2006
DOI: 10.1007/11915034_55
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of a Trusted and Secure DRM Architecture

Abstract: Abstract. Content providers and distributors need to have secured and trusted systems for the distribution of multimedia content with Digital Rights Management (DRM) to ensure the revenues derived from their works. This paper discusses the security mechanisms applied to the implementation of a DRM architecture, regarding the certification and verification of user tools integrity during their whole life cycle, the mechanisms for providing a secure and trusted communication between client tools and the server fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 1 publication
(2 reference statements)
0
9
0
Order By: Relevance
“…Multimedia Information Protection And Management System (MIPAMS) [1][2][3] is an architecture to manage multimedia information taking into account DRM and protection.…”
Section: Mipamsmentioning
confidence: 99%
“…Multimedia Information Protection And Management System (MIPAMS) [1][2][3] is an architecture to manage multimedia information taking into account DRM and protection.…”
Section: Mipamsmentioning
confidence: 99%
“…It covers a complete DRM system while permitting the adaptation of secure content. It is based on the Multimedia Information Protection and Management System (MIPAMS) architecture [16]. MIPAMS was devised for the management of multimedia information taking into account DRM and protection.…”
Section: Proposed Architecture For the Adaptation Of Secured Conmentioning
confidence: 99%
“…• An interrelationship model, in which the digital content moves freely between the different members of the valué chain, without there being any individuáis or entities which can unilaterally impose their conditions. The aim is to créate an environment of trust in which there are no privileged users, and it is therefore necessary to design mechanisms for the inclusión of information relating to users which makes it possible to associate the intellectual property generated with completely identified individuáis (Torres, Delgado, & Llórente, 2006). • A horizontal, open model in which anyone can carry out the distribution of their work without the need to go through preestablished or controlled channels.…”
Section: E2e Drm Modelmentioning
confidence: 99%