SlideShare a Scribd company logo
Dr. Tarek Gaber 
Faculty of Computers & Informatics 
Suez Canal University , Ismailia, Egypt 
and 
SRGE (www.scienceegypt.net) 
Email: tmgaber@gmail.com 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Before the digital era, 
one's ability to do various 
things with content were 
limited. 
The Internet (digital age) 
makes it possible to 
nearly do anything with 
digital content. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Digital contents, e.g. Music, 
Movies, documents, are: 
very easy and cheap to copy 
Essentially no “resistance” from 
duplication 
This led to: 
Loss of billion dollars a year for world 
trade. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Cryptographic 
Techniques 
could help but 
not enough 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014 
4
Can content be protected even 
after its decryption? 
Copying by persistent pirate would 
always be succeed. 
Current technology can potentially 
minimize the scale of copying: 
“keeping honest people honest” 
Digital Rights Management (DRM) 
technologies can be help in this issue. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 It is a set of technologies (encryption, 
watermarking, hash function, signature, 
etc.) enabling content owners to identify 
and control: 
 the access to their content and 
 the conditions under which this access is given. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 DRM includes: 
 Persistent Protection: License to be always checked before 
using a content 
 Access tracking: Capability of tracking access to and 
operations on content 
 Rights licensing: Capability of defining specific rights to 
content and making them available by contract 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Government Agencies 
• Interested in controlled viewing and sharing of highly secure and 
confidential documents, audio and video data. 
Private Corporations 
• Want to limit the sharing of their proprietary information 
• Track accesses and any modifications made to it. 
• E.g. news agencies like Reuters 
Owners of commercial content 
• Content owners, artists, and publishers want to gain revenue 
through sale and promotions 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
DRM can help to ensure companies that: 
• Rights are tracked at consumption 
• Access is controlled during production processes 
• Protection for the content extends throughout 
product lifecycles 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 DRM can be integrated with content 
management (collection, managing, and 
publishing of information in any form or 
medium) to ensure: 
 Proper business practices 
 Implementation of new business models 
 Compliance with regulatory requirements in 
industries such as financial services, healthcare, 
and government 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 The process of drafting a law is circulated among 
committee members (e.g. judges and lawyers). 
 Using DRM technology, this becomes a closed 
circulation. 
 Also, the drafting law is in a tamper-proof format, with 
 print-only user-rights, 
 limited to a pre-determined timeframe, after which the draft 
is withdrawn and replaced by the final law. 
 The judges and lawyers can 
 withdraw, alter, or grant permissions related to the content 
at any time. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Systems should be able to update rights and usage as 
needed to accommodate new distribution models, 
 E.g. allowing content to be accessed by to 2, 3, or 5 devices 
 Otherwise cost a lot of money and be a disincentive to 
customers. 
 DRM, in such case, can facilitate 
 collaboration, by creating the ‘trusted environment’ 
 by persistently protecting critical Intellectual Property (IP). 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Piracy, whether of software, music, images, or text, 
costs billions of dollars each year. 
It takes time and resources to detect and deter 
theft. 
This could lead to counterproductive to developing 
new business models for digital content. 
DRM could also help to provide protection 
throughout the distribution and consuming of 
content. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Licensing 
 The process of packaging and delivering protected 
bits with un-forgeable terms of usage (“digital 
license”) useable only by authenticated 
user/environment 
Enforcement 
 The process of insuring that the use of the digital 
work adheres to enumerated use, privacy and 
operating restrictions stated in a digital license 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Content is encrypted 
 So, unusable without authorization 
Content license 
 Specifies authentication information, DRM client and OS. 
 Specifies usage/access control rules 
 Contains the “sealed” key for the content. 
Content License 938473 
Machine 02345 Running 
Program 1 (with hash 0x7af33) 
Can view Document 3332 on 2014-20-01 
Sealed Key: 0x445635 
Signed by ACCD Company 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
At initialization, Trusted Program says: 
1. Isolate me from other rendering programs 
2. Authenticate me 
After Initialization completes successfully, Bob’s PC 
1. Makes Private key available for use 
When consuming content, Trusted Program: 
1. Retrieves license and encrypted content file 
2. Authenticates license by checking digital signature 
3. Checks rule compliance (e.g. out-of-date) 
4. Uses private key to unseal the content key 
5. Decrypts and uses content within Trusted Program 
Bob’s PC 
Trusted Program 
Authenticating Public Key 
(“Root of Trust”) 
0x7af33 PK: 8374505 
Bob’s PC 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
License Server 
2) Response 
Here’s your license 
Content License 938473 
Machine 02345 Running 
Program 1 (with hash 0x7af33) 
Can view Document 3332 
on 2014-20-01 
Sealed Key: 0x445635 
Signed ACCD Company 
1) Request 
I want document 2346. 
Here’s my Machine License 
to show you can trust my 
machine 
Machine License 83874 
Machine 02345 Running 
Program 1 (with hash 0x7af33) 
Has access to a private key 
Whose public key is 0x2231 
Signed Microsoft 
1 2 
Bob’s PC 
Customer benefits 
 Licenses can be used offline 
 Simple management of authorization (no central authority) 
 Very simple and flexible distribution (a server can distribute to “any” client) 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Each “rights expression” may specify a 
combination of rules such as: 
 what rights are available, 
 for whom, 
 for how many times, 
 within what time period, 
 under what access conditions, 
 for what fees, 
 within which territory, and 
 with what obligations, 
 Etc. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
• Mass Market Content 
• Books 
• Audio 
• Video 
• Software 
• Much more flexible use and better content 
management 
– But there are “Fair Use” and privacy concerns which 
can be mitigated … maybe 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Premium releases 
 Price discrimination 
 I hear it. I want it. I get it. 
 Lower manufacturing costs 
 More variety? 
 Most popular use of DRM 
 I don’t get it 
 Library/archive 
 Roaming 
 “Active” content 
Pay per view 
movies 
Web distributed 
songs 
Ring tones 
E-Books 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Windows Media Player 
 Apple DRM 
 Macrovision 
 LexMark 
 Xbox 
 Sony Playstation 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Break Once Break Everywhere 
 Degree of isolation 
 Transducer Problem 
 I/O 
 Privacy and Interoperability 
 Flexibility (transfer, etc) 
 Multiple devices 
 Multiple users 
 Migration 
 User Control/Backup 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
• “Fair Use” 
• Monopoly “Lock-in” 
• Erosion of copyright in favor of “contracts” 
• Archive 
• “Information wants to be free” 
• Consumer expectations 
• severe licensing policies 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 It is essential for DRM systems to provide 
interoperable services. 
 DRM could enable a big amounts of new content to 
be made available in safe, open, and trusted 
environments. 
 DRM can be expected to be heavily used in the 
future to support 
 digital library collections, 
 code and software development, 
 distance education, and 
 networked collaboration, among other applications. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Thanks 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014

More Related Content

What's hot

North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodslocalinsight
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
Bellaj Badr
 
IBM
IBMIBM
McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010emmettmccord
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
Chin Wan Lim
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiplarkinsa
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye
 
Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International Law
Jon Garon
 
Cyber security
Cyber securityCyber security
Cyber security
jvsihag
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhoveimec.archive
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011CPPGroup Plc
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
mmavis
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
Agustina
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
Shoeb Ahmed
 

What's hot (20)

North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoods
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
IBM
IBMIBM
IBM
 
McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International Law
 
Cyber security
Cyber securityCyber security
Cyber security
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
 
Deep web
Deep webDeep web
Deep web
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
 

Viewers also liked

Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Amit Maitra
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategy
Heather Ford
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM InteroperabilityHiram Juarbe
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07
bobweber
 
8 Critical Success Factors For Lead Generation
8 Critical Success Factors For Lead Generation8 Critical Success Factors For Lead Generation
8 Critical Success Factors For Lead Generation
Nicole Wafer
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
Carlos Serrao
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
pabatan
 
IP CCTV Why new firms dominate the new technology
IP CCTV Why new firms dominate the new technologyIP CCTV Why new firms dominate the new technology
IP CCTV Why new firms dominate the new technology
Chris Sandström
 
Start-up Lingo For Dummies
Start-up Lingo For DummiesStart-up Lingo For Dummies
Start-up Lingo For Dummies
Nasscom Startups
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content Frustration
Sarah Houghton
 
Start-up valuation: a quick and dirty approach
Start-up valuation: a quick and dirty approachStart-up valuation: a quick and dirty approach
Start-up valuation: a quick and dirty approach
Toscana Enterprises Corporation
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & Gaming
Ramesh Kumar
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights Management
Roberto García
 
Start up India
Start up IndiaStart up India
Start up India
Jatin Goel
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
SaneMaly
 
Every Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Every Brief is A Start Up | Ioana Filip Keynote @ EurobestEvery Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Every Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Ioana Filip
 
Start up innovation culture
Start up innovation cultureStart up innovation culture
Start up innovation culture
Jag Randhawa
 
Why the lean start-up changes everything
Why the lean start-up changes everythingWhy the lean start-up changes everything
Why the lean start-up changes everything
Wei Li
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRM
castLabs
 

Viewers also liked (20)

Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategy
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM Interoperability
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07
 
8 Critical Success Factors For Lead Generation
8 Critical Success Factors For Lead Generation8 Critical Success Factors For Lead Generation
8 Critical Success Factors For Lead Generation
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
IP CCTV Why new firms dominate the new technology
IP CCTV Why new firms dominate the new technologyIP CCTV Why new firms dominate the new technology
IP CCTV Why new firms dominate the new technology
 
Start-up Lingo For Dummies
Start-up Lingo For DummiesStart-up Lingo For Dummies
Start-up Lingo For Dummies
 
Scenario Mapping
Scenario MappingScenario Mapping
Scenario Mapping
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content Frustration
 
Start-up valuation: a quick and dirty approach
Start-up valuation: a quick and dirty approachStart-up valuation: a quick and dirty approach
Start-up valuation: a quick and dirty approach
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & Gaming
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights Management
 
Start up India
Start up IndiaStart up India
Start up India
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
 
Every Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Every Brief is A Start Up | Ioana Filip Keynote @ EurobestEvery Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Every Brief is A Start Up | Ioana Filip Keynote @ Eurobest
 
Start up innovation culture
Start up innovation cultureStart up innovation culture
Start up innovation culture
 
Why the lean start-up changes everything
Why the lean start-up changes everythingWhy the lean start-up changes everything
Why the lean start-up changes everything
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRM
 

Similar to Drm digital rights managment-june2014-tarek gaber

Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Franck Franchin
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
Muruli N. Tarikere
 
A Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudA Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on Cloud
TELKOMNIKA JOURNAL
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4
D.J Md Thani
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
What is DRM, Types of DRM
What is DRM, Types of DRMWhat is DRM, Types of DRM
What is DRM, Types of DRM
Jarom Joseph
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
ikmalsham
 
La1 powerpoint-1
La1 powerpoint-1La1 powerpoint-1
La1 powerpoint-1suefee
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
Himanshu Chandra
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Paolo Nesi
 
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
International journal of scientific and technical research in engineering (IJSTRE)
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new releaseElena Zvarici
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
Shreyas Patil
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt shortgiladpn
 
FAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic mediaFAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic media
Firma Autógrafa Digital
 
What is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechWhat is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva Tech
Ameva Tech
 

Similar to Drm digital rights managment-june2014-tarek gaber (20)

Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
 
Lecture7
Lecture7Lecture7
Lecture7
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
A Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudA Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on Cloud
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
What is DRM, Types of DRM
What is DRM, Types of DRMWhat is DRM, Types of DRM
What is DRM, Types of DRM
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
La1 powerpoint-1
La1 powerpoint-1La1 powerpoint-1
La1 powerpoint-1
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
 
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new release
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt short
 
FAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic mediaFAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic media
 
What is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechWhat is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva Tech
 

More from Tarek Gaber

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)
Tarek Gaber
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Tarek Gaber
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Tarek Gaber
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation project
Tarek Gaber
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project Thesis
Tarek Gaber
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_Gaber
Tarek Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Tarek Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image Authentication
Tarek Gaber
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareTarek Gaber
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarekTarek Gaber
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Tarek Gaber
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...
Tarek Gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...
Tarek Gaber
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
Tarek Gaber
 

More from Tarek Gaber (15)

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation project
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project Thesis
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image Authentication
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid share
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarek
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Drm digital rights managment-june2014-tarek gaber

  • 1. Dr. Tarek Gaber Faculty of Computers & Informatics Suez Canal University , Ismailia, Egypt and SRGE (www.scienceegypt.net) Email: tmgaber@gmail.com 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 2. Before the digital era, one's ability to do various things with content were limited. The Internet (digital age) makes it possible to nearly do anything with digital content. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 3. Digital contents, e.g. Music, Movies, documents, are: very easy and cheap to copy Essentially no “resistance” from duplication This led to: Loss of billion dollars a year for world trade. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 4.  Cryptographic Techniques could help but not enough 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014 4
  • 5. Can content be protected even after its decryption? Copying by persistent pirate would always be succeed. Current technology can potentially minimize the scale of copying: “keeping honest people honest” Digital Rights Management (DRM) technologies can be help in this issue. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 6.  It is a set of technologies (encryption, watermarking, hash function, signature, etc.) enabling content owners to identify and control:  the access to their content and  the conditions under which this access is given. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 7.  DRM includes:  Persistent Protection: License to be always checked before using a content  Access tracking: Capability of tracking access to and operations on content  Rights licensing: Capability of defining specific rights to content and making them available by contract 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 8. Government Agencies • Interested in controlled viewing and sharing of highly secure and confidential documents, audio and video data. Private Corporations • Want to limit the sharing of their proprietary information • Track accesses and any modifications made to it. • E.g. news agencies like Reuters Owners of commercial content • Content owners, artists, and publishers want to gain revenue through sale and promotions 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 9. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 10. DRM can help to ensure companies that: • Rights are tracked at consumption • Access is controlled during production processes • Protection for the content extends throughout product lifecycles 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 11.  DRM can be integrated with content management (collection, managing, and publishing of information in any form or medium) to ensure:  Proper business practices  Implementation of new business models  Compliance with regulatory requirements in industries such as financial services, healthcare, and government 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 12.  The process of drafting a law is circulated among committee members (e.g. judges and lawyers).  Using DRM technology, this becomes a closed circulation.  Also, the drafting law is in a tamper-proof format, with  print-only user-rights,  limited to a pre-determined timeframe, after which the draft is withdrawn and replaced by the final law.  The judges and lawyers can  withdraw, alter, or grant permissions related to the content at any time. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 13.  Systems should be able to update rights and usage as needed to accommodate new distribution models,  E.g. allowing content to be accessed by to 2, 3, or 5 devices  Otherwise cost a lot of money and be a disincentive to customers.  DRM, in such case, can facilitate  collaboration, by creating the ‘trusted environment’  by persistently protecting critical Intellectual Property (IP). 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 14. Piracy, whether of software, music, images, or text, costs billions of dollars each year. It takes time and resources to detect and deter theft. This could lead to counterproductive to developing new business models for digital content. DRM could also help to provide protection throughout the distribution and consuming of content. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 15. Licensing  The process of packaging and delivering protected bits with un-forgeable terms of usage (“digital license”) useable only by authenticated user/environment Enforcement  The process of insuring that the use of the digital work adheres to enumerated use, privacy and operating restrictions stated in a digital license 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 16. Content is encrypted  So, unusable without authorization Content license  Specifies authentication information, DRM client and OS.  Specifies usage/access control rules  Contains the “sealed” key for the content. Content License 938473 Machine 02345 Running Program 1 (with hash 0x7af33) Can view Document 3332 on 2014-20-01 Sealed Key: 0x445635 Signed by ACCD Company 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 17. At initialization, Trusted Program says: 1. Isolate me from other rendering programs 2. Authenticate me After Initialization completes successfully, Bob’s PC 1. Makes Private key available for use When consuming content, Trusted Program: 1. Retrieves license and encrypted content file 2. Authenticates license by checking digital signature 3. Checks rule compliance (e.g. out-of-date) 4. Uses private key to unseal the content key 5. Decrypts and uses content within Trusted Program Bob’s PC Trusted Program Authenticating Public Key (“Root of Trust”) 0x7af33 PK: 8374505 Bob’s PC 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 18. License Server 2) Response Here’s your license Content License 938473 Machine 02345 Running Program 1 (with hash 0x7af33) Can view Document 3332 on 2014-20-01 Sealed Key: 0x445635 Signed ACCD Company 1) Request I want document 2346. Here’s my Machine License to show you can trust my machine Machine License 83874 Machine 02345 Running Program 1 (with hash 0x7af33) Has access to a private key Whose public key is 0x2231 Signed Microsoft 1 2 Bob’s PC Customer benefits  Licenses can be used offline  Simple management of authorization (no central authority)  Very simple and flexible distribution (a server can distribute to “any” client) 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 19. Each “rights expression” may specify a combination of rules such as:  what rights are available,  for whom,  for how many times,  within what time period,  under what access conditions,  for what fees,  within which territory, and  with what obligations,  Etc. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 20. • Mass Market Content • Books • Audio • Video • Software • Much more flexible use and better content management – But there are “Fair Use” and privacy concerns which can be mitigated … maybe 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 21.  Premium releases  Price discrimination  I hear it. I want it. I get it.  Lower manufacturing costs  More variety?  Most popular use of DRM  I don’t get it  Library/archive  Roaming  “Active” content Pay per view movies Web distributed songs Ring tones E-Books 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 22.  Windows Media Player  Apple DRM  Macrovision  LexMark  Xbox  Sony Playstation 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 23.  Break Once Break Everywhere  Degree of isolation  Transducer Problem  I/O  Privacy and Interoperability  Flexibility (transfer, etc)  Multiple devices  Multiple users  Migration  User Control/Backup 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 24. • “Fair Use” • Monopoly “Lock-in” • Erosion of copyright in favor of “contracts” • Archive • “Information wants to be free” • Consumer expectations • severe licensing policies 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 25.  It is essential for DRM systems to provide interoperable services.  DRM could enable a big amounts of new content to be made available in safe, open, and trusted environments.  DRM can be expected to be heavily used in the future to support  digital library collections,  code and software development,  distance education, and  networked collaboration, among other applications. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 26. Thanks 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014