This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
How Viable Is Digital Rights Management?
April 2009 (vol. 42 no. 4)
pp. 28-34
Seong Oun Hwang, Hongik University, Republic of Korea
Technologies that aim to protect digital content have fallen short of their mission. The computing community must find ways to make protection schemes interoperable and adopt a use model that lifts restrictions on paid-for protected content.

1. "Common Criteria for Information Technology Security Evaluation, v 2.1 (ISO/IEC 15408)," NIST, 2000.
2. B. Barak et al., "On the (Im)possibility of Obfuscating Programs," Proc. Advances in Cryptology (Crypto 01), Springer, 2001, pp. 1-18.
3. S. Goldwasser and Y. Tauman Kalai, "On the Impossibility of Obfuscation with Auxiliary Inputs," Proc. 46th IEEE Symp. Foundations of Computer Science (FOCS 05), IEEE Press, 2005, pp. 553-562.
4. D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. Information Theory, vol. 44, no.5, IEEE Press, 1998, pp. 1897-1905.

Index Terms:
IPv6, IPv4, network security, network attacks, IPSec, Internet Protocol
Citation:
Seong Oun Hwang, "How Viable Is Digital Rights Management?," Computer, vol. 42, no. 4, pp. 28-34, April 2009, doi:10.1109/MC.2009.120
Usage of this product signifies your acceptance of the Terms of Use.