DRM as a layered system

The current landscape for digital rights management(DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the DRM industry in 2004 is somewhat reminiscent of the telecommunications industry in the late 1980's. At that time various networking technologies were available, and what was needed was a technology that could integrate existing networks and provide various services to users. The OSI layered framework and the TCP/IP communications protocol suite provided a solution to this situation. The OSI model divides the process of digital data communications into layers. Likewise, in this paper we divide the process of DRM into layers in which various services are offered to the users of digital content at each layer. Three blocks of layers have been identified. The upper layers deal with the end-to-end functions of the application, the middle layers deal with rights expression and interpretation, and the lower layers ensure rights enforcement. This paper describes how responsibilities might be distributed among the various layers, and considers where in these layers it would be appropriate to define protocols and standards.

[1]  Riccardo Pucella,et al.  A logic for reasoning about digital rights , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[2]  David D. Clark,et al.  The design philosophy of the DARPA internet protocols , 1988, SIGCOMM '88.

[3]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[4]  J. Davenport Editor , 1960 .

[5]  Amy Carroll,et al.  Microsoft Palladium: A Business Overview , 2002 .

[6]  Vinton G. Cerf On the evolution of Internet technologies , 2004, Proceedings of the IEEE.

[7]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[8]  Stephen Mooney,et al.  Digital Rights Management: Business and Technology , 2001 .

[9]  Carleen Maitland,et al.  Trust in cyberspace , 2000 .

[10]  Gregory L. Heileman,et al.  Protecting digital archives at the Greek Orthodox Archdiocese of America , 2003, DRM '03.

[11]  Jeffrey B. Lotspiech,et al.  Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels , 1997, D Lib Mag..

[12]  Michael L. Nelson,et al.  A Survey of Complex Object Technologies for Digital Libraries , 2001 .

[13]  Andrew S. Tanenbaum,et al.  A DRM security architecture for home networks , 2004, DRM '04.

[14]  Harald Tveit Alvestrand The role of the standards process in shaping the Internet , 2004, Proceedings of the IEEE.

[15]  Hector Garcia-Molina,et al.  Detecting Digital Copyright Violations On The Internet , 1999 .

[16]  Joseph Y. Halpern,et al.  A formal foundation for XrML , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..