Core security requirements of DRM systems

H.L. Jonker, S. Mauw

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Abstract

The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider and the user, each having their own incentives to use the system. Proper use of the system implies that these incentives can only be met if certain security requirements are ful??lled. Quite some attention in literature has been devoted to speci??c security aspects of DRM systems. The contributions of this chapter consist of a systematic overview of core security requirements for DRM systems. This chapter conducts a stakeholder analysis and develops a simple, generic conceptual model to arrive at such a set of core security requirements.
Original languageEnglish
Title of host publicationDigital Rights Management : An Introduction
EditorsD. Satish
Place of PublicationHyderabad
PublisherIcfai Books
Pages73-90
ISBN (Print)81-314-0792-6
Publication statusPublished - 2008

Cite this

Jonker, H. L., & Mauw, S. (2008). Core security requirements of DRM systems. In D. Satish (Ed.), Digital Rights Management : An Introduction (pp. 73-90). Icfai Books.