Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16-C.1.1

A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems  

Jo, Hea-Suk (성균관대학교 전자전기컴퓨터공학과)
Lee, Kwang-Woo (성균관대학교 전자전기컴퓨터공학과)
Jeon, Woong-Ryul (성균관대학교 전자전기컴퓨터공학과)
Lee, Yun-Ho (성균관대학교 전자전기컴퓨터공학과)
Kim, Seung-Joo (성균관대학교 정보통신공학부)
Won, Dong-Ho (성균관대학교 정보통신공학부)
Abstract
Today, Digital Right Management (DRM) is used to protect copyrights of digital contents from illegal reproduction and redistribution. Unfortunately, current DRM systems are causing user's discomfort because of lack of mutual compatibility. In order to overcome this drawback, technologies for interoperability of heterogeneous DRM systems are developing. In this paper, we study the protection profile for conversion technologies of heterogeneous DRM systems, using the Common Criteria. Especially, this paper is written by reuse of the existing protection profile. Therefore, performance analysis reveals that efficiency of time and cost is significantly improved. This protection profile can be used by contents provider and administrator who manage user's copyrights to reference data for copyright protection.
Keywords
Digital Right Management; Protection Profile; Common Criteria; Contents; Copyrights;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 International Standard ISO/IEC 15408, “Common Methodology for Information Technology Security Evaluation”, Version 3.1, 2006.10
2 International Standard ISO/IEC 15408, “Common Criteria for Information Technology Security Envluation, Part1”,Version 3.1, 2006.10
3 International Standard ISO/IEC 15408, “Common Criteria for Information Technology Security Envluation, Part2”,Version 3.1, 2006.10
4 International Standard ISO/IEC 15408, “Common Criteria for Information Technology Security Envluation, Part3”,Version 3.1, 2006.10
5 정연정, 윤기송, 강호갑, “상이한 DRM간 연동을 통한 DRM 상호 호환성 지원 방안”, 정보처리학회논문지, 제13-C권, 2006.4   과학기술학회마을   DOI
6 국가정보원, “국가기관용 개방형 스마트카드 플랫폼 보호 프로파일 v1.1”, 2006. 5.17
7 Smart Card Security User Group, “Smart Card Security User Group Smart Card Protection Profile v3.0”, 2001.9.9
8 국가보안기술연구소, “보호프로파일 보안요구사항 도출 방법에 관한 연구”, 2006.10
9 S.R. Subramanya and Byung K. YI, “Digital rights management”, Potentials, IEEE, 2006.3
10 Smart Card Security User Group, “Smart Card Security User Group Smart Card Protection Profile” version 3.0
11 Karolina 또기두, “Mapping customer requirement to CC”, Uppsalssa University, 2001
12 OMA, “Increasing revenue with secure mobile solutions”, Sun Mircosystems, Inc, CoreMedia, 2003
13 Apple Inc. “Common Criteria Certification:Apple's Ongoing Commitment to Security ”, Whitepaper
14 Secure Digital Container, http://www.digicon.com
15 Microsoft Windows Media Rights Manager, “http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx”
16 Advanced access content system, “http://www.aacsla.com/home”
17 Open Mobile Alliance, “DRM Architecture Approved Version 2.0”, 2006
18 Amer Bazerbachi Jaafari, “Mobile Phone Digital Rights Management Protection Profile”, Polytechnic University, 2004.2
19 Sonera MediaLap, “Mobile Digital Rights Management”, Sonera MediaLab, 2003
20 Jordan C. N. Chongy, Ren_e van Buurenz, Pieter H. Hartely, Geert Kleinhuisx, “Security Attributes Based Digital Rights Management”, KPN Research, 2002
21 F.Hartung, F.Ramme, “Digital rights management and watermarking of multimedia content for m-commerce applications”, IEEE Communications Magazine, 2000   DOI   ScienceOn
22 PachyDRM, “http://www.pachydrm.com”
23 R.H.Koenen, J.Lacy, M.Mackay, S.Mitchell, “The Long March to Interoperable Digital Rights Management”, Proceedings of the IEEE, 92:883-897, 2004   DOI   ScienceOn