TY - GEN
T1 - Problem analyses and recommendations in DRM security policies
AU - Kim, Youngseek
AU - Howard, Jessica
AU - Ravindranath, Sharad
AU - Park, Joon S.
PY - 2008
Y1 - 2008
N2 - We claim that the current digital rights management (DRM) technology and its related policy do not address customers' needs in the perspective of availability, which-along with confidentiality and integrity-is one of the main security properties. Our research has focused on how the current security policy in regards to DRM addresses the availability as a main security property. We study the current policies of DRM in U.S. law, the fair use doctrine, and the Digital Millennium Copyright Act. Additionally, we look at policies at the market, examining how the recording industry has used DRM in both the past and present. We analyze how much the companies and distributors place unnecessary controls on customers by considering customers' online resource usage. Finally, we suggest the market-level policy criteria as our possible solutions for the copyright owners, the distributors, and the general users.
AB - We claim that the current digital rights management (DRM) technology and its related policy do not address customers' needs in the perspective of availability, which-along with confidentiality and integrity-is one of the main security properties. Our research has focused on how the current security policy in regards to DRM addresses the availability as a main security property. We study the current policies of DRM in U.S. law, the fair use doctrine, and the Digital Millennium Copyright Act. Additionally, we look at policies at the market, examining how the recording industry has used DRM in both the past and present. We analyze how much the companies and distributors place unnecessary controls on customers by considering customers' online resource usage. Finally, we suggest the market-level policy criteria as our possible solutions for the copyright owners, the distributors, and the general users.
KW - DRM
KW - Digital rights management
KW - Security policy
UR - http://www.scopus.com/inward/record.url?scp=58849155076&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=58849155076&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-89900-6_18
DO - 10.1007/978-3-540-89900-6_18
M3 - Conference contribution
AN - SCOPUS:58849155076
SN - 3540898999
SN - 9783540898993
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 165
EP - 178
BT - Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings
T2 - 1st European Conference on Intelligence and Security Informatics, EuroISI 2008
Y2 - 3 December 2008 through 5 December 2008
ER -