Title :
Hybrid Peer-to-Peer/Network-Based Rights Transfer in the Presence of Unknown Compromises
Author :
Kravitz, D.W. ; Messerges, T.S.
Author_Institution :
Motorola Labs Washington, Washington
Abstract :
We describe the problem of unknown-compromised devices communicating with compliant devices in the context of rights transfer mechanisms within a DRM system. An unknown-compromised device can be used to acquire content rights in the usual manner (from either a backend rights issuer or a peer device), but it is not constrained by rules of legitimate processing other than to remain undetected. The compromise must remain undiscovered in order to avoid revocation which would result in rejection by compliant devices aware of this. Techniques to minimize the damage that can be caused by such rogue devices are introduced and contrasted.
Keywords :
peer-to-peer computing; security of data; DRM system; P2P communication; network-based rights transfer; peer-to-peer based rights transfer; Computer crime; Content management; Context; Cryptography; Investments; Licenses; Peer to peer computing; Protection; Protocols; Security;
Conference_Titel :
Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-1456-7
Electronic_ISBN :
978-1-4244-1457-4
DOI :
10.1109/ccnc08.2007.242