Multimedia Security and Digital Rights Management Technology

Multimedia Security and Digital Rights Management Technology

Eduardo Fernandez-Medina (Universidad de Castilla-La Mancho, Spain), Sabrina De Capitani di Vimercati (Universita di Milano, Italy), Ernesto Damiani (Universita di Milano, Italy), Mario Piattini (Universidad de Castilla-La Mancha, Spain) and Pierangela Samarati (Universita di Milano, Italy)
DOI: 10.4018/978-1-59140-186-5.ch007
OnDemand PDF Download:


Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of security issues around multimedia data management need to be addressed. First of all, it is important to identify the parties allowed to use the multimedia resources, the rights available to the parties, and the terms and conditions under which those rights may be executed: this is fulfilled by the Digital Rights Management (DRM) technology. Secondly, a new generation of security and privacy models and languages is needed, capable of expressing complex filtering conditions on a wide range of properties of multimedia data. In this chapter, we analyze the general problem of multimedia security. We summarize the most important XML-based formats for representing multimedia data, and we present languages for expressing access control policies. Finally, we introduce the most important concepts of the DRM technology.

Complete Chapter List

Search this Book:
Table of Contents
Maria Grazia Fugini, Carlo Bellettini
Chapter 1
Guido Bertoni, Jorge Guajardo, Christof Paar
In the last 20-30 years, the world of modern cryptography has been largely dominated by traditional systems such as the Data Encryption Standard and... Sample PDF
Architectures for Advanced Cryptographic Systems
Chapter 2
Diana Berbecaru, Corrado Derenale, Antonio Lioy
The technical solutions and organizational procedures used to manage certificates are collectively named Public Key Infrastructure (PKI). The... Sample PDF
Digital Certificates and Public-Key Infrastructures
Chapter 3
Gerald Maradan, Pierre Cotte, Thierry Fornas
Securing data is becoming of the utmost strategic importance in today’s digital environment. Open wide networks such as the Internet and... Sample PDF
Smart Card Applications and Systems: Market Trend and Impact on Other Technological Development
Chapter 4
Duminda Wijesekera, Sushil Jajodia
Advances in application areas such as Internet-based transactions, cooperating coalitions, and workflow systems have brought new challenges to... Sample PDF
A Flexible Authorization Framework
Chapter 5
Abdelmounaam Rezgui, Athman Rouguettaya, Zaki Malik
Over the past few years there has been a huge influx of web accessible information. Information access and storage methods have grown considerably.... Sample PDF
Enforcing Privacy on the Semantic Web
Chapter 6
Secure Data Dissemination  (pages 198-229)
Elisa Berino, Barbara Carminati, Elena Ferrari
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after... Sample PDF
Secure Data Dissemination
Chapter 7
Eduardo Fernandez-Medina, Sabrina De Capitani di Vimercati, Ernesto Damiani, Mario Piattini, Pierangela Samarati
Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the... Sample PDF
Multimedia Security and Digital Rights Management Technology
Chapter 8
Ping Lin, K. Selçuk Candan
The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of... Sample PDF
Data and Application Secutiry for Distributed Application Hosting Services
Chapter 9
Eduardo B. Fernandez, Michael Thomsen, Minjie H. Fernandez
Platforms for web services have been reduced to two basic approaches: Microsoft .NET and Sun ONE (J2EE). We compare here these two platforms with... Sample PDF
Comparing the Security Architectures of Sun ONE and Microsoft .NET
About the Authors