Security Attributes Based Digital Rights Management

C.N. Chong, R. van Buuren, Pieter H. Hartel, Geert Kleinhuis

    Research output: Book/ReportReportOther research output

    10 Citations (Scopus)


    ost real-life systems delegate responsibilities to di�erent authorities. We apply this model to a dig- ital rights management system, to achieve exible security. In our model a hierarchy of authorities issues certi�cates that are linked by cryptographic means. This linkage establishes a chain of control, identity-attribute-rights, and allows exible rights control over content. Typical security objectives, such as identi�cation, authentication, authoriza- tion and access control can be realised. Content keys are personalised to detect illegal super distri- bution. We describe a working prototype, which we develop using standard techniques, such as stan- dard certi�cates, XML and Java. We present ex- perimental results to evaluate the scalability of the system. A formal analysis demonstrates that our design is able to detect a form of illegal super dis- tribution.
    Original languageUndefined
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Publication statusPublished - Feb 2002

    Publication series

    NameCTIT technical report series
    PublisherCentre for Telematics and Information Technology, University of Twente
    ISSN (Print)1381-3625


    • IR-63082
    • EWI-5884
    • SCS-Cybersecurity

    Cite this