Problem analyses and recommendations in DRM security policies

Youngseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park

Research output: Chapter in Book/Entry/PoemConference contribution

4 Scopus citations

Abstract

We claim that the current digital rights management (DRM) technology and its related policy do not address customers' needs in the perspective of availability, which-along with confidentiality and integrity-is one of the main security properties. Our research has focused on how the current security policy in regards to DRM addresses the availability as a main security property. We study the current policies of DRM in U.S. law, the fair use doctrine, and the Digital Millennium Copyright Act. Additionally, we look at policies at the market, examining how the recording industry has used DRM in both the past and present. We analyze how much the companies and distributors place unnecessary controls on customers by considering customers' online resource usage. Finally, we suggest the market-level policy criteria as our possible solutions for the copyright owners, the distributors, and the general users.

Original languageEnglish (US)
Title of host publicationIntelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings
Pages165-178
Number of pages14
DOIs
StatePublished - 2008
Event1st European Conference on Intelligence and Security Informatics, EuroISI 2008 - Esbjerg, Denmark
Duration: Dec 3 2008Dec 5 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5376 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st European Conference on Intelligence and Security Informatics, EuroISI 2008
Country/TerritoryDenmark
CityEsbjerg
Period12/3/0812/5/08

Keywords

  • DRM
  • Digital rights management
  • Security policy

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Problem analyses and recommendations in DRM security policies'. Together they form a unique fingerprint.

Cite this