Nützel et al., 2006 - Google Patents
Towards trust in digital rights management systemsNützel et al., 2006
View PDF- Document ID
- 18270298373163839488
- Author
- Nützel J
- Beyer A
- Publication year
- Publication venue
- International Conference on Trust, Privacy and Security in Digital Business
External Links
Snippet
Digital transactions are usually based on mutual trust. In case of DRM (Digital Rights Management) this initial trust is missing on both sides. Neither do the content providers trust their clients–therefore DRM was established. Nor do the clients trust the content providers …
- 239000003795 chemical substances by application 0 description 38
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1686504B1 (en) | Flexible licensing architecture in content rights management systems | |
Sandhu et al. | Peer-to-peer access control architecture using trusted computing technology | |
EP2267628B1 (en) | Token passing technique for media playback devices | |
Claessens et al. | (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions | |
US9436804B2 (en) | Establishing a unique session key using a hardware functionality scan | |
KR101169116B1 (en) | Linking diffie hellman with hfs authentication by using a seed | |
US20060174110A1 (en) | Symmetric key optimizations | |
JP2010503252A (en) | Computing platform proof | |
KR20060041876A (en) | Digital Copyright Enforcement Method | |
Leicher et al. | Implementation of a trusted ticket system | |
Pearson | Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy | |
US20050060544A1 (en) | System and method for digital content management and controlling copyright protection | |
Mana et al. | A framework for secure execution of software | |
Kim et al. | On the security of internet banking in south korea | |
Nützel et al. | Towards trust in digital rights management systems | |
Nützel et al. | How to Increase the security of digital rights management systems without affecting consumer’s Security | |
Brandl | Trusted computing: The tcg trusted platform module specification | |
Abbadi | Digital rights management for personal networks | |
Schmidt | ASITA: Advanced security infrastructure for multi-agent-applications in the telematic area | |
Shiraishi et al. | Hardware Authenticator Binding: A Secure Alternative to Passkeys | |
Gustafsson et al. | Trusted Computing & Digital Rights Management: Theory & Effects | |
Verslype et al. | A flexible and open DRM framework | |
WO2002010907A2 (en) | Method of revoking_authorizations for software components | |
Κασαγιάννης | Security evaluation of Android Keystore | |
Nilsson | Key management with trusted platform modules |