Filters








1,432 Hits in 1.9 sec

Privacy-preserving DRM

Radia Perlman, Charlie Kaufman, Ray Perlner
2010 Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10  
DRM constitutes an incentive for software providers to take part in a future networking scenario  ...  In the proposed system an Rich Site Summary (RSS) feed is create and is protected internet by using Digital Rights Management (DRM) techniques.  ...  DRM manages all rights, not only the rights applicable to permissions over digital content but also on its security and privacy. DRM Framework.  ... 
doi:10.1145/1750389.1750399 dblp:conf/idtrust/PerlmanKP10 fatcat:3ryfj7btzzdktp3mt5retkg42e

Privacy Preserving Multiparty Multilevel DRM Architecture

Amit Sachan, Sabu Emmanuel, Amitabha Das, Mohan S. Kankanhalli
2009 2009 6th IEEE Consumer Communications and Networking Conference  
However, violation detection imposes a problem of preserving privacy of consumers. So, in the architecture, a provision is made to preserve their privacy.  ...  Thus, we propose an architecture for multiparty multilevel DRM system.  ...  In the architecture, a privacy preserving mechanism is discussed to ensure that consumers' privacy does not breach because of usage data collection. Fig. 1 . 1 Multiparty Multilevel DRM architecture  ... 
doi:10.1109/ccnc.2009.4784937 dblp:conf/ccnc/SachanEDK10 fatcat:o2jj27c6o5e5rlxh7bneeaed5q

A Privacy-Preserving Electronic Payment System for DRM [article]

Mahdi Soodkhah Mohammadi, Abbas Ghaemi Bafghi
2014 arXiv   pre-print
A series of analyses on the security, complexity and DRM requirements are presented which indicate security and practicality of our scheme.  ...  One of major considerations in an online business is customer privacy. Consumers are not interested in being monitored and identified by sellers.  ...  present a privacy-preserving DRM scheme which is based on smart cards.  ... 
arXiv:1408.6970v1 fatcat:m2qkgeagpjcgjlk6ru3joe2gxu

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

Qin-long HUANG, Zhao-feng MA, Yi-xian YANG, Jing-yi FU, Xin-xin NIU
2013 Journal of China Universities of Posts and Telecommunications  
In this paper, we propose a secure and privacy-preserving digital rights management (DRM) scheme using homomorphic encryption in cloud computing.  ...  In addition, we achieve privacy preserving by allowing users to stay anonymous towards the key server and service provider.  ...  In order to preserve user privacy in cloud computing, Petrlic et al. proposed a privacy-preserving DRM concept for cloud computing [10] .  ... 
doi:10.1016/s1005-8885(13)60113-2 fatcat:63eq5dcazjfk5cikcjpjgh2qby

PrivDRM

Tarek Gaber, Ali Ahmed, Amira Mostafa
2020 Proceedings of the Evaluation and Assessment in Software Engineering  
This paper proposes the Privacy-Preserving Digital Rights Management System (PrivDRM) that allows a consumer to acquire digital content with its license without disclosing complete personal information  ...  Thus, the behaviour of DRM systems disadvantages the digital content consumers (i.e. neglecting consumers' privacy) focusing more on securing the digital content (i.e. biased towards content owners).  ...  CONCLUSION AND FUTURE WORK This paper presented a solution to preserve the consumers' privacy in multi-party DRM called Privacy-Preserving DRM System (PrivDRM).  ... 
doi:10.1145/3383219.3383289 dblp:conf/ease/GaberAM20 fatcat:yose66gj5bfx7khdk2tm2vefva

Book Review: Getting Started with Digital Collections: Scaling to Fit Your Organization

Monica Howell
2018 Library resources & technical services  
Studwell and Jefferson offer a complex and detailed discussion of privacy and DRM in chapter 7.  ...  Together, the first five chapters could provide a "crash course" on DRM for librarians. Chapters 6-9 are engaging and timely, covering open access (OA), information privacy, and copyright.  ... 
doi:10.5860/lrts.62n1.45 fatcat:ytbscco3uzehplfw3w43v4e46i

DRM and Privacy

Julie E. Cohen
2003 Social Science Research Network  
to preserve user privacy. 99 Such infrastructures would have three components, which map to the three types of DRM functionality discussed in Part II.B.  ...  Part IV argues that with some conceptual and procedural adjustments, DRM technologies and related standard-setting processes could be harnessed to preserve and protect privacy. II.  ... 
doi:10.2139/ssrn.372741 fatcat:xwvxkar7wzet5hey7vqr5bt3nu

DRM and privacy

Julie E. Cohen
2003 Communications of the ACM  
to preserve user privacy. 99 Such infrastructures would have three components, which map to the three types of DRM functionality discussed in Part II.B.  ...  Part IV argues that with some conceptual and procedural adjustments, DRM technologies and related standard-setting processes could be harnessed to preserve and protect privacy. II.  ... 
doi:10.1145/641205.641230 fatcat:cadj5fzow5bbticj3fnurskdv4

White-box Implementation to Advantage DRM

Antonius Cahya Prihandoko, Hossein Ghodosi, Bruce Litow
2017 International Journal on Advanced Science, Engineering and Information Technology  
We construct a protocol on implementing WBC to improve DRM system; The system does not only provide security for the content provider but also preserves privacy for users.  ...  Digital Rights Management (DRM) is a popular approach for secure content distribution. Typically, DRM encrypts the content before delivers it.  ...  It means that DRM should not merely focus on achieving the security for the content provider, but also on preserving the privacy for the users.  ... 
doi:10.18517/ijaseit.7.2.1445 fatcat:i7va2yrd3zfmhoyd7wegur22mu

White-box Implementation to Advantage DRM

Antonius Cahya Prihandoko, Hossein Ghodosi, Bruce Litow
2017 International Journal on Advanced Science, Engineering and Information Technology  
We construct a protocol on implementing WBC to improve DRM system; The system does not only provide security for the content provider but also preserves privacy for users.  ...  Digital Rights Management (DRM) is a popular approach for secure content distribution. Typically, DRM encrypts the content before delivers it.  ...  It means that DRM should not merely focus on achieving the security for the content provider, but also on preserving the privacy for the users.  ... 
doi:10.18517/ijaseit.7.1.1445 fatcat:iqhgu7khgvd2vp3sbqsblknlia

Book Review: Digital Rights Management: The Librarian's Guide

Laura Schmidli
2018 Library resources & technical services  
DRM is a daily challenge for libraries and their users, and librarians have a role to play in ensuring public access to information and privacy are considered, counterbalancing the rights of copyright  ...  Passion for digital rights management (DRM) does not typically lure anyone into the library profession; however, DRM is an essential topic for librarians driven to serve their users well.  ...  Studwell and Jefferson offer a complex and detailed discussion of privacy and DRM in chapter 7.  ... 
doi:10.5860/lrts.62n1.46 fatcat:4fjkohbmjfd33hdsvfzuqe24ay

DRM Mechanism without Third Party using System Verification Technique

Sheryl D'mello, Bidisha Roy, Pradnya Rane
2015 International Journal of Engineering Research and  
Digital Rights Management (DRM) technologies aim to provide protection and secure distribution of the digital contents.  ...  The proposed DRM mechanism focusses on protecting and securing the distribution of digital content in a small organization.  ...  Moreover the use of third party is undesirable in DRM as privacy of the users cannot be assured [5] A Privacy preserving DRM scheme using trusted third party proposed in [6] uses content classification  ... 
doi:10.17577/ijertv4is080691 fatcat:h5ef6hgxvzepdpxdaxv6zni6pu

Unlinkable Content Playbacks in a Multiparty DRM System [chapter]

Ronald Petrlic, Stephan Sekula
2013 Lecture Notes in Computer Science  
Our approach, which does not need any trusted third party-in contrast to most related work on privacy-preserving DRM-is based on a re-encryption scheme that runs on any mobile Android device.  ...  We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme.  ...  [3] presents a privacy-preserving DRM scheme for multiparty scenarios without a TTP.  ... 
doi:10.1007/978-3-642-39256-6_21 fatcat:yy64z72iz5bqvigigujbhthuju

IEEE Access Special Section Editorial Smart Grids: a Hub of Interdisciplinary Research

Mubashir Husain Rehmani, Melike Erol Kantarci, Abderrezak Rachedi, Milena Radenkovic, Martin Reisslein
2015 IEEE Access  
Mustafa, Ning Zhang, Georgios Kalogridis, and Zhong Fan, authors proposed a privacy-preserving data collection scheme for advanced metering infrastructure.  ...  In the article entitled ''DEP2SA: A decentralized efficient privacy-preserving and selective aggregation scheme in advanced metering infrastructure'' by Mustafa A.  ... 
doi:10.1109/access.2016.2516158 fatcat:fosxd7ee3za7xpktloov66d4gu

The Israeli Digital Rights Movement's campaign for privacy

Efrat Daskal
2017 Internet Policy Review  
I conclude by discussing how analysing civil society privacy campaigns can shed light over different regimes of privacy governance.  ...  While some consider advocating for privacy as a way of preserving a basic human right, others frame it as a way to fight surveillance.  ...  Despite these differences, they are all united in their belief that even in the twenty-first century, privacy is not dead, and it is worthwhile to preserve it.  ... 
doi:10.14763/2017.3.711 fatcat:n7qgarxxhnds7ibqw7xwcbkxha
« Previous Showing results 1 — 15 out of 1,432 results