The Proceedings of the Information Systems Education Conference 2002: §353b
Home
Papers/Indices
prev (§353a)
Next (§353c)
| Paper (refereed) Student-Faculty Papers
| Recommended Citation: Kamat, M. Security Requirements for Digital Rights Management. In The Proceedings of the Information Systems Education Conference 2002, v 19 (San Antonio): §353b. ISSN: 1542-7382.
|
| |
Security Requirements for Digital Rights Management
Refereed | | Mayur Kamat [a1] [a2]
Mays Graduate School of Business
Texas A&M University [u1] [u2]
College Station, Texas, USA [c1] [c2]
|
Recent Gartner survey on IT spending shows that the top priority for budget allocation is security. Huge efforts have been targeted to improve and build upon existing security domains. This paper addresses a topic that adds a new dimension to the realm of security, which can lead to the emergence of a new market for online content. The concept is of Digital Rights Management (DRM). DRM introduces new business models for content protection, rights managing and secure marketing. It enables the publisher’s revenue model by rights enforcement and secure deployment. The paper attempts to: List the reasons favoring adoption of DRM; Enumerate the security concerns in DRM implementation; Discuss tamper-resistant software as a plausible solution; Conceptual design of the client-side trusted software component; Super Distribution, multi-level marketing phenomena to distribute content.
Keywords: content marketing, rights management, security, superdistribution, trusted software
Read this refereed paper in Adobe Portable Document (PDF) format. (59 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (22 K bytes)
View the PowerPoint Slides (PPT) for this presentation. (196 K bytes)
View the photo/graphic Kamat.Mayur.jpg with this presentation. (41 K bytes)
Comments and corrections to
webmaster@isedj.org