Security specification for conversion technologies of heterogeneous drm systems

Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Digital Right Management (DRM) can be used to prohibit illegal reproduction, and redistribution of digital content, to protect copyrights. However, current DRM systems are incompatible and lack of interoperability which exchange of data, different platform, designed and protected by different content providers. To overcome these drawbacks, three ways of interoperability are full-formation interoperability, connected interoperability, configuration-driven interoperability, allowing consumers to use the purchased content in their equipments of choice. In this paper, we study on the security specification of configuration-driven interoperability for heterogeneous DRM systems, using the Common Criteria. Then, we study security boundary, security environment, security objectives, and rationale of an CTHDS-PP(Conversion Technologies of Heterogeneous DRM Systems Protection Profile) to find important security features. The CTHDS-PP gives a discussion covered the current security problems to conversion technologies and lists threats to solve those problems. Moreover, this CTHDS-PP can be used for potential developers and system integrators, and reviewed and assessed by evaluators.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 5th International Conference, ISPEC 2009, Proceedings
Number of pages12
Publication statusPublished - 2009
Externally publishedYes
Event5th International Conference on Information Security Practice and Experience, ISPEC 2009 - Xi'an, China
Duration: 2009 Apr 132009 Apr 15

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5451 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other5th International Conference on Information Security Practice and Experience, ISPEC 2009


  • Common Criteria(CC)
  • Digital rights management(DRM)
  • Interoperability
  • Protection Profile(PP)

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Security specification for conversion technologies of heterogeneous drm systems'. Together they form a unique fingerprint.

Cite this