LicenseScript : a language and framework for calculating licenses on information over constrained domains

The project LicenseScript develops and demonstrates an integrated framework for analysis and design of secure information delivery systems. The contributions of this project are the demonstration of new analysis and design methods in at least two of the following concrete application areas: (1) Digital Rights Management (DRM), (2) wireless sensor networks (WSNs), (3) privacy protection. In this paper, we introduce the motivation, concepts and theory of LicenseScript. More importantly we speculate and discuss the practical applicability of LicenseScript in the particular areas of DRM and WSNs. In fact, LicenseScript is borne out of our initially disjoint research efforts in DRM and WSNs. It is exciting that at the convergence point of the security requirements of DRM and WSNs, we found our solution: LicenseScript. In other words, LicenseScript is borne out of real needs, rather than an academic whim that seek a unified framework. This paper is organized as follows. After the introduction in Section 1, we sketch the technical approach of LicenseScript in Section 2. Section 3 contains our discussion of the applicability of LicenseScript. Section 4 finishes off with our conclusion.

[1]  Frank Stajano,et al.  The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.

[2]  Jean-François Raskin,et al.  A Game-based Verification of Non-repudiation and Fair Exchange Protocols , 2001, J. Comput. Secur..

[3]  Sandro Etalle,et al.  Partial evaluation of concurrent constraint languages , 1998, CSUR.

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[6]  Riccardo Pucella,et al.  A logic for reasoning about digital rights , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[7]  Carl A. Gunter,et al.  Models and languages for digital rights , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[8]  Yee Wei Law,et al.  Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .

[9]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[10]  S.A.F.A. van den Heuvel,et al.  Secure content management in authorised domains , 2002 .

[11]  Sandro Etalle,et al.  A transformation system for CLP with dynamic scheduling and CCP , 1997, PEPM.

[12]  Sandro Etalle,et al.  Transformations of CCP programs , 2001, TOPL.

[13]  Sandro Etalle,et al.  Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols , 2001, LOPSTR.

[14]  Sandro Etalle,et al.  An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.

[15]  Daniel Le Métayer,et al.  Programming by multiset transformation , 1993, CACM.

[16]  Stephen Mooney,et al.  Digital Rights Management: Business and Technology , 2001 .