DRM Protection Technologies

DRM Protection Technologies

Gary Hackbarth
ISBN13: 9781466621367|ISBN10: 1466621362|EISBN13: 9781466621374
DOI: 10.4018/978-1-4666-2136-7.ch006
Cite Chapter Cite Chapter

MLA

Hackbarth, Gary. "DRM Protection Technologies." Digital Rights Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2013, pp. 87-98. https://doi.org/10.4018/978-1-4666-2136-7.ch006

APA

Hackbarth, G. (2013). DRM Protection Technologies. In I. Management Association (Ed.), Digital Rights Management: Concepts, Methodologies, Tools, and Applications (pp. 87-98). IGI Global. https://doi.org/10.4018/978-1-4666-2136-7.ch006

Chicago

Hackbarth, Gary. "DRM Protection Technologies." In Digital Rights Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 87-98. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2136-7.ch006

Export Reference

Mendeley
Favorite

Abstract

Digital Rights Management (DRM) is concerned with the ownership of digital information and access to that information. Organizations and individuals increasingly seek to prevent unauthorized or inadvertent release of owned, proprietary, or sensitive information. A variety of technologies are available to prevent the piracy and verify the true owners of digital content, unfortunately specifics of these technologies are often proprietary. Content can be protected by a variety of encryption techniques for the storage and transmission of digital information yet; these same techniques can limit access and usability of digital content. This chapter discusses the general state of digital security and technologies in use followed by a discussion of future directions for digital security research and practice.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.