2017 International Conference on Trends in Electronics and Informatics (ICEI) 2017
DOI: 10.1109/icoei.2017.8300789
|View full text |Cite
|
Sign up to set email alerts
|

Survey on design challenges and analysis of service architecture of DRM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Others adopt punitive approaches that force third parties, such as Internet Service Providers (ISP), to prevent web users from performing illegal content sharing. Still others exploit the so-called Digital Rights Management (DRM) systems [1][2][3], which are web platforms aiming at enforcing the legal rights associated with the use of copyrighted digital contents by implementing specific services. They usually keep track of content modifications or manage copyright transfers and other transactions related to digital contents distributed on the Internet.…”
Section: Introduction and Motivationsmentioning
confidence: 99%
“…Others adopt punitive approaches that force third parties, such as Internet Service Providers (ISP), to prevent web users from performing illegal content sharing. Still others exploit the so-called Digital Rights Management (DRM) systems [1][2][3], which are web platforms aiming at enforcing the legal rights associated with the use of copyrighted digital contents by implementing specific services. They usually keep track of content modifications or manage copyright transfers and other transactions related to digital contents distributed on the Internet.…”
Section: Introduction and Motivationsmentioning
confidence: 99%