This Article 
 Bibliographic References 
 Add to: 
How Viable Is Digital Rights Management?
April 2009 (vol. 42 no. 4)
pp. 28-34
Seong Oun Hwang, Hongik University, Republic of Korea
Technologies that aim to protect digital content have fallen short of their mission. The computing community must find ways to make protection schemes interoperable and adopt a use model that lifts restrictions on paid-for protected content.

1. "Common Criteria for Information Technology Security Evaluation, v 2.1 (ISO/IEC 15408)," NIST, 2000.
2. B. Barak et al., "On the (Im)possibility of Obfuscating Programs," Proc. Advances in Cryptology (Crypto 01), Springer, 2001, pp. 1-18.
3. S. Goldwasser and Y. Tauman Kalai, "On the Impossibility of Obfuscation with Auxiliary Inputs," Proc. 46th IEEE Symp. Foundations of Computer Science (FOCS 05), IEEE Press, 2005, pp. 553-562.
4. D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. Information Theory, vol. 44, no.5, IEEE Press, 1998, pp. 1897-1905.

Index Terms:
IPv6, IPv4, network security, network attacks, IPSec, Internet Protocol
Seong Oun Hwang, "How Viable Is Digital Rights Management?," Computer, vol. 42, no. 4, pp. 28-34, April 2009, doi:10.1109/MC.2009.120
Usage of this product signifies your acceptance of the Terms of Use.