A License Audit Model for Secure DRM Systems in IP-based Environments


Ui Jin Jang, Hyung-Min Lim, Yong-Tae Shin, Journal of Information Processing Systems Vol. 6, No. 2, pp. 253-260, Jun. 2010  

10.3745/JIPS.2010.6.2.253
Keywords: digital forensic, DRM, IP-Based Network
Fulltext:

Abstract

Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Jang, U., Lim, H., & Shin, Y. (2010). A License Audit Model for Secure DRM Systems in IP-based Environments. Journal of Information Processing Systems, 6(2), 253-260. DOI: 10.3745/JIPS.2010.6.2.253.

[IEEE Style]
U. J. Jang, H. Lim, Y. Shin, "A License Audit Model for Secure DRM Systems in IP-based Environments," Journal of Information Processing Systems, vol. 6, no. 2, pp. 253-260, 2010. DOI: 10.3745/JIPS.2010.6.2.253.

[ACM Style]
Ui Jin Jang, Hyung-Min Lim, and Yong-Tae Shin. 2010. A License Audit Model for Secure DRM Systems in IP-based Environments. Journal of Information Processing Systems, 6, 2, (2010), 253-260. DOI: 10.3745/JIPS.2010.6.2.253.