The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider and the user, each having their own incentives to use the system. Proper use of the system implies that these incentives can only be met if certain security requirements are ful??lled. Quite some attention in literature has been devoted to speci??c security aspects of DRM systems. The contributions of this chapter consist of a systematic overview of core security requirements for DRM systems. This chapter conducts a stakeholder analysis and develops a simple, generic conceptual model to arrive at such a set of core security requirements.
|Title of host publication||Digital Rights Management : An Introduction|
|Place of Publication||Hyderabad|
|Publication status||Published - 2008|