per-view business models in conditional access systems 条件访问系统中按次付费业务模型的安全体系结构
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314279
Bart Kirkels, Martijn Maas, Peter Roelse
This paper presents a security architecture for a pay-TV conditional access system, assuming the most challenging scenario from a designer's point of view; a pay-per-view business model in a broadcast-only environment. The starting point for the security architecture is a broadcast encryption scheme and a queueing network for injecting conditional access messages into the broadcast stream. Design constraints related to a conditional access client are taken into account in the design of the architecture, as well as a maximum amount of bandwidth available for the transmission of conditional access messages. In addition, commercial design objectives like quick content access and quick client activation are also addressed. A substantial part of the paper is devoted to the design and analysis of an efficient injector model based on queueing theory, defining the strategy for injecting conditional access messages into the broadcast stream. A numerical example with real-world values of the parameters is used to demonstrate the effectiveness of the presented approach.
本文提出了付费电视条件访问系统的安全架构,从设计者的角度假设了最具挑战性的场景;在仅限广播的环境中按次付费的商业模式。安全体系结构的起点是一个广播加密方案和一个用于向广播流注入条件访问消息的排队网络。在体系结构设计中考虑了与条件访问客户机相关的设计约束,以及可用于传输条件访问消息的最大带宽量。此外,商业设计目标,如快速内容访问和快速客户端激活也得到解决。本文的主要内容是基于排队理论的高效注入器模型的设计和分析,该模型定义了向广播流注入条件访问消息的策略。通过一个具有实际参数值的数值算例,验证了所提方法的有效性。
{"title":"A security architecture for pay-per-view business models in conditional access systems","authors":"Bart Kirkels, Martijn Maas, Peter Roelse","doi":"10.1145/1314276.1314279","DOIUrl":"https://doi.org/10.1145/1314276.1314279","url":null,"abstract":"This paper presents a security architecture for a pay-TV conditional access system, assuming the most challenging scenario from a designer's point of view; a pay-per-view business model in a broadcast-only environment. The starting point for the security architecture is a broadcast encryption scheme and a queueing network for injecting conditional access messages into the broadcast stream. Design constraints related to a conditional access client are taken into account in the design of the architecture, as well as a maximum amount of bandwidth available for the transmission of conditional access messages. In addition, commercial design objectives like quick content access and quick client activation are also addressed. A substantial part of the paper is devoted to the design and analysis of an efficient injector model based on queueing theory, defining the strategy for injecting conditional access messages into the broadcast stream. A numerical example with real-world values of the parameters is used to demonstrate the effectiveness of the presented approach.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On implementing mpeg-21 intellectual property management and protection 论实施mpeg-21知识产权管理与保护
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314280
N. Sheppard
The MPEG-21 Intellectual Property Management and Protection ("IPMP") Components specify a framework for inter-operable and renewable digital rights management based on IPMP tools that implement proprietary digital rights management features. MPEG-21 defines the mechanism by which protected multimedia objects are associated with proprietary IPMP tools, but does not specify the interface through which IPMP tools and MPEG-21 terminals communicate.This paper describes an implementation of the IPMP components including an interface to IPMP tools based on the MPEG Rights Expression Language; dynamic construction of authorisation proofs that permit a principal to carry out an action; and a cryptographic architecture bound to the existence of authorisation proofs. This implementation has been applied to scenarios in copyright protection, privacy protection and corporate document protection, suggesting that ``IPMP'' may be useful in applications other than intellectual property.
MPEG-21知识产权管理和保护(“IPMP”)组件为实现专有数字版权管理功能的IPMP工具指定了一个可互操作和可更新的数字版权管理框架。MPEG-21定义了受保护的多媒体对象与专有IPMP工具关联的机制,但没有指定IPMP工具与MPEG-21终端通信的接口。本文描述了一种基于MPEG权利表达语言的IPMP组件的实现,包括与IPMP工具的接口;动态构建允许主体执行操作的授权证明;以及与授权证明的存在相绑定的加密体系结构。这种实现已经应用于版权保护、隐私保护和公司文件保护等场景,这表明“IPMP”可能在知识产权以外的应用中也很有用。
{"title":"On implementing mpeg-21 intellectual property management and protection","authors":"N. Sheppard","doi":"10.1145/1314276.1314280","DOIUrl":"https://doi.org/10.1145/1314276.1314280","url":null,"abstract":"The MPEG-21 Intellectual Property Management and Protection (\"IPMP\") Components specify a framework for inter-operable and renewable digital rights management based on IPMP tools that implement proprietary digital rights management features. MPEG-21 defines the mechanism by which protected multimedia objects are associated with proprietary IPMP tools, but does not specify the interface through which IPMP tools and MPEG-21 terminals communicate.This paper describes an implementation of the IPMP components including an interface to IPMP tools based on the MPEG Rights Expression Language; dynamic construction of authorisation proofs that permit a principal to carry out an action; and a cryptographic architecture bound to the existence of authorisation proofs. This implementation has been applied to scenarios in copyright protection, privacy protection and corporate document protection, suggesting that ``IPMP'' may be useful in applications other than intellectual property.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Randomized radon transforms for biometric authentication via fingerprint hashing 基于指纹哈希的随机氡变换生物特征认证
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314293
Mariusz H. Jakubowski, R. Venkatesan
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various key-determined metrics over fingerprint images, producing short hash strings that cannot be used to reconstruct the source fingerprints without knowledge of the key. This can be considered a randomized form of the Radon transform, where a custom metric replaces the standard line-based metric. Resistant to minor distortions and noise, the resulting fingerprint hashes are useful for secure biometric authentication, either augmenting or replacing traditional password hashes. This approach can help increase the security and usability of Web services and other client-server systems.
我们提出了一种新的技术,用于生成生物特征指纹哈希,或人类指纹中包含的信息摘要。我们的方法计算和聚合指纹图像上的各种键确定指标,生成短哈希字符串,如果不知道键,就不能用于重建源指纹。这可以被认为是Radon变换的随机形式,其中自定义度量取代了标准的基于线的度量。生成的指纹哈希可以抵抗轻微的扭曲和噪声,对于安全的生物识别身份验证非常有用,可以增强或取代传统的密码哈希。这种方法可以帮助提高Web服务和其他客户机-服务器系统的安全性和可用性。
{"title":"Randomized radon transforms for biometric authentication via fingerprint hashing","authors":"Mariusz H. Jakubowski, R. Venkatesan","doi":"10.1145/1314276.1314293","DOIUrl":"https://doi.org/10.1145/1314276.1314293","url":null,"abstract":"We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various key-determined metrics over fingerprint images, producing short hash strings that cannot be used to reconstruct the source fingerprints without knowledge of the key. This can be considered a randomized form of the Radon transform, where a custom metric replaces the standard line-based metric. Resistant to minor distortions and noise, the resulting fingerprint hashes are useful for secure biometric authentication, either augmenting or replacing traditional password hashes. This approach can help increase the security and usability of Web services and other client-server systems.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The drm game drm游戏
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314287
G. Heileman, Pramod A. Jamkhedkar, J. Khoury, Curtis J. Hrncir
In this paper we cast DRM in a setting that allows us to model a number of current approaches as games. The DRM game is partitioned into two subgames, one that considers the game associated with content acquisition, and a second that considers how a consumer uses the content, along with a vendor's response to this usage. Examples are provided in order to demonstrate how these subgames correspond to real situations associated with content industries, and the conditions under which Nash equilibria will exist. These subgames form the primary stage of a repeated game that models a number of important long-term interactions between consumers and vendors. We analyze current strategies that attempt to influence the outcome of the repeated game, and we also consider a new type of architectural infrastructure that makes novel use of a trust authority in order to create a suitable environment for constructing DRM games that may prove useful in the future.
在本文中,我们将DRM置于一个允许我们将许多当前方法建模为游戏的环境中。DRM游戏分为两个子游戏,一个考虑与内容获取相关的游戏,另一个考虑消费者如何使用内容,以及供应商对这种使用的反应。为了展示这些子博弈如何与内容产业相关的实际情况相对应,以及纳什均衡存在的条件,本文提供了一些例子。这些子游戏构成了重复游戏的初级阶段,这些重复游戏模拟了消费者和供应商之间的许多重要的长期互动。我们分析了试图影响重复游戏结果的当前策略,我们还考虑了一种新型的架构基础设施,它新颖地使用了信任权威,以便为构建DRM游戏创造合适的环境,这种环境可能在未来被证明是有用的。
{"title":"The drm game","authors":"G. Heileman, Pramod A. Jamkhedkar, J. Khoury, Curtis J. Hrncir","doi":"10.1145/1314276.1314287","DOIUrl":"https://doi.org/10.1145/1314276.1314287","url":null,"abstract":"In this paper we cast DRM in a setting that allows us to model a number of current approaches as games. The DRM game is partitioned into two subgames, one that considers the game associated with content acquisition, and a second that considers how a consumer uses the content, along with a vendor's response to this usage. Examples are provided in order to demonstrate how these subgames correspond to real situations associated with content industries, and the conditions under which Nash equilibria will exist. These subgames form the primary stage of a repeated game that models a number of important long-term interactions between consumers and vendors. We analyze current strategies that attempt to influence the outcome of the repeated game, and we also consider a new type of architectural infrastructure that makes novel use of a trust authority in order to create a suitable environment for constructing DRM games that may prove useful in the future.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Protecting fair use from digital rights management in china 中国数字版权管理对合理使用的保护
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314284
Huijia Xie
The widespread applications of the digital rights management (DRM) in China now are challenging its traditional fair use doctrine. This paper gives an analysis of the existing Chinese laws and regulations that could be applied to protect fair use from DRM, focusing on the Chinese Copyright Act (CCA), the Regulations on the Protection of the Right of Communication through the Information Network (RPRCIN), Chinese Contract Law Code (CCLC), Chinese Consumer Rights and Interests Protection Law (CCRIPL), Chinese Anti-unfair Competition Law (CACL), explaining their meaning and application, and emphasizing their limitations. Against this background, the paper seeks to explore the possible approach that China could adopt to protect fair use from DRM, highlighting the CCA should shift the anti-circumvention legislation paradigm and incorporate standard contract terms as well as other pro-consumer regulations.
数字版权管理(DRM)在中国的广泛应用对传统的合理使用原则提出了挑战。本文分析了我国现行保护合理使用不受DRM影响的法律法规,重点分析了《著作权法》(CCA)、《信息网络传播权保护条例》(RPRCIN)、《合同法》(CCLC)、《消费者权益保护法》(CCRIPL)、《反不正当竞争法》(CACL)等法律法规的含义和适用,并强调了其局限性。在此背景下,本文试图探讨中国可能采取的保护合理使用免受DRM侵害的方法,强调CCA应转变反规避立法范式,纳入标准合同条款以及其他有利于消费者的法规。
{"title":"Protecting fair use from digital rights management in china","authors":"Huijia Xie","doi":"10.1145/1314276.1314284","DOIUrl":"https://doi.org/10.1145/1314276.1314284","url":null,"abstract":"The widespread applications of the digital rights management (DRM) in China now are challenging its traditional fair use doctrine. This paper gives an analysis of the existing Chinese laws and regulations that could be applied to protect fair use from DRM, focusing on the Chinese Copyright Act (CCA), the Regulations on the Protection of the Right of Communication through the Information Network (RPRCIN), Chinese Contract Law Code (CCLC), Chinese Consumer Rights and Interests Protection Law (CCRIPL), Chinese Anti-unfair Competition Law (CACL), explaining their meaning and application, and emphasizing their limitations. Against this background, the paper seeks to explore the possible approach that China could adopt to protect fair use from DRM, highlighting the CCA should shift the anti-circumvention legislation paradigm and incorporate standard contract terms as well as other pro-consumer regulations.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123339703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drm to counter side-channel attacks? Drm对抗侧信道攻击?
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314282
R. Benadjila, O. Billet, Stanislas Francfort
In the DRM setting, the attacker is a very powerful adversary, owning the software as well as the underlying hardware. This context is far different from the black-box attacker commonly considered in conventional cryptography.Therefore, cryptographers have tried to design new cryptographic tools fitting the DRM requirements. A related issuein cryptography is that of side-channel attacks, where theattacker is stronger than the black-box attacker, but usually weaker than a DRM attacker. In this paper, we aim toshow that the study of side-channel attacks can benefit fromDRM research, and in particular from the attacker modelsand solutions tailored to this specific setting. We focus ona specific issue, namely the cache attacks against the AES,and show how current counter-measures can be seen as restricted versions of a previous protection proposed in theDRM setting. We demonstrate that those kind of counter-measures are weak against cache-based side-channel attacks by reusing results from the DRM setting.
在DRM设置中,攻击者是一个非常强大的对手,拥有软件和底层硬件。这种情况与传统密码学中通常考虑的黑盒攻击者大不相同。因此,密码学家试图设计符合DRM要求的新密码学工具。密码学中的一个相关问题是侧信道攻击,攻击者比黑盒攻击者更强,但通常比DRM攻击者更弱。在本文中,我们的目标是表明对侧信道攻击的研究可以从drm研究中受益,特别是从针对这种特定设置的攻击者模型和解决方案中受益。我们将重点关注特定的问题,即针对AES的缓存攻击,并展示当前的对策如何被视为drm设置中提出的先前保护的限制版本。通过重用DRM设置的结果,我们证明了这些对抗措施对于基于缓存的侧通道攻击是很弱的。
{"title":"Drm to counter side-channel attacks?","authors":"R. Benadjila, O. Billet, Stanislas Francfort","doi":"10.1145/1314276.1314282","DOIUrl":"https://doi.org/10.1145/1314276.1314282","url":null,"abstract":"In the DRM setting, the attacker is a very powerful adversary, owning the software as well as the underlying hardware. This context is far different from the black-box attacker commonly considered in conventional cryptography.Therefore, cryptographers have tried to design new cryptographic tools fitting the DRM requirements. A related issuein cryptography is that of side-channel attacks, where theattacker is stronger than the black-box attacker, but usually weaker than a DRM attacker. In this paper, we aim toshow that the study of side-channel attacks can benefit fromDRM research, and in particular from the attacker modelsand solutions tailored to this specific setting. We focus ona specific issue, namely the cache attacks against the AES,and show how current counter-measures can be seen as restricted versions of a previous protection proposed in theDRM setting. We demonstrate that those kind of counter-measures are weak against cache-based side-channel attacks by reusing results from the DRM setting.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124572765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slicing obfuscations: design, correctness, and evaluation 切片混淆:设计、正确性和评估
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314290
A. Majumdar, Stephen Drape, C. Thomborson
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible from an adversary armed with reverse engineering tools. Slicing is a form of reverse engineering which aims to abstract away a subset of program code based on a particular program point and is considered to be a potent program comprehension technique. Thus, slicing could be used as a way of attacking obfuscated programs. It is challenging to manufacture obfuscating transforms that are provably resilient to slicing attacks.We show in this paper how we can utilise the information gained from slicing a program to aid us in designing obfuscations that are more resistant to slicing. We extend a previously proposed technique and provide proofs of correctness for our transforms. Finally, we illustrate our approach with a number of obfuscating transforms and provide empirical results using software engineering metrics.
混淆的目标是在不影响程序功能的情况下转换程序,这样程序中的一些秘密信息就可以尽可能长时间地隐藏起来,不被拥有逆向工程工具的对手发现。切片是逆向工程的一种形式,其目的是基于特定的程序点抽象出程序代码子集,被认为是一种有效的程序理解技术。因此,切片可以用作攻击混淆程序的一种方式。制造可以证明对切片攻击具有弹性的混淆变换是具有挑战性的。我们在本文中展示了我们如何利用从切片程序中获得的信息来帮助我们设计更能抵抗切片的混淆。我们扩展了先前提出的技术,并为我们的转换提供了正确性证明。最后,我们用一些混淆转换来说明我们的方法,并提供使用软件工程度量的经验结果。
{"title":"Slicing obfuscations: design, correctness, and evaluation","authors":"A. Majumdar, Stephen Drape, C. Thomborson","doi":"10.1145/1314276.1314290","DOIUrl":"https://doi.org/10.1145/1314276.1314290","url":null,"abstract":"The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible from an adversary armed with reverse engineering tools. Slicing is a form of reverse engineering which aims to abstract away a subset of program code based on a particular program point and is considered to be a potent program comprehension technique. Thus, slicing could be used as a way of attacking obfuscated programs. It is challenging to manufacture obfuscating transforms that are provably resilient to slicing attacks.We show in this paper how we can utilise the information gained from slicing a program to aid us in designing obfuscations that are more resistant to slicing. We extend a previously proposed technique and provide proofs of correctness for our transforms. Finally, we illustrate our approach with a number of obfuscating transforms and provide empirical results using software engineering metrics.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127677595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Data structures for limited oblivious execution of programs while preserving locality of reference 在保留引用局部性的同时,对程序进行有限的遗忘执行的数据结构
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314289
A. Varadarajan, R. Venkatesan, C. Rangan
We introduce a data structure for program execution under a limited oblivious execution model. For fully oblivious execution along the lines of Goldreich and Ostrovsky [2], one transforms a given program into a one that has totally random looking execution, based on some cryptographic assumptions and the existence of secure hardware. Totally random memory access patterns do not respect the locality of reference in programs to which the programs generally owe their efficiency. We propose a model that limits the obliviousness so as to enable efficient execution of the program; here the adversary marks a variable and tries to produce a list of candidate locations where it may be stored in after $T$-steps ofexecution. We propose a randomized algorithm based on splay trees,and prove a lower bound on such lists.
介绍了一种有限遗忘执行模型下程序执行的数据结构。为了按照Goldreich和Ostrovsky[2]的思路进行完全遗忘执行,基于一些加密假设和安全硬件的存在,将给定的程序转换为具有完全随机执行的程序。完全随机的内存访问模式不尊重程序中引用的局部性,而这通常是程序的效率所在。我们提出了一个限制遗忘的模型,从而使程序能够有效地执行;在这里,攻击者标记了一个变量,并试图生成一个候选位置列表,在执行$T$之后,该变量可能被存储在这些位置。我们提出了一种基于扩展树的随机化算法,并证明了这种列表的下界。
{"title":"Data structures for limited oblivious execution of programs while preserving locality of reference","authors":"A. Varadarajan, R. Venkatesan, C. Rangan","doi":"10.1145/1314276.1314289","DOIUrl":"https://doi.org/10.1145/1314276.1314289","url":null,"abstract":"We introduce a data structure for program execution under a limited oblivious execution model. For fully oblivious execution along the lines of Goldreich and Ostrovsky [2], one transforms a given program into a one that has totally random looking execution, based on some cryptographic assumptions and the existence of secure hardware. Totally random memory access patterns do not respect the locality of reference in programs to which the programs generally owe their efficiency. We propose a model that limits the obliviousness so as to enable efficient execution of the program; here the adversary marks a variable and tries to produce a list of candidate locations where it may be stored in after $T$-steps ofexecution. We propose a randomized algorithm based on splay trees,and prove a lower bound on such lists.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116988655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Persistent access control: a formal model for drm 持久访问控制:drm的正式模型
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314286
A. Arnab, A. Hutchison
Digital rights management (DRM) can be considered to be a mechanism to enforce access control over a resource without considering its location. There are currently no formal models for DRM, although there has been some work in analysing and formalising the interpretation of access control rules in DRM systems. A formal model for DRM is essential to provide specific access control semantics that are necessary for creating interoperable, unambiguous implementations. In this paper, we discuss how DRM differs as an access control model to the three well known traditional access control models - DAC, MAC and RBAC, and using these existing approaches motivate a set of requirements for a formal model for DRM. Thereafter, we present a formal description of LiREL, a rights expression language that is able to express access control policies and contractual agreement in a single use license. Our motivation with this approach is to identify the different components in a license contract and define how these components interact within themselves and with other components of the license. A formal notation allows for an uniform and unambiguous interpretation and implementation of the access control policies.
可以将数字版权管理(DRM)视为一种不考虑资源位置就对其实施访问控制的机制。目前还没有正式的DRM模型,尽管在分析和形式化DRM系统中访问控制规则的解释方面已经做了一些工作。一个正式的DRM模型对于提供创建可互操作的、明确的实现所必需的特定访问控制语义至关重要。在本文中,我们讨论了作为访问控制模型的DRM与三种众所周知的传统访问控制模型(DAC、MAC和RBAC)的不同之处,以及使用这些现有方法激发了对DRM正式模型的一组需求。此后,我们提出了LiREL的正式描述,LiREL是一种权利表达语言,能够在单一使用许可中表达访问控制策略和合同协议。我们使用这种方法的动机是识别许可证合同中的不同组件,并定义这些组件如何在它们自己内部以及与许可证的其他组件进行交互。正式符号允许对访问控制策略进行统一和明确的解释和实现。
{"title":"Persistent access control: a formal model for drm","authors":"A. Arnab, A. Hutchison","doi":"10.1145/1314276.1314286","DOIUrl":"https://doi.org/10.1145/1314276.1314286","url":null,"abstract":"Digital rights management (DRM) can be considered to be a mechanism to enforce access control over a resource without considering its location. There are currently no formal models for DRM, although there has been some work in analysing and formalising the interpretation of access control rules in DRM systems. A formal model for DRM is essential to provide specific access control semantics that are necessary for creating interoperable, unambiguous implementations. In this paper, we discuss how DRM differs as an access control model to the three well known traditional access control models - DAC, MAC and RBAC, and using these existing approaches motivate a set of requirements for a formal model for DRM. Thereafter, we present a formal description of LiREL, a rights expression language that is able to express access control policies and contractual agreement in a single use license. Our motivation with this approach is to identify the different components in a license contract and define how these components interact within themselves and with other components of the license. A formal notation allows for an uniform and unambiguous interpretation and implementation of the access control policies.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131160214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Towards a secure and interoperable DRM architecture 朝着安全和可互操作的DRM体系结构迈进
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179524
Gelareh Taban, A. Cárdenas, V. Gligor
In this paper we look at the problem of interoperability of digital rights management (DRM)systems in home networks. We introduce an intermediate module called the Domain Interoperability Manager (DIM) to efficiently deal with the problem of content and license translation across different DRM regimes. We also consider the threat model specific to interoperability systems, and introduce threats such as the cross-compliancy and splicing attacks. We formalize the adversary model and define security of an interoperable DRM system with respect to this adversary. We finalize by proposing detailed protocols which achieve our security requirements. In order to achieve these requirements we provide novel applications of recently proposed proxy resignature and proxy re-encryption algorithms.
本文研究了家庭网络中数字版权管理(DRM)系统的互操作性问题。我们引入了一个称为域互操作性管理器(DIM)的中间模块,以有效地处理跨不同DRM制度的内容和许可证转换问题。我们还考虑了特定于互操作性系统的威胁模型,并介绍了交叉遵从性和拼接攻击等威胁。我们将对手模型形式化,并针对该对手定义可互操作DRM系统的安全性。我们最后提出详细的协议,以达到我们的安全要求。为了实现这些要求,我们提供了最近提出的代理重新签名和代理重新加密算法的新应用。
{"title":"Towards a secure and interoperable DRM architecture","authors":"Gelareh Taban, A. Cárdenas, V. Gligor","doi":"10.1145/1179509.1179524","DOIUrl":"https://doi.org/10.1145/1179509.1179524","url":null,"abstract":"In this paper we look at the problem of interoperability of digital rights management (DRM)systems in home networks. We introduce an intermediate module called the Domain Interoperability Manager (DIM) to efficiently deal with the problem of content and license translation across different DRM regimes. We also consider the threat model specific to interoperability systems, and introduce threats such as the cross-compliancy and splicing attacks. We formalize the adversary model and define security of an interoperable DRM system with respect to this adversary. We finalize by proposing detailed protocols which achieve our security requirements. In order to achieve these requirements we provide novel applications of recently proposed proxy resignature and proxy re-encryption algorithms.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128788509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1