• Title/Summary/Keyword: Enterprise DRM

Search Result 12, Processing Time 0.043 seconds

Safety of DRM System Business Rule (DRM 시스템 비즈니스 룰의 안전성)

  • 신용녀;최진영;차리서;배민오
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.283-285
    • /
    • 2001
  • DRM(Digital Right Management)은 다양한 채널을 통해 유통되는 디지털 콘텐츠를 불법 사용으로부터 보호하고, 컨텐츠 소유자가 정한 사용 규칙이 지속적(persistent)으로 관리 되도록 하는 기술이다. DRM 서비스의 각 기능을 컴포넌트화 시켜서 재사용성을 강화시키고, 기존 DRM 시스템의 서비스의 문제점을 해결하기 위해서 선(Sun)의 엔터프라이즈자바빈(Enterprise JavaBeans, EJB) 어플리케이션 프레인 워크 상에서 DRM을 구현하였다. DRM 시스템의 가동에 있어서 비즈니스 룰의 충돌은 DRM시스템 작동 여부를 결정할 만큼 중요한 문제이다. 룰 자체가 자연어로 기술되고 언젠가는 모순을 유발할 가능성이 높기 때문에 먼저 명확한 논리식으로 표현하고 LEGO라는 정형 기법 도구를 통해 검증하도록 한다.

The Study of Data Classification Rethesis on Korea Government DRM (Data Reference Model) - The Establishment of New Data Principal, Classfication and Case Verification - (범정부 데이터 참조모형 데이터 분류체계 재정립에 관한 연구 - 데이터 분류 원칙, 체계수립 및 사례 검증 -)

  • Koo, Ja-Myon;Park, Joo-Seok;Shin, Daul
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.187-197
    • /
    • 2012
  • The investment on informatization has caused the increase in complexity of IT resources as well as inefficiency of Information system management and redundant investment. Thus, the idea of EA (Enterprise Architecture) was developed in order to manage the IT resources efficiently but the systematical guideline was insufficiently provided in data area.. Because of this, it is necessary to make full use of DRM (Data Reference Model) so we can enhance the sharing and reuse of data between several institutions in public sector by extracting and managing data behind processes. In this study, we recognize the necessity of improvement on data classification which is highly utilized and present the direction for the data classification rethesis.

Member/Group License Mechanism for Secure and Flexible Sharing of Protected Contents in DRM Systems (DRM 기술로 보호된 컨텐츠의 융통성 있는 공유를 위한 멤버/그룹 라이선스 메커니즘)

  • Chang Hai Jin
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.739-746
    • /
    • 2004
  • License mechanisms are the key elements in almost all DRM(digital rights management) systems. The license mechanisms are designed for the clear identification and enforcement of contents, principals, and usage rules in DRM systems. But current license mechanisms are lacking in the flexibility for the secure and efficient sharing of the contents among the members of a group such as a family or a part of an enterprise. This paper suggests a new license mechanism for efficient and secure sharing of contents in DRM systems among the members of a group. We named it member/group license mechanism. The mechanism extends the current license mechanisms by introducing new concepts such as group licenses, member licenses, and derivation relationships between licenses.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

Integrity Metadata Based of Multi CMSs System Providing Protection Copyright of Web Contents (웹 콘텐츠 저작권 보호를 제공하는 통합 메타데이터 기반의 다중 CMS 시스템)

  • Cho, Young-Bok;Li, Yong-Zhen;Sun, Ning;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.520-528
    • /
    • 2008
  • At present Content Management Systems (CMS) with various and diverse web contents have been in wide applications. But, for CMS of each enterprise has its own metadata which is very different from others, it causes the serious problem of web contents repetition. Also, it's a difficult technology to support protecting copyright of web contents which are in separated CMSs. Therefore, in this paper, we solved the problem of contents repetition through metadata integration between mutually heterogeneous CMSs. We also propose the technology of web contents authentication code for avoiding contents repetition and applying digital rights protection by supporting safe ship in vast quantity of contents.

Study of BYOD Based on Virtualization·Cloud for Prevention of Enterprise Information Leakage (기업 정보유출 방지를 위한 가상화·클라우드 기반 BYOD 연구)

  • Bae, Hyo-Bin;Min, Jae-Won;Choi, Young-Hyun;Chung, Tae-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.628-631
    • /
    • 2013
  • 최근 개인소유의 모바일 디바이스를 이용해 기업의 정보에 접근할 수 있도록 하는 Bring Your Own Device(BYOD)가 기업의 생산성과 효율성을 높이는 IT혁신 전략으로 각광받고 있다. 하지만, 개인의 모바일 단말을 기업 업무에 이용하게 되면서 엄격한 통제가 불가능해졌다. 이로 인해 기업의 정보가 더욱 쉽게 유출될 수 있는 보안상의 문제점이 있다. 본 논문에서는 BYOD 상에서 보안문제를 해결하기 위해 단말 가상화와 클라우드 서비스를 혼합한 방식을 기반으로 한 접근제어, 인증, DRM 등에 대한 설명을 하고 활용방안을 제안한다.

Design of DRM System in P2P Network Environment (P2P네트워크 환경을 위한 DRM 시스템 설계)

  • Lee Jeong-Gi;Kim Kuk-Se;Lee Gwang;Ahn Seong-Soo;Lee Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.829-832
    • /
    • 2006
  • The word P2P implies significant changes in current business dynamics. The P2P service enables individuals to be connected to the Internet for the direct provision of information and even downloads from one another without the conventional method of passing through search engines. This can be utilized to extend the path of retrieving information from limited web sites to personal and enterprise databases. That is, it is now possible for individuals to manage their own information on a national or global scope, share various information with other members, form communities of users interested in sharing homogeneous information, and utilize remote conference and remote education using groupware.

  • PDF