4 research outputs found

    Towards a General Framework for Digital Rights Management (DRM)

    Get PDF
    Digital rights management (DRM) can be defined as a technology that enables persistent access control. The common understanding of DRM is that of a technology that enables means to thwart piracy of digital multimedia through limiting how the media is used by the consumer. It can be observed that many of these restrictions can be applied to any type of data. Therefore, it should be possible to create a two part DRM system -- a common DRM system that enforces the basic access controls (such as read, write and execute) and an application specific DRM system that enforces the application specific access controls (such as print and play). The aim of this dissertation is to create such a framework for distribution independent DRM systems. Most vendors promote DRM as a copyright protection mechanism, and thus consumers expect a number of rights that are allowed by copyright legislation, but which are not available for the DRM protected media. However, DRM is not an enforcement of copyright law, but rather an enforcement of a licensing regime. Thus, there is incorrect (and possibly false) marketing of DRM enabled media from the vendors of DRM enabled media, leading to dissatisfied consumers. We think that one of the main reasons for the current situation, is that there is no defined legal framework governing the operation of DRM systems. In this dissertation, we address this gap, by developing a legal framework for DRM systems as one of the components of our DRM framework. Negotiation can be defined as the process which leads to the conclusion of a contract. Since DRM is the enforcement of licensing agreements, there is a need to cater for negotiation protocols in DRM systems. Negotiations provide the consumer with the power to request different rights packages, especially when consumers have a legitimate need for rights not granted normally to other consumers (for example, disabled consumers have needs that may not be met with standard rights set). Negotiations also allow the possibility for the licensors to extract the maximum value from the consumers. For this reason, the inclusion of negotiation protocols in DRM systems can become a powerful tool, and in this dissertation we present the first negotiation protocols for DRM systems. Even though the definition of DRM as an access control model has existed since at least 2002, there has been no formal description of DRM as an access control model. Thus, there are no formal models for any of the rights expression languages which express DRM access control policies, and various authors have commented on ambiguities present in interpretation and enforcement of licenses expressed in these languages -- a result of a lack of formal definition of these languages. In this dissertation, we develop a formal model for a Licensing Rights Expression Language (LiREL), which is designed to provide a mechanism to express access control policies which are also sound legal license documents. Our formal model also discusses the enforcement of the access control policies, and is thus the first formal model for DRM as a mechanism for access control. Access control is a two part process: authentication of the parties involved and authorisation of the parties to access the resources. Authorisation in DRM provides some unique challenges: there is a need to support multiple platforms, without guaranteed network connectivity and minimal trust between the parties involved. For this reason, the associated authentication framework becomes more complex. While many access control models define user management as part of their model, we have taken a different approach, and removed user management from the core DRM system. Instead, our authorisation process requires a trusted verification of the user's credentials and then decides on the access control request. For this reason, our user authentication framework is ticket based, and shares similarities to Kerberos tickets. DRM also requires a strong data identity management. However, all the current identity systems for data do not provide verification service for data identity. For this reason, we developed Verifiable Digital Object Identity (VDOI) System, to address this gap. These components are combined towards a general framework for digital rights management that advances the understanding, organisation and implementation of DRM compared to approaches or solutions which are currently available

    ESIIG2

    Get PDF
    331 p. , Il, Tablas, Gráficos.Libro ElectrónicoESIIG2 - The Second European Summit on Interoperability in the iGovernment, represents an unprecedented occasion to develop new synergies and create contacts with representatives of the European Commission, of the national and regional governments of Europe, of the research field, the Academia and experts of the ICT sector. Mrs Viviane Reding, Member of the European Commission for Information Society and Media gave her official patronage to the Second European Summit of Interoperability in the iGovernment, ESIIG2. Event with the patronage CISIS (Italian Interregional Centre of Information and Statistic Systems) The European Commission initiative i2010, through the DG Information and Media Society offered its support to ESIIG2.ForewordXI ESIIG 3 What is ESIIG2? 3 Commissioner Reding message 4 ESIIG 2 Co - hosted events5 The Programme 6 ESIIG2 Supporters8 The Regional Ministry for consumer protection and administrative simplification13 The Technical and Scientific Committee15 Structure of the Technical and Scientific Committee15 What does the Committee do?15 Important and innovative initiatives of ESIIG 219 Publication of the Call for Papers Results23 T-Seniority: E-inclusion and Interoperability25 Alejandro Echeverria Security and Privacy Preserving Data in E-Government Integration31 Claudio Biancalana, Francesco Saverio Profiti Proposal for Interoperability Between Public Universities39 Correcher E, Universidad Politécnica de Valencia, Spain A Cross-Application Reference Model to Support Interoperability 53 Elena Baralis, Tania Cerquitelli, Silvana Raffa Table of Contents VII Applying Soa to Mobile Secure eGovernment Services The Sweb Approach65 Silke Cuno, Yuri Glickman, Petra Hoepner, Linda Strick An Identity Metasystem Approach to Improve Eid Interoperability and Assure Privacy Compliance 74 Andrea Valboni Towards Interoperable Infrastructures of Geospatial Data 86 Sergio Farruggia, Emanuele Roccatagliata Modernization and Administrative Simplification Master Plan for the Local Councils of the Region of Murcia 101 Leandro Marín Muñoz, Pedro Olivares Sánchez, Isabel Belmonte Martínez Organizational Interoperability and Organizing for Interoperability in eGovernment109 Ralf Cimander, Herbert Kubicek The National Interoperability Framework: a New Regulatory Tool to Guarantee Interoperability Among Spanish Public Administrations 123 Agustí Cerrillo The Realization of the Greek E-Gif 131 Andreas Papadakis, Kostas Rantos, Antonis Stasis Build Government Interoperability Through Open Standard Technology 141 Goodwin Ting, Anne Rasanen, Marco Pappalardo Towards an Intercultural Representation of Mediterranean Intangible Cultural Heritage (Ich) An Xml Interoperability Framework for Regional Ich Databases 154 Jesse Marsh, Francesco Passantino Castile and Leon, a Model of Interoperability 168 Isabel Alonso Sánchez, José Ignacio de Uribe Ladrón de Cegama, Antonio Francisco Pérez Fernández, Jorge Ordás Alonso The Catalan Interoperability Model182 Ignasi Albors Identity and Residence Verification Data System189 Nimia Rodríguez Escolar, Jose A Eusamio Mazagatos From Extended Enterprise to Extended Government: Regione Lazio Interoperability and Egovernment Point of View 199 Claudio Biancalana, Dante Chiroli, Claudio Pisu, Francesco Saverio Profiti, Fabio Raimondi Contribution by the Members of the Technical and Scientific Committee 215 Interoperability and Egovernment Through Adoption of Standards 215 Flavia Marzano A Brief Compendium on Interoperability in Egovernment 224 Michele M Missikoff Table of Contents VIII Spc – The Italian Interoperabilty Framework with Services241 Francesco Tortorelli, Roberto Baldoni Exploitation of Digital Contents for the Public Administration 254 Giulio De Petra, Fabrizio Gianneschi, Giaime Ginesu Deploying the full transformational power of egovernment – collaboration and interoperability –270 Sylvia Archmann, Just Castillo Iglesias ICAR Report: Interoperability and Cooperation between applications among Italian Regions (English summary)278 CISIS - Central Staff of ICAR Project List of the finalists of the iG20 Award 297 IG20 AWARDS: Eucaris, the European car and driving licence information system297 INNOVATIVNESS: Interopcyl299 TRANSFERABILITY: Semic, Semantic Interoperability Center Europe301 IMPACT: Employment/unemployment status management: actual interoperability through the CO eService303 PRACTICAL RESULTS: Emilia Romagna Labour Information System 305 The ESIIG2 Summit results: the creation of ERNI and the Interoperability Declaration of Rome 309 The Interoperability Declaration of Rome 311 Follow the new and interesting developments of Esiig2 31

    Reports to the President

    Get PDF
    A compilation of annual reports for the 1981-1982 academic year, including a report from the President of the Massachusetts Institute of Technology, as well as reports from the academic and administrative units of the Institute. The reports outline the year's goals, accomplishments, honors and awards, and future plans

    Attic Inscriptions Online (AIO)

    Get PDF
    corecore