• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 28
  • 18
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 69
  • 69
  • 59
  • 20
  • 20
  • 12
  • 12
  • 12
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Implications of digital rights management on the demand for digital content

Fetscherin, Marc January 2005 (has links)
Zugl.: Bern, Univ., Diss., 2005
2

Rechtemanagement in verteilten Systemen mit Web-Services : Grundlagen, Implementierung und Ausblicke /

Schwall, Christian. January 2006 (has links)
Univ., Diplomarbeit--Karlsruhe.
3

Digital Copyright - Problemstellungen und Anforderungen des Urheberrechts in der Internetgesellschaft

Weisenbacher, Christof. January 2003 (has links)
Stuttgart, FH, Diplomarb., 2002.
4

Digital-Rights-Management-Systeme aus Verbrauchersicht : eine urheberrechtliche Untersuchung der Folgen des Einsatzes von Digital-Rights-Management-Systemen /

Höhne, Sven. January 1900 (has links)
Zugl.: Hannover, Univ., Diss., 2007. / Literaturverz. S. XVII - XXXVIII. Mit kurzem dt. u. engl. Abstract.
5

Towards a general framework for Digital Rights Management (DRM)

Arnab, Alapan January 2007 (has links)
Includes bibliographical references (p. 249-262). / Digital rights management (DRM) can be defined as a technology that enables persistent access control. The common understanding of DRM is that of a technology that enables means to thwart piracy of digital multimedia through limiting how the media is used by the consumer. It can be observed that many of these restrictions can be applied to any type of data. Therefore, it should be possible to create a two part DRM system – a common DRM system that enforces the basic access controls (such as read, write and execute) and an application specific DRM system that enforces the application specific access controls (such as print and play). The aim of this dissertation is to create such a framework for distribution independent DRM systems. Most vendors promote DRM as a copyright protection mechanism, and thus consumers expect a number of rights that are allowed by copyright legislation, but which are not available for the DRM protected media. However, DRM is not an enforcement of copyright law, but rather an enforcement of a licensing regime. Thus, there is incorrect (and possibly false) marketing of DRM enabled media from the vendors of DRM enabled media, leading to dissatisfied consumers. We think that one of the main reasons for the current situation, is that there is no defined legal framework governing the operation of DRM systems. In this dissertation, we address this gap, by developing a legal framework for DRM systems as one of the components of our DRM framework. Negotiation can be defined as the process which leads to the conclusion of a contract. Since DRM is the enforcement of licensing agreements, there is a need to cater for negotiation protocols in DRM systems. Negotiations provide the consumer with the power to request different rights packages, especially when consumers have a legitimate need for rights not granted normally to other consumers (for example, disabled consumers have needs that may not be met with standard rights set). Negotiations also allow the possibility for the licensors to extract the maximum value from the consumers. For this reason, the inclusion of negotiation protocols in DRM systems can become a powerful tool, and in this dissertation we present the first negotiation protocols for DRM systems. Even though the definition of DRM as an access control model has existed since at least 2002, there has been no formal description of DRM as an access control model. Thus, there are no formal models for any of the rights expression languages which express DRM access control policies, and various authors have commented on ambiguities present in interpretation and enforcement of licenses expressed in these languages – a result of a lack of formal definition of these languages. In this dissertation, we develop a formal model for a Licensing Rights Expression Language (LiREL), which is designed to provide a mechanism to express access control policies which are also sound legal license documents. Our formal model also discusses the enforcement of the access control policies, and is thus the first formal model for DRM as a mechanism for access control. Access control is a two part process: authentication of the parties involved and authorisation of the parties to access the resources. Authorisation in DRM provides some unique challenges: there is a need to support multiple platforms, without guaranteed network connectivity and minimal trust between the parties involved. For this reason, the associated authentication framework becomes more complex. While many access control models define user management as part of their model, we have taken a different approach, and removed user management from the core DRM system. Instead, our authorisation process requires a trusted verification of the user's credentials and then decides on the access control request. For this reason, our user authentication framework is ticket based, and shares similarities to Kerberos tickets. DRM also requires a strong data identity management. However, all the current identity systems for data do not provide verification service for data identity. For this reason, we developed Verifiable Digital Object Identity (VDOI) System, to address this gap. These components are combined towards a general framework for digital rights management that advances the understanding, organisation and implementation of DRM compared to approaches or solutions which are currently available.
6

Digital-Rights-Management-Systeme aus Verbrauchersicht : eine urheberrechtliche Untersuchung der Folgen des Einsatzes von Digital-Rights-Management-Systemen /

Höhne, Sven. January 2007 (has links)
Zugl.: Hannover, Universiẗat, Diss., 2007.
7

REAP : Et system for rettighetsstyring i digitale bibliotek

Vestavik, Øyvind January 2002 (has links)
<p>Denne hovedfagsoppgaven tar sikte på å vise at digitale bibliotek kan publisere intellektuelle arbeider i Internet i overenstemmelse med opphavsretten. Den foreslår en arkitektur/et paradigme for å behandle rettigheter ved publikasjon gjennom Digitale Bibliotek som innebærer digital rettighetshåndtering. Gjennom en analyse av opphavsrettslovgivning og internasjonale avtaler, digitale biblioteks behov og standarder og system for digitale rettighetshåndtering under utvikling fastlegges premissene for en slik arkitektur. Basert på denne analysen foreslås en arkitektur/paradigme for et system for digital rettighetsbehandling for digitale bibliotek. Som del av</p><p>denne oppgaven har det blitt implementert en prototype av et slikt system,og dette systemet er dokumentert i denne oppgaven.</p> / <p>This master thesis is aimed at demonstrating that intellectual property can be published in the Internet by digital libraries in accordance with copyright laws. It proposes an architecture/paradigm for managing rights when publishing information through Digital Libraries involving digital rights management. Through an analysis of copyright laws and international treaties, the needs of Digital Libraries and evolving standards and systems for Digital Rights Management the foundations for a such an architecture are identified. Based on this analysis an architecture/paradigm for a system for digital rights management in digital libraries is proposed. As part of this work a prototype of such a system has been implemented and is documented in this paper.</p>
8

REAP : Et system for rettighetsstyring i digitale bibliotek

Vestavik, Øyvind January 2002 (has links)
Denne hovedfagsoppgaven tar sikte på å vise at digitale bibliotek kan publisere intellektuelle arbeider i Internet i overenstemmelse med opphavsretten. Den foreslår en arkitektur/et paradigme for å behandle rettigheter ved publikasjon gjennom Digitale Bibliotek som innebærer digital rettighetshåndtering. Gjennom en analyse av opphavsrettslovgivning og internasjonale avtaler, digitale biblioteks behov og standarder og system for digitale rettighetshåndtering under utvikling fastlegges premissene for en slik arkitektur. Basert på denne analysen foreslås en arkitektur/paradigme for et system for digital rettighetsbehandling for digitale bibliotek. Som del av denne oppgaven har det blitt implementert en prototype av et slikt system,og dette systemet er dokumentert i denne oppgaven. / This master thesis is aimed at demonstrating that intellectual property can be published in the Internet by digital libraries in accordance with copyright laws. It proposes an architecture/paradigm for managing rights when publishing information through Digital Libraries involving digital rights management. Through an analysis of copyright laws and international treaties, the needs of Digital Libraries and evolving standards and systems for Digital Rights Management the foundations for a such an architecture are identified. Based on this analysis an architecture/paradigm for a system for digital rights management in digital libraries is proposed. As part of this work a prototype of such a system has been implemented and is documented in this paper.
9

Digital Rights Management and Code Obfuscation

Sethi, Amit January 2004 (has links)
Digital Rights Management (DRM) involves retaining control over digital information, even after it has been made public. Preventing illegal file sharing on the Internet, which is a topic that has recently received a large amount of media attention, is just one instance where DRM is needed. In this thesis, we attempt to create formal definitions for DRM. Currently, there is a lack of such formal definitions, which is one reason why DRM schemes have achieved little success. We will also examine two DRM schemes that can be cracked easily: Microsoft DRM 2. 0, and the Content Scrambling System. We then discuss the reasons why DRM schemes have been unsuccessful so far, and why a good DRM scheme must incorporate secure hardware, secure software, and an efficient legal system. We also briefly discuss several issues related to DRM, such as privacy. Code Obfuscation involves hiding a program's implementation details from an adversary. One application of code obfuscation involves hiding cryptographic keys in encryption and decryption programs for a cryptosystem. Code obfuscation is directly applicable to DRM schemes, where the adversary has access to a program that contains secret information. For example, a music player may contain a secret key that it uses to decrypt content. The secret key must be hidden from the adversary, since otherwise, he/she could use the key to write his/her own decryption program, and distribute it to circumvent the DRM scheme. We discuss the proof from Barak et al that shows that code obfuscation is impossible in general. This, however, does not mean that code obfuscation cannot be achieved in specific cases. We will examine an obfuscated version of the Data Encryption Standard, and discuss the circumstances under which it is insecure. We also examine a toy example of a block cipher called <i>Simple Block Cipher (SBC)</i>, and apply obfuscation techniques to SBC to hide the secret key, and then attempt to obtain the secret key.
10

Digital Rights Management and Code Obfuscation

Sethi, Amit January 2004 (has links)
Digital Rights Management (DRM) involves retaining control over digital information, even after it has been made public. Preventing illegal file sharing on the Internet, which is a topic that has recently received a large amount of media attention, is just one instance where DRM is needed. In this thesis, we attempt to create formal definitions for DRM. Currently, there is a lack of such formal definitions, which is one reason why DRM schemes have achieved little success. We will also examine two DRM schemes that can be cracked easily: Microsoft DRM 2. 0, and the Content Scrambling System. We then discuss the reasons why DRM schemes have been unsuccessful so far, and why a good DRM scheme must incorporate secure hardware, secure software, and an efficient legal system. We also briefly discuss several issues related to DRM, such as privacy. Code Obfuscation involves hiding a program's implementation details from an adversary. One application of code obfuscation involves hiding cryptographic keys in encryption and decryption programs for a cryptosystem. Code obfuscation is directly applicable to DRM schemes, where the adversary has access to a program that contains secret information. For example, a music player may contain a secret key that it uses to decrypt content. The secret key must be hidden from the adversary, since otherwise, he/she could use the key to write his/her own decryption program, and distribute it to circumvent the DRM scheme. We discuss the proof from Barak et al that shows that code obfuscation is impossible in general. This, however, does not mean that code obfuscation cannot be achieved in specific cases. We will examine an obfuscated version of the Data Encryption Standard, and discuss the circumstances under which it is insecure. We also examine a toy example of a block cipher called <i>Simple Block Cipher (SBC)</i>, and apply obfuscation techniques to SBC to hide the secret key, and then attempt to obtain the secret key.

Page generated in 0.0583 seconds