– Additional infrastructure. The banks have to set up a highly accessible service in-
terface, but they already have similar services e.g. for online-banking.
– Single point of failure. The trusted-bank is the bottleneck of the architecture. Even
if data-throughput should be low because of the simple protocol and the small mes-
sages which are exchanged, the servers have to be secured against denial of ser-
vice, but the same issues are already addressed in recent classical online banking
systems.
– Effort to establish PKIs. Additional effort has to be considered to establish the
Public-Key-Infrastructure for the trust relationships.
6 Future Work
We need to further proceed with our prototypical implementation of this architecture
and therefore exactly define the needed Web Service interfaces and setup the PKI-
infrastructure to examine the benefits and challenges of this architecture in a greater
detail and to perform a detailed security assessment. We also want to investigate possi-
ble ways to improve user experience and acceptance of DRM systems even further.
References
1. Open Mobile Alliance: OMA Digital Rights Management V2.0 Specifications (2006)
http://www.openmobilealliance.org/release program/drm v2 0.html.
2. Free Software Foundation: Digital restrictions management and treacherous computing
(2006) http://www.fsf.org/campaigns/drm.html.
3. Erickson, J.S.: Fair use, drm, and trusted computing. Commun. ACM 46 (2003) 34–39
4. Cooper, A., Martin, A.: Towards an open, trusted digital rights management platform. In:
DRM ’06: Proceedings of the ACM workshop on Digital rights management, New York, NY,
USA, ACM Press (2006) 79–88
5. Cohen, J.E.: DRM and privacy. Commun. ACM 46 (2003) 46–49
6. Grimm, R., Puchta, S., M
¨
uller, M.: privacy4drm (2005)
https://www.datenschutzzentrum.de/drm/privacy4drm.pdf.
7. Grimm, R.: Privacy for digital rights management products and their business cases (2005)
http://www.uni-koblenz.de/ grimm/texte/Privacy4DRM Tech-Axmedis-Grimm-final.pdf.
8. Michiels, S., Verslype, K., Joosen, W., Decker, B.D.: Towards a software architecture for
drm. In: DRM ’05: Proceedings of the 5th ACM workshop on Digital rights management,
New York, NY, USA, ACM Press (2005) 65–74
9. Arnab, A., Hutchison, A.: Fairer usage contracts for drm. In: DRM ’05: Proceedings of the
5th ACM workshop on Digital rights management, ACM Press (2005) 1–7
10. Vora, P., Reynolds, D., Dickinson, I., Erickson, J., Banks, D.: Privacy and digital rights
management. In: In Proceedings of the W3C Workshop on Digital Rights Management
(Sophia-Antipolis, France, Jan. 22–23, 2001). (2001)
11. Choudhury, S.: Public Key Infrastructure Implementation and Design. Wiley & Sons (2002)
12. Iwasa, K., Durand, J., Rutt, T., Peel, M., Kunisetty, S., Bunting, D.: Web ser-
vices reliable messaging tc, ws-reliability 1.1 (2004) http://docs.oasis-open.org/wsrm/ws-
reliability/v1.1/wsrm-ws reliability-1.1-spec-os.pdf.
195