Browse > Article

SDCS: Secure D-CAS System for Secure Contents Download in Ubiquitous Environment  

Yeo, Sang-Soo (목원대학교 컴퓨터공학부)
Publication Information
Abstract
The emerging ubiquitous environment is improving IT technologies and the popularization of broadband Internet is encouraging creation and sharing of various contents. The contents include the concept of production and circulation of digital information/contents, in forms of characters, codes, voices, sounds, client and videos for being used on the Internet and networks. The contents are widely shared in networks and users can have a wide range of knowledge and gain the freedom of presentation from them. So now users participations are augmented gradually. However, many contents without acquiring agree of copyright are sharing on the Internet, so many problems happen in the manufacturing process of digital contents. To solve this problem, many research projects to limit contents utilization onto legitimate users and to provide secure contents protection and download, are in progress. Therefore, in this paper, we propose a secure D-CAS system (SDCS) which provides security for contents downloading.
Keywords
DRM; Contents Protection; Secure Contents Download;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 B. von SoIms and D. Naccache, "On blind signatures and perfect crimes," Computers and Security, Vol.11, No.6, pp. 581-583, 1992.   DOI   ScienceOn
2 Mark Bauger, "Internet Digital Rights Management Taxonomy," IETF-51, Aug. 6, 2001.
3 J Paul England, John D. DeTreville, and Butler W. Lampson, "Digital Rights Management Operating System," United State Patent 6,330,670, Dec. 11, 2001.
4 ISMA Report, "Internet Streaming Media Alliance DRM Task Force Report," IRTFIDRM.52 IETF meeting, Oct. 2001.
5 Kiyoshi Yamanaka, Hitoshi Shibagaki, Norihigo Sakurai, and Terunao Soneoka, "Trend of Digital Copyright Protection Technologies," NIT R&D, Vol.47, No.6, 1998.
6 여상수, 윤훈기, 김성권, "디지털 컨텐츠의 지적재산권 보호를 위한 익명 핑거프린팅의 연구동향," 한국정보보호학회지, 제11권, 제3호, pp.90-99, 2001.
7 이덕규, 오형근, 이임영, "지불정보를 이용한 Hidden Agent 컨텐츠 불법 복사 방지에 관한 연구," 2002년 한국멀티미디어학회 춘계학술대회, pp. 947-950, 2002.
8 이덕규, 이임영, "Agent 기반 불법 복제 방지 DRM모델," 2001년 한국정보과학회 추계학술대회, 2001.
9 김영모, 고병수, "다운로드형 제한수신 시스템 기술 동향," 방송공학회지, 제13권, 제4호, pp. 54-63, 2008.   과학기술학회마을
10 D. H. Wilson, A. C. Long, and C. Atkeson, "A Context-Aware Recognition Survey for Data Collection Using Ubiquitous Sensors in the Home," In Proc. of CHI 2005: Late Breaking Results, pp. 1865-1868, 2005.
11 Bill Schilit, Norman Adams, and Roy Want, "Context-aware computing applications," In Proc. of IEEE Workshop on Mobile Computing Systems and Applications, pp. 85-90, Dec. 1994.
12 R. Paradiso, G. Loriga, and N. Taccini, "Wearable Health Care System for Vital Signs Monitoring," In Proc. of MEDICON 2004, Italy, 2004.