An implementation of a trusted and secure DRM architecture

13Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Content providers and distributors need to have secured and trusted systems for the distribution of multimedia content with Digital Rights Management (DRM) to ensure the revenues derived from their works. This paper discusses the security mechanisms applied to the implementation of a DRM architecture, regarding the certification and verification of user tools integrity during their whole life cycle, the mechanisms for providing a secure and trusted communication between client tools and the server framework for authorisation, certification or verification purposes, and the mechanisms for the secure storage and resynchronisation of the reports that describe the actions performed by users during the tool offline operation. The presented architecture is being implemented in the AXMEDIS project, which aims to create an innovative technology framework for the automatic production, protection and distribution of digital cross media contents over a range of different media channels, including PC (on the Internet), PDA, kiosks, mobile phones and i-TV. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Torres, V., Delgado, J., & Llorente, S. (2006). An implementation of a trusted and secure DRM architecture. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4277 LNCS-I, pp. 312–321). Springer Verlag. https://doi.org/10.1007/11915034_55

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free