The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - April (2009 vol.42)
pp: 28-34
Seong Oun Hwang , Hongik University, Republic of Korea
ABSTRACT
Technologies that aim to protect digital content have fallen short of their mission. The computing community must find ways to make protection schemes interoperable and adopt a use model that lifts restrictions on paid-for protected content.
INDEX TERMS
IPv6, IPv4, network security, network attacks, IPSec, Internet Protocol
CITATION
Seong Oun Hwang, "How Viable Is Digital Rights Management?", Computer, vol.42, no. 4, pp. 28-34, April 2009, doi:10.1109/MC.2009.120
REFERENCES
1. "Common Criteria for Information Technology Security Evaluation, v 2.1 (ISO/IEC 15408)," NIST, 2000.
2. B. Barak et al., "On the (Im)possibility of Obfuscating Programs," Proc. Advances in Cryptology (Crypto 01), Springer, 2001, pp. 1-18.
3. S. Goldwasser and Y. Tauman Kalai, "On the Impossibility of Obfuscation with Auxiliary Inputs," Proc. 46th IEEE Symp. Foundations of Computer Science (FOCS 05), IEEE Press, 2005, pp. 553-562.
4. D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. Information Theory, vol. 44, no.5, IEEE Press, 1998, pp. 1897-1905.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool