Trusted computing and DRM

Nezer Zaidenberg, Pekka Neittaanmäki, Michael Kiperberg, Amit Resh

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. Such attacks include prevention of users to read each other’s data, use more than their allotted share of resources etc. To some extent anti-virus/anti-spam software is also included here. All password protection and used management software are included in this branch. The third branch, Trusted Computing, involves the verification of a remote host that the user machine will behave in a certain predictable way, i.e. protection against the current owner of the machine. The most common example for this kind of requirement is distribution of digital media. Digital media is distributed in some conditional access mode (rented, pay per view, sold for personal use, etc.). Obtaining digital media usually does not entitle the user to unlimited rights. The user usually may not redistribute or edit the digital media and may not even be allowed to consume it himself after a certain date.

Original languageEnglish
Pages (from-to)205-212
Number of pages8
JournalIntelligent Systems, Control and Automation: Science and Engineering
Volume78
DOIs
StatePublished - 2015
Externally publishedYes

Fingerprint

Dive into the research topics of 'Trusted computing and DRM'. Together they form a unique fingerprint.

Cite this