instantiated). While accessing the digital object the
DORD securely retrieves the digital object
protection keys from the license, and using them to
render the decipher the content and allow the
execution of the request operation over the digital
object. The described process corresponds only to
one of the many possible scenarios that were
identified, in which the combination of rights
expression languages, content encryption keys and
digital objects may coexist (Zeng, 2006).
4 CONCLUSIONS AND FUTURE
WORK
The authors of this paper have focused their work on
the presentation of the way most digital object rights
management solutions handle with the management
of the digital representation of rights. We have also
identified and briefly described a set of different
scenarios, about the usage of digital rights
expression languages for expressing digital object
licenses, the presence of the content encryption key
inside the licenses and the presence of such licenses
inside the digital objects. This identification has
resulted in six different scenarios, and the most
relevant one (implemented in the most significant
rights management solutions today) has been
selected and the license management life cycle was
described. After the identification and description of
the major processes in the selected scenario of
license management life cycle model, the authors
have identified the basic security procedures that
make the license management processes effective on
the digital objects rights management. Crucial
aspects such as confidentiality, integrity and
authentication are of extreme importance and
therefore need to be used with care to offer trust
across the entire license management life cycle. This
represents work in progress, and as a future work,
the authors of this paper will extend the proposed
license management life cycle model and analyse it
in terms of the different scenarios identified and
proposed in the paper. We will also try to identify
from real existing rights management solutions how
they handle license management, and how it can be
mapped to an identified scenario and to the general
life cycle model. The final goal for this would be to
provide a generic license management framework
that can be easily interoperable between the different
rights governing solutions.
REFERENCES
Xin Wang, T. DeMartini, B. Wragg, M. Paramasivam, and
C. Barlas. 2005. The MPEG-21 rights expression
language and rights data dictionary. Multimedia, IEEE
Transactions on 7, no. 3: 408- 417.
Nützel, Jürgen, and Anja Beyer. 2006. How to Increase
the Security of Digital Rights Management Systems
Without Affecting Consumer’s Security. In :
Emerging Trends in Information and Communication
Security, 368-380.
Safavi-Naini, Reihaneh, and Moti Yung. 2006. Digital
Rights Management: Technologies, Issues, Challenges
and Systems. Springer.
Shapiro, William, and Radek Vingralek. 2002. How to
Manage Persistent State in DRM Systems. In :
Security and Privacy in Digital Rights Management :
ACM CCS-8 Workshop DRM 2001, Philadelphia, PA,
USA, November 5, 2001.
Zeng, Wenjun, Heather Yu, and Ching-Yung Lin. 2006.
Multimedia Security Technologies for Digital Rights
Management. Academic Press.
Serrão C., Torres V., Delgado J., Dias M., 2006,
“Interoperability Mechanisms for registration and
authentication on different open DRM platforms”, in
International Journal of Computer Science and
Network Security, Vol. 6, Number 12, Pages 291-303.
Serrão C., Dias M., Delgado J., 2006, “Using Service-
oriented Architectures towards Rights Management
interoperability”, in Proceedings of the International
Joint Conferences on computer, Information and
Systems Sciences and Engineering (CISSE06),
University of Bridgeport, USA.
Serrão C., Dias M., Kudumakis P., 2005, “From OPIMA
to MPEG IPMP-X - A standard’s history across R&D
projects”, in Special Issue on European Projects in
Visual Representation Systems and Services, Image
Communications, Volume 20, Issue 9-10, Pages 972-
994, Elsevier.
Serrão C., Serra A., Dias M., Delgado J., 2006, Protection
of MP3 Music Files Using Digital Rights Management
and Symmetric Ciphering, Proceedings of the 2nd
International Conference on Automated Production of
Cross Media Content for Multi-channel Distribution
(AXMEDIS2006), Leeds, UK.
SECRYPT 2007 - International Conference on Security and Cryptography
256