Font Size: a A A

Digital Rights Management System Security

Posted on:2012-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:L WangFull Text:PDF
GTID:2208330335471957Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Along with the rapid development of the computer technology and internet, digital resources have being grown exponentially. Because digital media can be nondestructively copied and distributed, it can also be used and distributed illegally, which seriously violate the copyright of its owner. Numerious violations show that legal instruments cannot sufficiently protect the copyright of digital media content. The combination of legal means and technical means will be the only effective method to protect digital copyright.Digital rights management is the technology to protect digital media content from being illegally used. Nowadays, digital rights management technology has become an international academic and business research focus. Digital rights management's development is welcomed by creators of digital works and operators, because it has made great contributions to the protection of digital works. Consequently, digital rights management technology has broad application prospects.To protect digital media content being illegally used, people comphensively use cryptography, access control, digital watermarking, content management, trust system and other technologies in digital right mamagement systems. In this dissertation, we also follow the same methodology. The main work is as follows:(1) We surveyed the state of the art of digital rights management system research, introduced related laws and regulations; proposed a reference model and layered structure model of right management. We further proposed a rights management decision-making policy scheme. Finally, technical problems and legal issues of digital rights management system are introduced.(2) Existing digital rights management system typically focus on the protection of digital media content from unauthorized use, and do not take protecting sensitive information of the buyers into consideration. To enhance the protection of sensitive information, we proposed an attribute-based access control model with better adaptability and interoperability to protect sensitive information.(3) Digital rights management systems are mostly based on the cryptography. The current digital rights management system with distributed, multi-user feature lodge higher requirements for cryptographic application. To response this trend, we introduced the basic concept of the identity-based cryptography, and then proposed some solutions to certificate management, dynamic authorization in digital rights management.
Keywords/Search Tags:Information security, Digital Rights Management, Attribute-Based Access Control, Identity-Based Cryptography System
PDF Full Text Request
Related items