
instantiated). While accessing the digital object the 
DORD securely retrieves the digital object 
protection keys from the license, and using them to 
render the decipher the content and allow the 
execution of the request operation over the digital 
object. The described process corresponds only to 
one of the many possible scenarios that were 
identified, in which the combination of rights 
expression languages, content encryption keys and 
digital objects may coexist (Zeng, 2006). 
4 CONCLUSIONS AND FUTURE 
WORK 
The authors of this paper have focused their work on 
the presentation of the way most digital object rights 
management solutions handle with the management 
of the digital representation of rights. We have also 
identified and briefly described a set of different 
scenarios, about the usage of digital rights 
expression languages for expressing digital object 
licenses, the presence of the content encryption key 
inside the licenses and the presence of such licenses 
inside the digital objects. This identification has 
resulted in six different scenarios, and the most 
relevant one (implemented in the most significant 
rights management solutions today) has been 
selected and the license management life cycle was 
described. After the identification and description of 
the major processes in the selected scenario of 
license management life cycle model, the authors 
have identified the basic security procedures that 
make the license management processes effective on 
the digital objects rights management. Crucial 
aspects such as confidentiality, integrity and 
authentication are of extreme importance and 
therefore need to be used with care to offer trust 
across the entire license management life cycle. This 
represents work in progress, and as a future work, 
the authors of this paper will extend the proposed 
license management life cycle model and analyse it 
in terms of the different scenarios identified and 
proposed in the paper. We will also try to identify 
from real existing rights management solutions how 
they handle license management, and how it can be 
mapped to an identified scenario and to the general 
life cycle model. The final goal for this would be to 
provide a generic license management framework 
that can be easily interoperable between the different 
rights governing solutions. 
REFERENCES 
Xin Wang, T. DeMartini, B. Wragg, M. Paramasivam, and 
C. Barlas. 2005. The MPEG-21 rights expression 
language and rights data dictionary. Multimedia, IEEE 
Transactions on 7, no. 3:  408- 417. 
Nützel, Jürgen, and Anja Beyer. 2006. How to Increase 
the Security of Digital Rights Management Systems 
Without Affecting Consumer’s Security. In  : 
Emerging Trends in Information and Communication 
Security, 368-380.  
Safavi-Naini, Reihaneh, and Moti Yung. 2006. Digital 
Rights Management: Technologies, Issues, Challenges 
and Systems. Springer.  
Shapiro, William, and Radek Vingralek. 2002. How to 
Manage Persistent State in DRM Systems. In  : 
Security and Privacy in Digital Rights Management : 
ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, 
USA, November 5, 2001.  
Zeng, Wenjun, Heather Yu, and Ching-Yung Lin. 2006. 
Multimedia Security Technologies for Digital Rights 
Management. Academic Press.  
Serrão C., Torres V., Delgado J., Dias M., 2006, 
“Interoperability Mechanisms for registration and 
authentication on different open DRM platforms”, in 
International Journal of Computer Science and 
Network Security, Vol. 6, Number 12, Pages 291-303. 
Serrão C., Dias M., Delgado J., 2006, “Using Service-
oriented Architectures towards Rights Management 
interoperability”, in Proceedings of the International 
Joint Conferences on computer, Information and 
Systems Sciences and Engineering (CISSE06), 
University of Bridgeport, USA. 
Serrão C., Dias M., Kudumakis P., 2005, “From OPIMA 
to MPEG IPMP-X - A standard’s history across R&D 
projects”, in Special Issue on European Projects in 
Visual Representation Systems and Services, Image 
Communications, Volume 20, Issue 9-10, Pages 972-
994, Elsevier. 
Serrão C., Serra A., Dias M., Delgado J., 2006, Protection 
of MP3 Music Files Using Digital Rights Management 
and Symmetric Ciphering, Proceedings of the 2nd 
International Conference on Automated Production of 
Cross Media Content for Multi-channel Distribution 
(AXMEDIS2006), Leeds, UK. 
SECRYPT 2007 - International Conference on Security and Cryptography
256