A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems
![]() |
Jo, Hea-Suk
(성균관대학교 전자전기컴퓨터공학과)
Lee, Kwang-Woo (성균관대학교 전자전기컴퓨터공학과) Jeon, Woong-Ryul (성균관대학교 전자전기컴퓨터공학과) Lee, Yun-Ho (성균관대학교 전자전기컴퓨터공학과) Kim, Seung-Joo (성균관대학교 정보통신공학부) Won, Dong-Ho (성균관대학교 정보통신공학부) |
1 | International Standard ISO/IEC 15408, “Common Methodology for Information Technology Security Evaluation”, Version 3.1, 2006.10 |
2 | International Standard ISO/IEC 15408, “Common Criteria for Information Technology Security Envluation, Part1”,Version 3.1, 2006.10 |
3 | International Standard ISO/IEC 15408, “Common Criteria for Information Technology Security Envluation, Part2”,Version 3.1, 2006.10 |
4 | International Standard ISO/IEC 15408, “Common Criteria for Information Technology Security Envluation, Part3”,Version 3.1, 2006.10 |
5 | 정연정, 윤기송, 강호갑, “상이한 DRM간 연동을 통한 DRM 상호 호환성 지원 방안”, 정보처리학회논문지, 제13-C권, 2006.4 과학기술학회마을 DOI |
6 | 국가정보원, “국가기관용 개방형 스마트카드 플랫폼 보호 프로파일 v1.1”, 2006. 5.17 |
7 | Smart Card Security User Group, “Smart Card Security User Group Smart Card Protection Profile v3.0”, 2001.9.9 |
8 | 국가보안기술연구소, “보호프로파일 보안요구사항 도출 방법에 관한 연구”, 2006.10 |
9 | S.R. Subramanya and Byung K. YI, “Digital rights management”, Potentials, IEEE, 2006.3 |
10 | Smart Card Security User Group, “Smart Card Security User Group Smart Card Protection Profile” version 3.0 |
11 | Karolina 또기두, “Mapping customer requirement to CC”, Uppsalssa University, 2001 |
12 | OMA, “Increasing revenue with secure mobile solutions”, Sun Mircosystems, Inc, CoreMedia, 2003 |
13 | Apple Inc. “Common Criteria Certification:Apple's Ongoing Commitment to Security ”, Whitepaper |
14 | Secure Digital Container, http://www.digicon.com |
15 | Microsoft Windows Media Rights Manager, “http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx” |
16 | Advanced access content system, “http://www.aacsla.com/home” |
17 | Open Mobile Alliance, “DRM Architecture Approved Version 2.0”, 2006 |
18 | Amer Bazerbachi Jaafari, “Mobile Phone Digital Rights Management Protection Profile”, Polytechnic University, 2004.2 |
19 | Sonera MediaLap, “Mobile Digital Rights Management”, Sonera MediaLab, 2003 |
20 | Jordan C. N. Chongy, Ren_e van Buurenz, Pieter H. Hartely, Geert Kleinhuisx, “Security Attributes Based Digital Rights Management”, KPN Research, 2002 |
21 | F.Hartung, F.Ramme, “Digital rights management and watermarking of multimedia content for m-commerce applications”, IEEE Communications Magazine, 2000 DOI ScienceOn |
22 | PachyDRM, “http://www.pachydrm.com” |
23 | R.H.Koenen, J.Lacy, M.Mackay, S.Mitchell, “The Long March to Interoperable Digital Rights Management”, Proceedings of the IEEE, 92:883-897, 2004 DOI ScienceOn |
![]() |