首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
The problem with rights expression languages 权利表达语言的问题
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179522
Pramod A. Jamkhedkar, G. Heileman, I. Martínez-Ortiz
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dearth of applications that make use of RELs, despite the fact that they have now been available since the late 1990's. We posit that one of the main impediments to the use of RELs is the complexity associated with understanding and using them. This results from the fact that the functionality needed to handle a wide variety of possible DRM scenarios is typically built into a REL, and it is often difficult to cleanly partition out only those pieces needed by a particular DRM application. Basing DRM system design on a layered architecture provides one way of achieving a partitioning and points to the need for a simple REL that is exclusively responsible for the expression of rights, while pushing much of the functionality found in current RELs into higher system layers. In order to demonstrate the usefulness of this approach, we provide an example implementation dealing with DRM-based negotiation.
在本文中,我们考虑了权利表达语言(REL)在数字版权管理(DRM)环境中应该提供的功能。我们首先要注意的是,尽管自20世纪90年代末以来已经可以使用rel,但很少有应用程序使用它。我们认为,使用rel的主要障碍之一是与理解和使用它们相关的复杂性。这是由于处理各种可能的DRM场景所需的功能通常内置于REL中,并且通常很难清晰地仅划分出特定DRM应用程序所需的那些部分。基于分层架构的DRM系统设计提供了一种实现分区的方法,并指出需要一个专门负责表达权限的简单REL,同时将当前REL中的许多功能推到更高的系统层。为了演示这种方法的有用性,我们提供了一个处理基于drm的协商的示例实现。
{"title":"The problem with rights expression languages","authors":"Pramod A. Jamkhedkar, G. Heileman, I. Martínez-Ortiz","doi":"10.1145/1179509.1179522","DOIUrl":"https://doi.org/10.1145/1179509.1179522","url":null,"abstract":"In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dearth of applications that make use of RELs, despite the fact that they have now been available since the late 1990's. We posit that one of the main impediments to the use of RELs is the complexity associated with understanding and using them. This results from the fact that the functionality needed to handle a wide variety of possible DRM scenarios is typically built into a REL, and it is often difficult to cleanly partition out only those pieces needed by a particular DRM application. Basing DRM system design on a layered architecture provides one way of achieving a partitioning and points to the need for a simple REL that is exclusively responsible for the expression of rights, while pushing much of the functionality found in current RELs into higher system layers. In order to demonstrate the usefulness of this approach, we provide an example implementation dealing with DRM-based negotiation.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127915919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Graceful infringement reactions in DRM systems DRM系统中的优雅侵权反应
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179526
S. Katzenbeisser, K. Kursawe, J. Talstra
In this paper, we propose an alternative DRM technology for next-generation optical media. Instead of implementing a hard access control mechanism, we propose a scheme that monitors the behavior of users in a privacy-preserving manner, detects potential infringement actions and reacts in a graceful way, which is dependent on the severity of infringements. The scheme is based on blacklists of known unauthorized content and compromised players, which are maintained by content providers and shipped alongside the content. Most of the functionality is implemented by content code provided on the disc, allowing for player independent and flexible reactions.
在本文中,我们提出了下一代光学媒体的替代DRM技术。代替硬访问控制机制,我们提出了一种方案,该方案以保护隐私的方式监控用户的行为,检测潜在的侵权行为并以一种优雅的方式做出反应,这取决于侵权的严重程度。该方案基于已知未经授权内容和受损玩家的黑名单,这些黑名单由内容提供商维护并与内容一起发布。大多数功能是由光盘上提供的内容代码实现的,允许玩家独立和灵活的反应。
{"title":"Graceful infringement reactions in DRM systems","authors":"S. Katzenbeisser, K. Kursawe, J. Talstra","doi":"10.1145/1179509.1179526","DOIUrl":"https://doi.org/10.1145/1179509.1179526","url":null,"abstract":"In this paper, we propose an alternative DRM technology for next-generation optical media. Instead of implementing a hard access control mechanism, we propose a scheme that monitors the behavior of users in a privacy-preserving manner, detects potential infringement actions and reacts in a graceful way, which is dependent on the severity of infringements. The scheme is based on blacklists of known unauthorized content and compromised players, which are maintained by content providers and shipped alongside the content. Most of the functionality is implemented by content code provided on the disc, allowing for player independent and flexible reactions.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127529337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Verifiable digital object identity system 可验证数字对象识别系统
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179514
A. Arnab, A. Hutchison
Identification is a two part system comprising of a token or label (an identifier) that can be used to reference an entity and a process that can be used to create label-entity associations and verify that the reference and entity belong together. There are a number of identity systems for digital objects that provide identifiers (such as the Handle system, the DOI and URIs). However none of these systems provide verification services. The primary application for our proposed system is in a DRM system, where it is necessary to correctly match users' use licenses to the digital objects covered by the use licenses. In such a case, incorrect associations are effectively failures of the system, and could have wide ranging legal and economic impact, depending on the nature of the protected data.In this paper we present an identity system for digital objects that support verification and the related details such as the identifier format, the verification process as well as a protocol to create identifiers for digital objects.
标识是一个由两部分组成的系统,包括一个可用于引用实体的令牌或标签(标识符),以及一个可用于创建标签-实体关联并验证引用和实体是否属于一起的过程。有许多提供标识符的数字对象标识系统(如Handle系统、DOI和uri)。然而,这些系统都不提供核查服务。我们提出的系统的主要应用是在DRM系统中,其中有必要将用户的使用许可与使用许可所涵盖的数字对象正确匹配。在这种情况下,不正确的关联实际上是系统的故障,并可能产生广泛的法律和经济影响,具体取决于受保护数据的性质。本文提出了一种支持验证的数字对象身份系统,给出了标识符格式、验证过程以及创建数字对象标识符的协议等相关细节。
{"title":"Verifiable digital object identity system","authors":"A. Arnab, A. Hutchison","doi":"10.1145/1179509.1179514","DOIUrl":"https://doi.org/10.1145/1179509.1179514","url":null,"abstract":"Identification is a two part system comprising of a token or label (an identifier) that can be used to reference an entity and a process that can be used to create label-entity associations and verify that the reference and entity belong together. There are a number of identity systems for digital objects that provide identifiers (such as the Handle system, the DOI and URIs). However none of these systems provide verification services. The primary application for our proposed system is in a DRM system, where it is necessary to correctly match users' use licenses to the digital objects covered by the use licenses. In such a case, incorrect associations are effectively failures of the system, and could have wide ranging legal and economic impact, depending on the nature of the protected data.In this paper we present an identity system for digital objects that support verification and the related details such as the identifier format, the verification process as well as a protocol to create identifiers for digital objects.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130854386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Consumers, fans, and control: what the games industry can teach Hollywood about DRM 消费者,粉丝和控制:游戏产业可以教给好莱坞关于DRM的什么
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179511
S. Landau, Renée Stratulate, Doug Twilleager
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights management (DRM) that only allows the user to view the film rather than copy, edit, or create new content. Meanwhile, the experience that the Internet generation has of interacting with, rather than consuming, content, could be the basis for a new business for Hollywood: films that enable users to interact directly by putting themselves (and others) into the movie. In this paper we examine massive multi-player online role-playing games (MMORPGs), in which players exercise design technologies and tools that further their roles and play. MMORPGs are rapidly gaining audience share. We posit that non-restrictive, or exible, digital-rights management is in the movie industry's economic interest.
通过立法和技术,电影业一直在寻求完全控制对其创造的比特的使用;他们的模式是“限制性”数字版权管理(DRM),只允许用户观看电影,而不能复制、编辑或创建新内容。与此同时,互联网一代拥有的与内容互动而不是消费内容的体验,可能成为好莱坞新业务的基础:让用户通过将自己(和他人)放入电影中来直接互动的电影。在本文中,我们研究了大型多人在线角色扮演游戏(mmorpg),在这些游戏中,玩家运用设计技术和工具来推进他们的角色和玩法。mmorpg正在迅速获得用户份额。我们认为,非限制性或灵活的数字版权管理符合电影行业的经济利益。
{"title":"Consumers, fans, and control: what the games industry can teach Hollywood about DRM","authors":"S. Landau, Renée Stratulate, Doug Twilleager","doi":"10.1145/1179509.1179511","DOIUrl":"https://doi.org/10.1145/1179509.1179511","url":null,"abstract":"Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is \"restrictive\" digital-rights management (DRM) that only allows the user to view the film rather than copy, edit, or create new content. Meanwhile, the experience that the Internet generation has of interacting with, rather than consuming, content, could be the basis for a new business for Hollywood: films that enable users to interact directly by putting themselves (and others) into the movie. In this paper we examine massive multi-player online role-playing games (MMORPGs), in which players exercise design technologies and tools that further their roles and play. MMORPGs are rapidly gaining audience share. We posit that non-restrictive, or exible, digital-rights management is in the movie industry's economic interest.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122323965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Vicarious infringement creates a privacy ceiling 替代侵权造成了隐私上限
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179512
Janice Y. Tsai, L. Cranor, S. Craver
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTun-es, there is considerable potential for collecting personal information about customers, monitoring their usage habits, or even exerting control over their behavior - for example, restricting what can be done with a purchased song. A privacy ceiling is an effective limit to these privacy intrusions, created by the perceived or actual legal liability of possessing too much information or control. As we show in this paper, the risk is not simply that of customer backlash, but liability for a customer's actions, owing to the ability to identify, report, or prevent them from taking those actions. In some cases high-tech businesses have been obligated to divulge their store of personal information or to police their customers at the demand of third parties; this unwanted result derives from the possession of too much information or control for the company's own good. We argue that vicarious infringement liability in particular creates a privacy ceiling, a point beyond which there is no economic incentive to intrude on a user's privacy; and, indeed, there is an incentive to architect one's business so that such intrusions are difficult or impossible.
从互联网服务提供商到电子商务网站,再到像苹果itunes这样的音乐商店等高科技企业,都有收集客户个人信息、监控他们的使用习惯,甚至控制他们的行为的巨大潜力——例如,限制对购买的歌曲的操作。隐私上限是对这些隐私侵犯的有效限制,这些侵犯是由拥有过多信息或控制权的感知或实际法律责任造成的。正如我们在本文中所展示的那样,风险不仅仅是客户的反弹,而是对客户行为的责任,由于识别、报告或阻止他们采取这些行为的能力。在某些情况下,高科技企业有义务披露其存储的个人信息,或应第三方要求对其客户进行监管;这种不想要的结果源于为了公司自身利益而拥有过多的信息或控制权。我们认为,替代侵权责任尤其创造了一个隐私上限,超过这一点就没有侵犯用户隐私的经济动机;而且,确实存在这样一种动机,即设计自己的业务,使此类入侵变得困难或不可能。
{"title":"Vicarious infringement creates a privacy ceiling","authors":"Janice Y. Tsai, L. Cranor, S. Craver","doi":"10.1145/1179509.1179512","DOIUrl":"https://doi.org/10.1145/1179509.1179512","url":null,"abstract":"In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTun-es, there is considerable potential for collecting personal information about customers, monitoring their usage habits, or even exerting control over their behavior - for example, restricting what can be done with a purchased song. A privacy ceiling is an effective limit to these privacy intrusions, created by the perceived or actual legal liability of possessing too much information or control. As we show in this paper, the risk is not simply that of customer backlash, but liability for a customer's actions, owing to the ability to identify, report, or prevent them from taking those actions. In some cases high-tech businesses have been obligated to divulge their store of personal information or to police their customers at the demand of third parties; this unwanted result derives from the possession of too much information or control for the company's own good. We argue that vicarious infringement liability in particular creates a privacy ceiling, a point beyond which there is no economic incentive to intrude on a user's privacy; and, indeed, there is an incentive to architect one's business so that such intrusions are difficult or impossible.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On interoperability of DRM 论DRM的互操作性
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179519
T. Kalker
The use of Digital Rights Management (DRM) technologies for the enforcement of digital media usage models is currently subject of a heated debate. Content creators, owners and distributors argue that DRM technologies are needed to protect their Intellectual Property (IP) from unauthorized access. A counter argument from the Information Technology (IT) and Consumer Electronics (CE) industries states that DRM technologies are obstacles to innovation. Academic institutions add to the discussion by claiming that DRM technologies and associated legislation interfere with their academic mission. Yet another point of view is provided by consumer organizations who claim that DRM technology interferes with basic personal rights, such as the right to make back-up copies for personal use. Finally, national governments express concern that the deployment of DRM technology violates open market rules and regulations and is associated with anti-competitive behavior. This last issue has lately gained increased attention in a number of European countries. In this talk we argue that a number of the concern listed above can be resolved by introducing a sufficiently powerful DRM interoperability framework. In particular we discuss the CORAL DRM interoperability framework that allows multiple DRM systems to seamlessly work together while at the same time requiring minimal modification to participating DRM systems. After introducing the problem of DRM interoperability the following topics will be addressed: (1) approaches to DRM interoperability, (2) introduction to the CORAL architecture, (3) building ecosystems on top of Coral, (4) integrating DRM systems into CORAL and (5) deploying CORAL. We end the talk by going back to the initial problem statement, summarizing to what extent CORAL resolves the identified issues and what work remains to be done.
使用数字版权管理(DRM)技术来执行数字媒体使用模型目前是一个激烈争论的主题。内容创建者、所有者和发布者认为需要DRM技术来保护他们的知识产权(IP)免受未经授权的访问。来自信息技术(IT)和消费电子(CE)行业的反对意见指出,DRM技术是创新的障碍。学术机构也加入了讨论,声称DRM技术和相关立法干扰了他们的学术使命。然而,消费者组织提出了另一种观点,他们声称DRM技术干涉了基本的个人权利,例如为个人使用制作备份副本的权利。最后,各国政府表示担心,DRM技术的部署违反了开放市场的规则和规定,并与反竞争行为有关。最后这个问题最近在一些欧洲国家引起了越来越多的注意。在本次演讲中,我们认为可以通过引入一个足够强大的DRM互操作性框架来解决上面列出的许多问题。我们特别讨论了CORAL DRM互操作性框架,它允许多个DRM系统无缝地协同工作,同时只需要对参与的DRM系统进行最小的修改。在介绍DRM互操作性问题之后,将讨论以下主题:(1)DRM互操作性的方法,(2)CORAL架构的介绍,(3)在CORAL之上构建生态系统,(4)将DRM系统集成到CORAL中,(5)部署CORAL。我们以回到最初的问题陈述来结束谈话,总结CORAL在多大程度上解决了已确定的问题,以及还有哪些工作有待完成。
{"title":"On interoperability of DRM","authors":"T. Kalker","doi":"10.1145/1179509.1179519","DOIUrl":"https://doi.org/10.1145/1179509.1179519","url":null,"abstract":"The use of Digital Rights Management (DRM) technologies for the enforcement of digital media usage models is currently subject of a heated debate. Content creators, owners and distributors argue that DRM technologies are needed to protect their Intellectual Property (IP) from unauthorized access. A counter argument from the Information Technology (IT) and Consumer Electronics (CE) industries states that DRM technologies are obstacles to innovation. Academic institutions add to the discussion by claiming that DRM technologies and associated legislation interfere with their academic mission. Yet another point of view is provided by consumer organizations who claim that DRM technology interferes with basic personal rights, such as the right to make back-up copies for personal use. Finally, national governments express concern that the deployment of DRM technology violates open market rules and regulations and is associated with anti-competitive behavior. This last issue has lately gained increased attention in a number of European countries. In this talk we argue that a number of the concern listed above can be resolved by introducing a sufficiently powerful DRM interoperability framework. In particular we discuss the CORAL DRM interoperability framework that allows multiple DRM systems to seamlessly work together while at the same time requiring minimal modification to participating DRM systems. After introducing the problem of DRM interoperability the following topics will be addressed: (1) approaches to DRM interoperability, (2) introduction to the CORAL architecture, (3) building ecosystems on top of Coral, (4) integrating DRM systems into CORAL and (5) deploying CORAL. We end the talk by going back to the initial problem statement, summarizing to what extent CORAL resolves the identified issues and what work remains to be done.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133020033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy-enhanced superdistribution of layered content with trusted access control 具有可信访问控制的分层内容的增强隐私的超分布
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179517
Daniel J. T. Chong, R. Deng
Traditional superdistribution citemori: superdistribution approaches do not address consumer privacy issues and also do not reliably prevent the malicious consumer from indiscriminately copying and redistributing the decryption keys or the decrypted content. The layered nature of common digital content can also be exploited to efficiently provide the consumer with choices over the quality of the content, allowing him/her to pay less for lower quality consumption and vice versa. This paper presents a system that superdistributes encrypted layered content and (1) allows the consumer to select a quality level at which to decrypt and consume the content; (2) prevents the merchant from knowing which exact content package is consumed by the consumer, hence enhancing consumer privacy; and (3) through trusted access control, prevents the consumer from indiscriminately copying and redistributing the decryption keys or the decrypted content, thus achieving a form of digital rights management.
传统的超级分发:超级分发方法不能解决消费者隐私问题,也不能可靠地防止恶意消费者不加选择地复制和重新分发解密密钥或解密内容。普通数字内容的层次性也可以被有效地利用,为消费者提供对内容质量的选择,让他/她为低质量的消费支付更少的钱,反之亦然。本文提出了一个超级分发加密分层内容的系统,并且(1)允许消费者选择解密和消费内容的质量级别;(2)防止商家知道消费者究竟消费了哪个内容包,从而增强了消费者的隐私;(3)通过可信访问控制,防止消费者不加选择地复制和重新分发解密密钥或解密内容,从而实现一种数字版权管理形式。
{"title":"Privacy-enhanced superdistribution of layered content with trusted access control","authors":"Daniel J. T. Chong, R. Deng","doi":"10.1145/1179509.1179517","DOIUrl":"https://doi.org/10.1145/1179509.1179517","url":null,"abstract":"Traditional superdistribution citemori: superdistribution approaches do not address consumer privacy issues and also do not reliably prevent the malicious consumer from indiscriminately copying and redistributing the decryption keys or the decrypted content. The layered nature of common digital content can also be exploited to efficiently provide the consumer with choices over the quality of the content, allowing him/her to pay less for lower quality consumption and vice versa. This paper presents a system that superdistributes encrypted layered content and (1) allows the consumer to select a quality level at which to decrypt and consume the content; (2) prevents the merchant from knowing which exact content package is consumed by the consumer, hence enhancing consumer privacy; and (3) through trusted access control, prevents the consumer from indiscriminately copying and redistributing the decryption keys or the decrypted content, thus achieving a form of digital rights management.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Towards an open, trusted digital rights management platform 迈向开放、可信的数字版权管理平台
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179525
Andrew Cooper, Andrew P. Martin
Trusted computing has received criticism from those who fear it will be used by influential market forces to exert power over the software used on consumer platforms. This paper describes an open architecture for digital rights management (DRM) enforcement on trusted computing platforms that empowers the consumer to select their operating-system and applications, including open-source options, without weakening the strength of the security functions. A key component in the architecture is a security manager that enforces mandatory access controls on shared devices, restricted information flows between virtual machines, and DRM policy on protected objects. The paper describes two use-cases: a DRM scenario with protected media content and remote home-working on sensitive medical data.
可信计算受到了一些人的批评,他们担心有影响力的市场力量会利用可信计算对消费者平台上使用的软件施加影响。本文描述了在可信计算平台上实施数字版权管理(DRM)的开放体系结构,该体系结构使消费者能够选择他们的操作系统和应用程序,包括开源选项,而不会削弱安全功能的强度。该体系结构中的一个关键组件是安全管理器,它在共享设备上执行强制访问控制,在虚拟机之间限制信息流,并在受保护对象上执行DRM策略。本文描述了两个用例:具有受保护的媒体内容的DRM场景和对敏感医疗数据进行远程在家办公。
{"title":"Towards an open, trusted digital rights management platform","authors":"Andrew Cooper, Andrew P. Martin","doi":"10.1145/1179509.1179525","DOIUrl":"https://doi.org/10.1145/1179509.1179525","url":null,"abstract":"Trusted computing has received criticism from those who fear it will be used by influential market forces to exert power over the software used on consumer platforms. This paper describes an open architecture for digital rights management (DRM) enforcement on trusted computing platforms that empowers the consumer to select their operating-system and applications, including open-source options, without weakening the strength of the security functions. A key component in the architecture is a security manager that enforces mandatory access controls on shared devices, restricted information flows between virtual machines, and DRM policy on protected objects. The paper describes two use-cases: a DRM scenario with protected media content and remote home-working on sensitive medical data.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Securing sensitive content in a view-only file system 保护仅视图文件系统中的敏感内容
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179515
Kevin Borders, Xin Zhao, A. Prakash
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spyware, removable media, and mobile devices, which make this a very hard problem. The problem becomes even more difficult when the adversary is somebody who is authorized to view the data. This is what is commonly referred to as an insider information leak. Insider leaks often occur out of malice, but sometimes are just due to plain negligence, as was the case with a recent leak of 26 million U.S. veterans' names, birth dates, and social security numbers. Current systems make an attempt to protect against this type of disclosure, but use rudimentary techniques that can be easily bypassed by a knowledgeable attacker. Examples include disabling "print" and "save" menu options within an application or scanning network traffic for signatures of known sensitive content. This paper examines a new method for protecting sensitive content from unauthorized disclosure, a View-Only File System (VOFS). VOFS relies on trusted computing primitives and virtual machine (VM) technology to provide a much greater level of security than current systems. In VOFS, a secure virtual machine on the client authenticates itself with a content provider and downloads sensitive data. Before allowing the user to view the data in his or her non-secure VM, the VOFS client disables non-essential device output. This prevents the user, or any malicious software, from printing, uploading, or stealing the sensitive content. When the user is done viewing a sensitive file, VOFS will reset the machine to previous state and resume normal device activity. Our goal is to provide near-seamless access to view-only files, while at the same time securing them from unauthorized digital replication. This paper presents the initial design, development plan, and evaluation plan for VOFS.
计算机安全最基本的问题之一是保护敏感的数字信息免遭未经授权的泄露。有许多挑战,如间谍软件、可移动媒体和移动设备,使这成为一个非常困难的问题。当对手是被授权查看数据的人时,问题变得更加困难。这就是通常所说的内幕信息泄露。内部人员的泄密往往是出于恶意,但有时只是由于纯粹的疏忽,比如最近泄露了2600万美国退伍军人的姓名、出生日期和社会安全号码。目前的系统试图防止这种类型的泄露,但使用的是很简单的技术,很容易被知识渊博的攻击者绕过。示例包括禁用应用程序中的“打印”和“保存”菜单选项,或扫描网络流量以查找已知敏感内容的签名。本文研究了一种保护敏感内容免受未经授权泄露的新方法,即仅查看文件系统(VOFS)。VOFS依赖于可信计算原语和虚拟机(VM)技术来提供比当前系统更高级别的安全性。在VOFS中,客户机上的安全虚拟机通过内容提供程序对自己进行身份验证,并下载敏感数据。在允许用户查看其非安全虚拟机中的数据之前,VOFS客户端会禁用非必要的设备输出。这可以防止用户或任何恶意软件打印、上传或窃取敏感内容。当用户完成查看敏感文件时,VOFS会将机器重置为以前的状态并恢复正常的设备活动。我们的目标是提供对只读文件近乎无缝的访问,同时保护它们免受未经授权的数字复制。本文介绍了VOFS的初步设计、开发计划和评估方案。
{"title":"Securing sensitive content in a view-only file system","authors":"Kevin Borders, Xin Zhao, A. Prakash","doi":"10.1145/1179509.1179515","DOIUrl":"https://doi.org/10.1145/1179509.1179515","url":null,"abstract":"One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spyware, removable media, and mobile devices, which make this a very hard problem. The problem becomes even more difficult when the adversary is somebody who is authorized to view the data. This is what is commonly referred to as an insider information leak. Insider leaks often occur out of malice, but sometimes are just due to plain negligence, as was the case with a recent leak of 26 million U.S. veterans' names, birth dates, and social security numbers. Current systems make an attempt to protect against this type of disclosure, but use rudimentary techniques that can be easily bypassed by a knowledgeable attacker. Examples include disabling \"print\" and \"save\" menu options within an application or scanning network traffic for signatures of known sensitive content. This paper examines a new method for protecting sensitive content from unauthorized disclosure, a View-Only File System (VOFS). VOFS relies on trusted computing primitives and virtual machine (VM) technology to provide a much greater level of security than current systems. In VOFS, a secure virtual machine on the client authenticates itself with a content provider and downloads sensitive data. Before allowing the user to view the data in his or her non-secure VM, the VOFS client disables non-essential device output. This prevents the user, or any malicious software, from printing, uploading, or stealing the sensitive content. When the user is done viewing a sensitive file, VOFS will reset the machine to previous state and resume normal device activity. Our goal is to provide near-seamless access to view-only files, while at the same time securing them from unauthorized digital replication. This paper presents the initial design, development plan, and evaluation plan for VOFS.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132145342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Proteus: virtualization for diversified tamper-resistance Proteus:多样化防篡改的虚拟化
Pub Date : 2006-10-30 DOI: 10.1145/1179509.1179521
Bertrand Anckaert, Mariusz H. Jakubowski, R. Venkatesan
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy of the software can be reused against any copy of the software. Diversity is an important tool to overcome this problem. It allows for renewable defenses in space, by giving every user a different copy, and renewable defenses in time when combined with tailored updates. This paper studies the possibilities and limitations of using virtualization to open a new set of opportunities to make diverse copies of a piece of software and to make individual copies more tamper-resistant. The performance impact is considerable and indicates that these techniques are best avoided in performance-critical parts of the code.
尽管软件提供商付出了巨大的努力,但软件保护机制仍然经常被破坏。由于当前的分布模型,针对软件的一个副本的攻击可以被重用来针对软件的任何副本。多样性是克服这一问题的重要工具。它允许在空间上进行可更新的防御,通过给每个用户提供不同的副本,并在与定制更新相结合时及时进行可更新的防御。本文研究了使用虚拟化的可能性和局限性,为创建一个软件的不同副本和使单个副本更具防篡改性提供了一系列新的机会。性能影响是相当大的,并且表明最好避免在代码的性能关键部分使用这些技术。
{"title":"Proteus: virtualization for diversified tamper-resistance","authors":"Bertrand Anckaert, Mariusz H. Jakubowski, R. Venkatesan","doi":"10.1145/1179509.1179521","DOIUrl":"https://doi.org/10.1145/1179509.1179521","url":null,"abstract":"Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy of the software can be reused against any copy of the software. Diversity is an important tool to overcome this problem. It allows for renewable defenses in space, by giving every user a different copy, and renewable defenses in time when combined with tailored updates. This paper studies the possibilities and limitations of using virtualization to open a new set of opportunities to make diverse copies of a piece of software and to make individual copies more tamper-resistant. The performance impact is considerable and indicates that these techniques are best avoided in performance-critical parts of the code.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121041912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1