The Community for Technology Leaders
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) (2005)
Munich, Germany
July 19, 2005 to July 22, 2005
ISSN: 1530-1354
ISBN: 0-7695-2277-7
pp: 512-517
Thomas Hess , Munich School of Management
Vural Ünlü , Munich School of Management
Content providers are faced with massive intellectual properly piracy and resort to technical protection measures encapsulated in Digital Rights Management Systems (DRMS). Given the cost-beneflt trade-off of varying levels of content protection there is n need to implement a selected level of content protection. Based on a functional refkrence model of a DRMS, this paper proposes an access-usage-control-matrix to heuristically determine the protective strength of a given DRMS installation. The underlying assumption is that the combined robustness of the preventive security functions access control and usage control determines overall strength. The robustness of both matrix dimensions is refined with concrete authentication and client tamper-resistance methods.
Thomas Hess, Vural Ünlü, "The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection", Seventh IEEE International Conference on E-Commerce Technology (CEC'05), vol. 00, no. , pp. 512-517, 2005, doi:10.1109/ICECT.2005.90
103 ms
(Ver 3.3 (11022016))