[go: up one dir, main page]

Nützel et al., 2006 - Google Patents

Towards trust in digital rights management systems

Nützel et al., 2006

View PDF
Document ID
18270298373163839488
Author
Nützel J
Beyer A
Publication year
Publication venue
International Conference on Trust, Privacy and Security in Digital Business

External Links

Snippet

Digital transactions are usually based on mutual trust. In case of DRM (Digital Rights Management) this initial trust is missing on both sides. Neither do the content providers trust their clients–therefore DRM was established. Nor do the clients trust the content providers …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
EP1686504B1 (en) Flexible licensing architecture in content rights management systems
Sandhu et al. Peer-to-peer access control architecture using trusted computing technology
EP2267628B1 (en) Token passing technique for media playback devices
Claessens et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
US9436804B2 (en) Establishing a unique session key using a hardware functionality scan
KR101169116B1 (en) Linking diffie hellman with hfs authentication by using a seed
US20060174110A1 (en) Symmetric key optimizations
JP2010503252A (en) Computing platform proof
KR20060041876A (en) Digital Copyright Enforcement Method
Leicher et al. Implementation of a trusted ticket system
Pearson Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy
US20050060544A1 (en) System and method for digital content management and controlling copyright protection
Mana et al. A framework for secure execution of software
Kim et al. On the security of internet banking in south korea
Nützel et al. Towards trust in digital rights management systems
Nützel et al. How to Increase the security of digital rights management systems without affecting consumer’s Security
Brandl Trusted computing: The tcg trusted platform module specification
Abbadi Digital rights management for personal networks
Schmidt ASITA: Advanced security infrastructure for multi-agent-applications in the telematic area
Shiraishi et al. Hardware Authenticator Binding: A Secure Alternative to Passkeys
Gustafsson et al. Trusted Computing & Digital Rights Management: Theory & Effects
Verslype et al. A flexible and open DRM framework
WO2002010907A2 (en) Method of revoking_authorizations for software components
Κασαγιάννης Security evaluation of Android Keystore
Nilsson Key management with trusted platform modules