Security Attributes Based Digital Rights Management

Share/Save/Bookmark

Chong, Jordan C.N. and Buuren, René van and Hartel, Pieter H. and Kleinhuis, Geert (2002) Security Attributes Based Digital Rights Management. [Report]

[img] PDF
Restricted to UT campus only

267kB
Abstract:ost real-life systems delegate responsibilities to
di�erent authorities. We apply this model to a dig-
ital rights management system, to achieve
exible
security. In our model a hierarchy of authorities
issues certi�cates that are linked by cryptographic
means. This linkage establishes a chain of control,
identity-attribute-rights, and allows
exible rights
control over content. Typical security objectives,
such as identi�cation, authentication, authoriza-
tion and access control can be realised. Content
keys are personalised to detect illegal super distri-
bution. We describe a working prototype, which
we develop using standard techniques, such as stan-
dard certi�cates, XML and Java. We present ex-
perimental results to evaluate the scalability of the
system. A formal analysis demonstrates that our
design is able to detect a form of illegal super dis-
tribution.
Item Type:Report
Additional information:Imported from CTIT
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/63082
Official URL:http://www.ub.utwente.nl/webdocs/ctit/1/00000079.pdf
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page