Evolvement of DRM schema: From encryption to interoperability and monitoring

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

By reviewing DRMs up to now and two typical examples - AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical and social viewpoints. Not only it is difficult to deploy and update content encryption and security infrastructure, but also the content diffusion is limited and Fair Use is affected. The new schema for DRM should be content monitoring system in public space that prevents illegal diffusion of content in copyright but permits content being used freely in private space or for social liberty. The traditional rights in analog times will fluently move to digital space under the proposed schema. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Huang, T. (2007). Evolvement of DRM schema: From encryption to interoperability and monitoring. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4577 LNCS, pp. 65–75). Springer Verlag. https://doi.org/10.1007/978-3-540-73417-8_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free