The Proceedings of the Information Systems Education Conference 2002: §353b    Home    Papers/Indices    prev (§353a)    Next (§353c)
    Paper (refereed)     Student-Faculty Papers
Recommended Citation: Kamat, M.  Security Requirements for Digital Rights Management.  In The Proceedings of the Information Systems Education Conference 2002, v 19 (San Antonio): §353b. ISSN: 1542-7382.
CDpic

Security Requirements for Digital Rights Management

thumb
Refereed
 
Mayur Kamat    [a1] [a2]
Mays Graduate School of Business
Texas A&M University    [u1] [u2]
College Station, Texas, USA    [c1] [c2]

Recent Gartner survey on IT spending shows that the top priority for budget allocation is security. Huge efforts have been targeted to improve and build upon existing security domains. This paper addresses a topic that adds a new dimension to the realm of security, which can lead to the emergence of a new market for online content. The concept is of Digital Rights Management (DRM). DRM introduces new business models for content protection, rights managing and secure marketing. It enables the publisher’s revenue model by rights enforcement and secure deployment. The paper attempts to: List the reasons favoring adoption of DRM; Enumerate the security concerns in DRM implementation; Discuss tamper-resistant software as a plausible solution; Conceptual design of the client-side trusted software component; Super Distribution, multi-level marketing phenomena to distribute content.

Keywords: content marketing, rights management, security, superdistribution, trusted software

Read this refereed paper in Adobe Portable Document (PDF) format. (59 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (22 K bytes)
View the PowerPoint Slides (PPT) for this presentation. (196 K bytes)

View the photo/graphic Kamat.Mayur.jpg with this presentation. (41 K bytes)
CDpic
Comments and corrections to
webmaster@isedj.org