VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY REQUIREMENTS ON PRACTICAL DRM SYSTEMS IN E-LEARNING
暂无分享,去创建一个
The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies's MediaMax DRM and First4Internet's XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.
[1] Maria Nickolova,et al. CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES USED FOR E-LEARNING OBJECTS PROTECTION , 2007 .
[2] Christian Wenz,et al. DRM Under Attack: Weaknesses in Existing Systems , 2003, Digital Rights Management.
[3] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .