INTEGRATED RIGHT MANAGEMENT FOR HOME CONTENT - A SIM based Right Management Solution for Home Networks

György Kálmán, Josef Noll

Abstract

With continous internet access, the user behavior is changing. Now, users are creating and sharing their content over the network. With content sharing, the need for protection arises. Currently, no fine grained security solution exists, which provides such functionality for users. Easy and transparent user authentication and access control is of key importance. In this paper, we suggest a solution, where devices on the home network and in PANs may use a common right management infrastructure. Key of our recommendation is the mobile phone, which can act as a trusted key management and distribution unit for the user. In this paper, a solution is shown for easy access right management, a tamper resistant central unit is recommended and a service example is shown.

References

  1. Borisov, N., Goldberg, I., and Wagner, D. Intercepting mobile communications: The insecurity of 802.11.
  2. ETSI (2005). TS 102 350 V7.0.0 smart cards, identity files and procedures on a uicc. In ETSI Technical Specification.
  3. TCG Mobile Phone Working Group (2005). Use case scenarios v2.7.
  4. Noll, J., Calvet, J. L., and Kálmán, G. (2006a). License transfer mechanisms through seamless sim authentication. In Proceedings of Winsys 2006, Lisbon.
  5. Noll, J., Calvet, J. L., and Myksvoll, K. (2006b). Admittance service through mobile phone short messages. In Proceedings of ICWMC 2006, Bucharest.
  6. Popescu, B. C., Crispo, B., Tanenbaum, A. S., and Kamperman, F. L. (2006). A drm security architecture for home networks. In Proceedings of the 4th ACM workshop on Digital rights management.
  7. Potlapally, N., Ravi, S., Raghunathan, A., and Jha, N. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. In Mobile Computing, IEEE Transactions on.
  8. Pujolle, G., Urien, P., and Loutrel, M. (2003). A smartcard for authentication in wlans. In Proceedings of the 2003 IFIP/ACM Latin America conference on Towards a Latin American agenda for network research.
  9. Rahman, C. M. M. and Noll, J. (2006). Service interaction through role based identity. In Proceedings of WWRF 17.
Download


Paper Citation


in Harvard Style

Kálmán G. and Noll J. (2007). INTEGRATED RIGHT MANAGEMENT FOR HOME CONTENT - A SIM based Right Management Solution for Home Networks . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 107-111. DOI: 10.5220/0002127801070111


in Bibtex Style

@conference{secrypt07,
author={György Kálmán and Josef Noll},
title={INTEGRATED RIGHT MANAGEMENT FOR HOME CONTENT - A SIM based Right Management Solution for Home Networks},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={107-111},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002127801070111},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - INTEGRATED RIGHT MANAGEMENT FOR HOME CONTENT - A SIM based Right Management Solution for Home Networks
SN - 978-989-8111-12-8
AU - Kálmán G.
AU - Noll J.
PY - 2007
SP - 107
EP - 111
DO - 10.5220/0002127801070111