DOC PREVIEW
Yale CPSC 155 - Content Distribution, Rights Management and Trusted Platforms

This preview shows page 1-2-15-16-17-32-33 out of 33 pages.

Save
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Content Distribution Rights Management and Trusted Platforms Brian A LaMacchia Software Architect bal microsoft com Windows Trusted Platform Technologies Microsoft Corporation CPSC 155b E Commerce Doing Business on the Internet March 25 2003 What is Content Distribution z The movement of content any digital information across a network from the content creator s machine to a content user s machine Usual example electronic distribution of massmarket media books music movies from the content creator or licensee to the consumer But enterprises have similar situations Consumers also distribute content Personally identifiable information 2 Enterprise challenges the fastest growing type of cybercrime involves the theft of intellectual property the pilfering of a company s plans for major projects stolen by an employee and sold to a competitor The New York Times January 27 2003 3 Enterprise challenges But most corporations do lose intellectual property through employees Whether intentionally or inadvertently electronic files containing corporate intellectual property can eventually show up on an outsider s Web site or worse in a competitor s hands Gartner G2 News Analysis February 25 2003 4 Enterprise challenges A public relations firm is dealing with a public relations nightmare after unintentionally e mailing journalists and others documents about one of its clients Seattle based Cell Therapeutics Seattle Times The February 1 2003 5 Enterprise challenges z z z 32 of the worst security incidents were caused by insiders 48 in large companies Intellectual property theft caused the greatest financial damage of all security failures Costs Consultant fees fix damage Down time Brand damage Legal liability Customer confidence etc 6 Have you ever encountered this 7 What is the Content Distribution Problem z The content distribution problem is one of control z Content creators want some control over how their content is consumed after it leaves their machines The Internet does a great job moving bits around but it cannot enforce policies on those bits once they ve moved 8 Rights Management z Enter rights management RM systems which aim to associate policy with content as that content flows across networks and enforce that policy at remote nodes The term digital rights management DRM tends to be used today to refer to RM systems specifically designed for mass market media We re going to talk about the general RM case today not specifically RM for media 9 Agenda z Motivation RM as a policy management problem z Rights expression languages XrML 2 X z Authoring evaluating policies for use of content For DRM representing grants of copyright related rights and modeling physical world transfers of rights Trusted Computing Platform Alliance TCPA and Nextgeneration Secure Computing Base NGSCB Approaches to adding attestation capabilities to the PC Attestation allows the PC to make a digitally signed statement about its state e g that some set of software is currently running Projecting policy expressions with confidence into remote environments For DRM content owners can have some assurance that recipients will abide by their policies for use of their content 10 Motivation z When we think about RM systems we tend to focus on the content to be managed z How is the content protected encrypted How are the keys managed In this lecture I want to focus not on the content but on the policies we associate with content Think about RM systems as they relate to policy expressions How are content policies written distributed and enforced 11 Policy Enforcement Systems are Prolific z When you view RM as a policy distribution enforcement mechanism you find lots more of them exist than you might expect 12 Policy Enforcement Mechanisms in Microsoft Products Today z MS DRM for eBooks z z MS DRM for Windows Media Ultimate TV eHome digital storage of video z File system ACLs z Enterprise policy management Group policy in domains z Partially trusted code policies NET Framework z NGSCB z Windows Rights Management Services z z Office 2003 Information Rights Management License servers for Terminal Services File Print Services etc Xbox anti repurposing 13 Policy related Tasks in RM Networks z Content owners or their agents author policy statements for content z RM aware servers or networks distribute policy statements z Owners license their exclusive rights in a copyright sense to consumers or distributors Maybe they distribute the content too End user RM systems consume and abide by policy statements when processing the content 14 Key Technical Challenges z As an industry we understand the crypto aspects of RM better than we understand the policy aspects z Key management is easier than policy management Critical policy work areas include Authoring evaluating policy expressions Projecting policy expressions with confidence into remote environments 15 General description of RELs z A rights expression language REL is a type of policy authorization language Focus is on expressing rights granted by one party to another Issuance and delegation rights for other grants are core concepts z Can be used to model lending loans transfers of rights REL design goals Provide a flexible extensible mechanism for expressing authorizations Enable interoperability across various policy evaluation systems Make it easy for policy authors e g content owners to express their desired policies 16 An example REL XrML 2 X z XrML the XML Rights Management Language is a standard currently under development 17 XrML 2 X z In the RM context XrML 2 X allows content owners a systematic way to express their intent for distribution and consumption z Like other policy languages XrML 2 X licenses statements declare authorizations but cannot enforce compliance Systems that consume XrML 2 X licenses must be trusted by the license issuer to properly enforce the grants specified within the license z Licenses are digitally signed by the issuer to protect their integrity z Licenses may be embedded within content or move independently 18 Semantic of a Grant z Every XrML 2 X grant has the following form z Issuer authorizes principal to exercise a right with respect to a resource subject to conditions A license is a collection of one or more grants made by the same issuer Grants may be chained together Bill s RM system trusts Tom and his delegates Tom delegates the right to license printing to John John issues a license Bill has the right to print the book Therefore Bill


View Full Document

Yale CPSC 155 - Content Distribution, Rights Management and Trusted Platforms

Documents in this Course
Portals

Portals

16 pages

Lecture 4

Lecture 4

30 pages

Lecture 2

Lecture 2

20 pages

Lecture 2

Lecture 2

19 pages

Lecture 9

Lecture 9

25 pages

Lecture 7

Lecture 7

23 pages

Load more
Download Content Distribution, Rights Management and Trusted Platforms
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Content Distribution, Rights Management and Trusted Platforms and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Content Distribution, Rights Management and Trusted Platforms and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?