Digital Rights Management(DRM) Using XrML

Size: px
Start display at page:

Download "Digital Rights Management(DRM) Using XrML"

Transcription

1 Digital Rights Management(DRM) Using XrML Heng Guo Helsinki University of Technology Department of Computer Science and Engineering Abstract This paper describes Digital Rights Management(DRM) and XrML. They are posing their increasingly importance in today s e-commerce. Based on recent evolution of DRM, this paper describes DRM entities involved model, rights model, technical issues, etc. Then, XrML, a XML based right language of DRM is introduced. Finally in conclusion, DRM and XrML future development are prospected. 1. Introduction DRM and XrML are both newly emerging things. DRM(Digital Rights Management) is a key point in e-commerce systems on the market of digital content. It permits the smooth, secure, trusted movement of digital works from creators and publishers to retailers and consumers. XrML(eXtensible rights Markup Language) is a type of language for DRM. It is a key element of ContentGuard DRM solutions. It is an XML-based language that assigns usage rights to content. It is a right management language for describing specifications of rights, fees and conditions for using digital contents(or properties), together with message integrity and entity authentication. Now it has been supported by some leading technology providers 2. Background One of the fastest growing and most profiting sectors of today s economy is information industry. Its success has in short time brought new opportunities to do business with digital information products. [12] New technologies like telecommunications, Internet, etc. is now enabling a new business models --- e-commerce. On the market of digital content, this results in information prosperity and provides new distribution channels, lower costs and fewer barriers. But for a long time, the perfect market for digital content was only a dream for publishers and distributors. Distributing information in digital forms presents 1

2 numerous legal concerns, especially on the Internet. The Internet was originally designed on an open architecture. It enables more and more new business opportunities but is vulnerable to the unauthorized use of information. It is difficult for the information providers to control what the others do with the information. For example, the publishers headache --- illegal copying and spreading, it is very easy to reproduce digital information and the quality is as good as the originals. This results in significant losses for authors, publishers and those legal customers. Now industry is demanding urgently an efficient mechanism for e-content protection. Digital rights management(drm), what we are talking about in this seminar paper is proposed for this purpose. 3. Digital Rights Management(DRM) Digital Rights Management poses greatest challenges for content communities. It will enable the growth and success of the e-content market. 3.1 What is DRM? Unfortunately, so far there exists no agreeable definition for DRM among those consortia which are now developing DRM systems. W3C (World Wide Web Consortium) has arranged a DRM workshop in January, The workshop brought together 65 leading DRM practitioners to discuss and debate DRM in general. The W3C is now considering whether and in what role it should take in this increasingly important area. The DRM suggested in W3C is the "digital management of rights", not the "management of digital rights"[3]. It covers the description, identification, trading, protection, monitoring and tracking of all forms of rights usages over contents, and the management of rights holders relationships as well. The first-generation of DRM Digital Rights Management (DRM) focused on security and encryption solving the issue of unauthorized copying by locking the content and limiting its distribution to only those who pay. It represented a substantial narrowing of broader capabilities of DRM. The second-generation of DRM takes the focus away from the current security/encryption/enforcement views and extends its capabilities to management issues. DRM has many benefits: For authors, publishers and retailers, DRM enhances marketing, targeting and understanding of consumer usage; provides greater security, track, persistent protection of content; guarantees the copyright compliance. For consumers, DRM improves products and services; provides access to higher quality content and a wealth of digital works; enhances user experience and convenience; saves time and money.for economy and market, DRM provides new business models. That is, sell individual components, pay per transaction or volume based, super distribution, etc. DRM increased productivity. 2

3 3.2 Entities Involved There are three core entities involved in Digital Rights Management: Users, Content and Rights. The Users can be any type of user like publishers, record companies, movie studios, corporate enterprises, end-user customers, etc. This entity creates the Content and uses the Content. The Content is any type of content at any level of aggregation. The Rights are the permissions, constraints, and obligations which are over the Content and would be granted to the Users[13]. It is described in detail in next section. Their relationship is shown in Figure 1. Rights Own Over Users Create/Use Content Figure 1: Core entities and their relationship 3.3 Rights Model The Rights entity allows expressions to be made about the allowable permissions, constraints, obligations, and any other rights-related information about Users and Content. Rights expressions can become complex quite quickly. Because of that, they are also modeled to understand the relationships within the rights expressions. This has been evidenced in the Open Digital Rights Language and a paper by Carl A. Gunter et al. [13] The Rights Model is shown in Figure 2. Count Time Territory Pay Tracking Loyalty Points Obligations Rights Holders Constraints Usage Permissions Play Print Reuse 3

4 Figure 2: The Rights Model As shown in Figure 2, rights expressions should consist of : [13] Permissions (i.e., usages) - what you are allowed to do Constraints - restrictions on the permissions Obligations - what you have to do/provide/accept Rights Holders - who is entitled to what 3.4 Digital Rights Management Features DRM includes features[12]: Set and refine rights management policies. An entity should define and continuously improve action on how to manage its rights in information products as part of its intellectual asset management strategy. Make and manage agreements. DRM should make agreements on rights in information products, and make contract management related to those agreements. Manage information on acquired rights. When some rights are acquired from other entities, it is important to know from whom those rights were received, how broad the rights are, how much and when the entity must pay for the rights, and so on. Control and enforce licenses. In most cases, reasonable business requires that a company licenses some rights to other entities. Therefore it is essential that the company is able to control what the others do with its products and enforce the terms of license agreements if necessary. Support marketing. DRM activities need to be flexible enough to support whatever marketing methods an entity decides to use. Support revenue collection and sharing. DRM should provide a way to be able to collect, account and share revenues from the users of the information within commercial entities. Risk management. Risks involved in DRM are future possible losses related to information in digital form so it would be better to manage those risks in advance. 3.5 Technical Issues The central area to build a working DRM system is the combination of rights model, rights management, and tools. Rights model need to be full understood in order to build rights management on top of it. Tools need to be treated and designed carefully in order to perform rights management. It could be divided into legal tools and technical tools. Legal tools are the set of tools that a legal system provides to protect one s legal rights. The tools include law enforcement, litigation, arbitration, and execution of court s rulings, etc[12]. They are not discussed further in this paper. Technical tools are meant to perform DRM. There are some technical issues which are considered to be important. Standardization. Now the e-content industry faces an important hurdle ---- a lack of standards to enable participants systems to work together and create a seamless 4

5 experience for both content providers and end users. So it is very important to ensure the adequate interoperability of the DRM systems. A good first step for DRM standardization is digital rights language. Next chapter in this paper introduces XrML, together with ODRL(Open Digital Rights Language), XMCL(eXtensible Media Commerce Language), etc. are efforts for this purpose. Security. DRM needs a Trust Infrastructure. A Rights Language and an architectural model shall be able to connect to the Trust-Systems developed elsewhere. To summarize a few concerns about Trust infrastructures from the W3C Workshop: What will "it" look like? Who should manage trust? How will trust be "interoperable? What are the social/legal issues (eg liability)? How to deal with trusted components (hardware/software)? But the issue of PKI and trust-structures is not a special case of DRM. E-Commerce and all kinds of services in the digital world depend on trust structures. Trust-structures are actually such a big task, that they should be considered outside a DRM-Activity[3]. It is not discussed further in this paper. 3.6 DRM system Implementation Examples At present, on the market of DRM systems, there exists various program decisions and services intended to spread the digital content and manage their rights. The most active ones are developed by the companies Adobe Systems, Glassbook, Softlock, InterTrust, ContentGuard, etc. Adobe Systems has developed a special technology Web Buy and PDF Merchant for selling the electronic publications in PDF format. Glassbook and Softlock have developed their own decisions for controlling electronic content and its rights. Product family includes Glassbook Reader / Glassbook Content Server and network system of selling the electronic documents in the format PDF e-merchandising. InterTrust has developed a general purpose DRM platform, Rights System, to serve as a foundation. The Rights System platform consists of DRM Software and Technology, Professional Services, and MetaTrust Utility Services. ContentGuard, founded in April 2000 by companies Xerox and Microsoft on the base of subdivision Xerox Rights Management Group. It is created for developing a DRM system which can control a spreading variety of digital content, including electronic books, digital audio and video. One of the key elements of the system is the XrML(extensible right MarkUp Language) which will be described in next chapter. 4. extensible rights Markup Language(XrML) 5

6 DRM covers a broad technical space. Its standardization is now occurring in a number of open organizations. There are several consortia hosting activities that will influence the field. For example, MPEG-4: IPMP (Intellectual Property Management and Protection), MPEG-7 Multimedia Description Schemes and Systems Layer, MPEG-21 Digital Item Identification and Description, W3C: XML-signatures, XML-encryption, XML-protocol, W3C: RDF, DAML and other "Semantic Web" projects, OpenEBook Forum: Previous EBX work on trust infrastructure and current "Rights & Rules WG"[3]. But, none of these activities solves the DRM interoperability and standardization problem. In particular, none of these deals with what we think of as the essential first step for the Web: the simple expression and communication of IPR information and policies. ODRL, XrML and XMCL have done something in this area. XrML is a language in XML (extensible Markup Language) for describing specifications of rights, fees and conditions for using digital contents (or properties), together with message integrity and entity authentication. XrML documents are XML conforming so they are readily viewed, edited, and validated with standard XML tools for example XML SPY. It is intended to support commerce in digital contents, and also intended to support specification of access and use controls for secure digital documents in cases where financial exchange is not part of the terms of use. In additionally, XrML supports and accommodates other industry standard, such as SSL, public/private key encryption and the DOI initiative. XrML describe rights, fees and conditions appropriate to commerce models they select, provide standard terms for usage rights with useful, concise and easily understandable meanings, offer vendors operational definitions of trusted systems for compliance testing and evaluation, provide extensibility to new language features without compromising XrML s other goals, provides an open architecture, scalability, customization, extensibility and the capacity to integrate with both existing systems and new ones as they are developed. 4.1 XrML Evolution ContentGuard, Inc. is committed to promoting a standard language that will express rights and specifications that can be universally interpreted by trusted systems technology platforms. To facilitate this common standard, ContentGuard has developed the XrML Specifications for DRM software (based on extensive research conducted at the Palo Alto Research Center - PARC) and desires to license the use of the XrML Specifications royalty-free. XrML is developed by the group of specialists under the direction of Mark Stefik in Xerox Palo Alto Research Center (PARC). The base to creation of XrML is the Digital Property Rights Language (DPRL) that was developed by the same group during [6]. Version 1 of DPRL ( ), Xerox, which is focus on machine enforceable rights. Version 2 of DPRL( ), Xerox. It is XML based syntax that enables you to specify rights information (fees, terms, and conditions) for documents. 6

7 XrML 1.0 (2000), ContentGuard.Com. It is extension of DPRL 2.0, introduce generic principals and named principals, message and entity integrity, location and tracking conditions. Compare with previous versions, it is uniform, flexible, and extensible. 4.2 XrML Lifecycle In application, publishers need not learn the rights markup language any more than they need to learn Postscript. Publishers do need to know the different kinds of rights, conditions, and billing approaches that are appropriate for their purpose. The rights language is chiefly intended to be machine readable. Publishers would use publishing systems to import digital works into a trusted system and to assign rights using a graphical user interface. Typically, the interface would provide standard digital boiler-plate or defaults reflecting their typical sales approaches. [11] The XrML lifecycle is shown in Figure 4. Figure 4: XrML Lifecycle 4.3 XrML Structures. XrML documents are specified using the element/attribute markup model of extensible MarkUp Language(XML). It is in hierachical structure. Elements are represented in CAPITAL which may contain other elements. This section provides an overview of XrML syntax, introducing some elements, details and features. To get a complete reference of XrML, please refer to the XrML specification by ContentGuard Top-Level Structure The following is the Top-Level Structure of XrML files. Character? denotes that the element is optional. <XrML> <BODY> (ISSUED)? 7

8 (TIME)? (DESCRIPTOR)? (ISSUER)? (ISSUEDPRINCIPALS)? (WORK)? (AUTHENTICATEDDATA)? </BODY> (SIGNATURE)? </XrML> File 1: XrML Top-Level Skeleton[11] XrML is the root element. It contains a mandatory element BODY and an optional element SIGNATURE. The SIGNATURE element is the digital signature of the former used to ensure its integrity. The BODY element is an optional description of a digital work and some optional meta information about this XrML document. It contains several optional elements: ISSUED is the time moment at which this document is issued. TIME is a time interval in which this XrML document is valid. DESCRIPTOR is a description of this document. ISSUER is a principal who issues this XrML document. ISSUEDPRINCIPALS is a list of principals this document is issued to. WORK defines a digital work and its usage rights. AUTHENTICATEDDATA captures data that is provided to an application which processes this XrML document Work-Level Structure WORK is a very important element of XrML. XrML documents are applied to arbitrary digital content in the form of WORK. The following is Work-Level Structure. Character? denotes that the element is optional. Character + denotes one or more. Character * denotes zero or more. Character are used to indicate alternative expressions. <WORK> (OBJECT) (DESCRIPTION)? (CREATOR)* (OWNER)? (DIGEST)* (PARTS)? (CONTENTS)? (COPIES)? (COMMENT)? (SKU)? (RIGHTSGROUP REFERENCEDRIGHTSGROUP )+ </WORK> File 2: XrML Work-Level Skeleton[11] The root element is WORK. It contains: OBJECT is the object that can be used to identify the work. DESCRIPTION is a description of the work. CREATOR is the creator of the work. OWNER is the owner of the work; it may or may not be same as the creator. DIGEST is cryptographic digest value of the work; it is used to ensure the integrity of the work. PARTS lists all parts of the work that may have different usage rights, fees and conditions; each part is a work itself. CONTENTS is an indicator of where the content is within a digital work; this is useful 8

9 when the content covered by the usage rights is embedded within a digital work. COPIES is the number of copies of the work that are specified. COMMENT is a field for any comment on the digital work and its usage rights. SKU is a Stock Keeping Unit, which is used for extensibility to allow people to identify this work in their own stock. RIGHTSGROUP is a rights group that defines all usage rights associated with the work. REFERENCEDRIGHTSGROUP is a reference rights group of the work. 4.4 Other Main DRM Languages ODRL(Open Digital Rights Language) and XMCL(Extensible Media Commerce Language) are two other main DRM languages under developing besides XrML. The Open Digital Rights Language (ODRL) provides the semantics for a Digital Rights Management expression language and data dictionary pertaining to all forms of digtial content. The ODRL is a vocabulary for the expression of terms and conditions over digital content including permissions, constraints, obligations, conditions, and agreements with rights holders. The ODRL is positioned to be extended by different industry sectors (eg ebooks, music, audio, mobile, software) and to be a core interoperability language and has no license requirements. [5] XMCL is announced by RealNetworks, Inc. and a host of industry leaders On June 20, It is an open XML-based language designed to establish industry-wide standards for Internet media commerce. By standardizing the language for business rules, XMCL will enable content to be managed in a way that is independent of codecs, digital rights management systems, and e-commerce systems. XMCL will greatly simplify deployment and accelerate the market for digital media commerce over the Internet. RealNetworks intends to submit the XMCL proposal to the appropriate standards organization, and will work with other industry leaders to ensure the initiative evolves into a widely accepted standard. [7] 4.5 XrML, ODRL and XMCL Current Situations According to ContentGuard, now more than 2000 companies and organizations have licensed XrML since April The actual number of Licensees as of 2/28/01 was More than 20 industry leaders, including Adobe Systems, Barnes & Noble, Glassbook, Hewlett Packard Company, Lightning Printing, Microsoft, Preview Systems, Reciprocal, Softlock, Time Warner Trade Publishing, Thomson Publishing and Xerox have already support XrML, hold XrML in high regard and believe that it will make a major contribution to the e-content market. For instance, Accenture and ContentGuard are collaborating to meet clients digital content distribution needs by offering customized packages of ContentGuard s RightsEdge technology and services. Adobe Acrobat/PDF is also integrated with XrML. Microsoft is developing its rights management system based on XrML. ContentGuard and Microsoft have an research and technology exchange program. Wordplay Inc. and ContentGuard extend the potential market reach of digital content providers to 90 countries and 130 currencies, with WorldPay's guarantee of secure transactions. Sandlot and ContentGuard enable content owners to manage the delivery and subscription process for digital content, including ebooks, music and video, just as effectively as they do for paper newspapers and magazines. ODRL supporters include Purplecast, Iprsystem, ARPA, Simpsons Solicitors, WI, Pipers, Authors, etc. [5] 9

10 XMCL is supported by a broad array of industry-leading technology and media companies including: Abril Group, Accenture, Adobe Systems, Anystream, America Online, Artesia Technologies, Avid Technology, Bertelsmann, British Telecom's BTopenworld, Clear Channel, Context Media, EMI Recorded Music, emotion, IBM, IFILM, InterTrust, MGM, Napster, RealNetworks, Rightsline, Sony Pictures Digital Entertainment, Starz Encore Group, Sun Microsystems, Tiscali, Viant, and Virage. [7] 5. Conclusions DRM is an increasingly important area. The New generation of DRM takes the focus away from the security issues and extends its capabilities to management issues. The current situation is: variety of companies and organizations are under developing their own DRM systems. Industry and users are now demanding standards to be developed to allow interoperability so as not to force content owners and managers to encode their works in proprietary formats or systems. XrML is a type of right management language for this purpose. Now it is licensed and supported by many companies and organizations. In the market, there exist other languages like ODRL, XMCL, etc. It is still early to say which one could be DRM standard language in the future. But undoubted, they will be contributed to DRM language standardization and foster the rapid growth of digital content economy. 6. References [1] Ross Anderson, Security Engineering, Wiley 2001, 561p [2] Open ebook Forum Working Groups < [3] W3C Workshop on Digital Rights Management for the Web: Workshop Report, 2001 [4] Intertrust < [5] Open Digital Rights Language < [6] ContentGuard < [7] extensible Media Commerce Language < [8] Bradley L.Jones, webxml: The extensible Rights Markup Language(XrML), earthweb, 3/15/2001 [9] Robin Cover, The XML Cover Pages: Extensible Rights Markup Language(XrML), OASIS, 9/21/2001 [10] Robin Cover, The XML Cover Pages: XML and Digital Rights Management(DRM), OASIS, 6/27/2001 [11] Wang. X, XrML: Extensible rights Markup Language, 6/23/

11 [12] Olli Pitkänen, Mikko Välimäki, Towards a Framework for Digital Rights Management, 2000 [13] Renato Iannella, Digital Rights Management (DRM) Architectures, D-Lib Magazine, June

Digital Rights Management for the Online Music Business

Digital Rights Management for the Online Music Business Digital Rights Management for the Online Business Sai Ho Kwok Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed

More information

Digital Rights Management (DRM) in Education - The Need for Standardisation

Digital Rights Management (DRM) in Education - The Need for Standardisation Digital Rights Management (DRM) in Education - The Need for Standardisation A Briefing Paper for IMS Neil Mclean, IMS Australia Centre Renato Iannella, IPR Systems February 2002 Version 1.0 1 Overview

More information

Digital Rights Management

Digital Rights Management The term Digital Rights Management - DRM - has its origins in the combined efforts of some vendors, their marketing staff and some other industry analysts in the late 1990s [1]. It is a breakthrough in

More information

Geospatial Digital Rights Management

Geospatial Digital Rights Management Geospatial Digital Rights Management By Daniel J. Wright Any use of trade, firm, of product names is for descriptive purposes only and does not imply endorsement by the U.S. Government Open-File Report

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12. Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents

More information

Originator Control in Usage Control *

Originator Control in Usage Control * Originator Control in Usage Control * Jaehong Park Laboratory for Information Security Technology ISE Department, MS4A4 George Mason University, Fairfax, VA 22030 jaehpark@ise.gmu.edu, www.list.gmu.edu/park

More information

Digital Rights Management - The Difference Between DPM and CM

Digital Rights Management - The Difference Between DPM and CM WHITEPAPER SERIES 2003 IPR SYSTEMS Level 12, 77 Castlereagh Street Sydney, NSW 2000, AUSTRALIA info@iprsystems.com http://www.iprsystems.com Driving Content Management With Digital Rights Management Dr

More information

Mobile Digital Rights Management

Mobile Digital Rights Management Mobile Digital Rights Management Zheng Yan Nokia Research Center zheng.z.yan@nokia.com Abstract This paper presents a technical overview of current state in Mobile Digital Rights Management (MDRM). Main

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Towards A Digital Rights Management Framework

Towards A Digital Rights Management Framework Towards A Digital Rights Management Framework Olli Pitkänen * Helsinki Institute for Information Technology P.O. Box 5400, FIN-02015 HUT, Finland olli.pitkanen@hiit.fi Mikko Välimäki * Helsinki Institute

More information

Analysis of E-book Security

Analysis of E-book Security Analysis of E-book Security Guoyou He Helsinki University of Technology Telecommunications Software and Multimedia Laboratory ghe@cc.hut.fi Abstract E-book is a new publication technology raised in recent

More information

Workflow description of digital rights management systems

Workflow description of digital rights management systems Workflow description of digital rights management systems Silvia Llorente, Eva Rodríguez and Jaime Delgado Universitat Pompeu Fabra (UPF), Departament de Tecnologia, Pg. Circumval lació 8, E-08003 Barcelona,

More information

BMG Unveils Comprehensive Online Digital Downloading Plans For The Year 2000 and Beyond

BMG Unveils Comprehensive Online Digital Downloading Plans For The Year 2000 and Beyond BMG Unveils Comprehensive Online Digital Downloading Plans For The Year 2000 and Beyond BMG Announces Strategic Relationships With Digital World Services, IBM, InterTrust, Liquid Audio, Microsoft and Reciprocal

More information

Digital Rights Management & XML Security Protocols

Digital Rights Management & XML Security Protocols Digital Rights Management & ML Security Protocols Head-to-Head or Hand-in-Hand? Holly Lynne McKinley, SSCP Booz Allen Hamilton McLean, VA Introduction Digital Rights Management brings to mind controversial

More information

Content management and protection using Trusted Computing and MPEG-21 technologies

Content management and protection using Trusted Computing and MPEG-21 technologies Technische Universität München Lehrstuhl für Datenverarbeitung Univ.-Prof. Dr.-Ing. K. Diepold Content management and protection using Trusted Computing and MPEG-21 technologies Florian Schreiner Vollständiger

More information

How To Create A Multi-Party Content Management System (Mmv21)

How To Create A Multi-Party Content Management System (Mmv21) Universitat Politècnica de Catalunya Department of Computer Architecture Ph.D. Dissertation Rights and Services Interoperability for Multimedia Content Management Author: Xavier Maroñas Borras Advisor:

More information

Intellectual Property Management and Protection in MPEG Standards

Intellectual Property Management and Protection in MPEG Standards Intellectual Property Management and Protection in MPEG Standards Rob Koenen Chairman MPEG Requirements Group (rob@intertrust.com) 1 Abstract MPEG has a long history in dealing with DRM issues. Gradually,

More information

Digital Rights Management in the Higher Education Sector

Digital Rights Management in the Higher Education Sector Digital Rights Management in the Higher Education Sector eip EVALUATIONS AND INVESTIGATIONS PROGRAMME HIGHER EDUCATION GROUP 02/2 Renato Iannella (Editor) IPR Systems Pty Ltd On behalf of Macquarie University

More information

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise. Enterprise content management solutions Better decisions, faster Storing, finding and managing content in the digital enterprise. Streamlines the collection, protection, sharing and distribution of digital

More information

NONIUS: IMPLEMENTING A DRM SYSTEM

NONIUS: IMPLEMENTING A DRM SYSTEM NONIUS: IMPLEMENTING A DRM SYSTEM Ville Saarinen, Jari Anttila, Petri Lauronen, Olli Pitkänen December 10, 2002 HIIT TECHNICAL REPORT 2002-3 NONIUS: IMPLEMENTING A DRM SYSTEM Ville Saarinen, Jari Anttila,

More information

PDF security - a brief history of development

PDF security - a brief history of development PDF security - a brief history of development Background Adobe was the first organization that set out to try and provide security controls for PDF based documents, and had their own particular views as

More information

Security Issues for the Semantic Web

Security Issues for the Semantic Web Security Issues for the Semantic Web Dr. Bhavani Thuraisingham Program Director Data and Applications Security The National Science Foundation Arlington, VA On leave from The MITRE Corporation Bedford,

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

The Technology of Rights: Digital Rights Management

The Technology of Rights: Digital Rights Management The Technology of Rights: Digital Rights Management By Karen Coyle Based on a talk originally given at the Library of Congress, November 19, 2003 Introduction You have probably heard the expressions "thin

More information

DRM Digital Rights Management

DRM Digital Rights Management Blekinge Institute of Technology Department of Software Engineering and Computer Science In co-operation with SonyEricsson, Lund, Sweden DRM Digital Rights Management Bachelor thesis in Computer Science

More information

ATSC Standard: ATSC Security and Service Protection Standard

ATSC Standard: ATSC Security and Service Protection Standard ATSC Standard: ATSC Security and Service Protection Standard Doc. A/106 28 September 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 1 The Advanced Television

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

Digital Rights Management

Digital Rights Management Digital Rights Management Reihaneh Safavi-Naini Nicholas Paul Sheppard Abstract Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable

More information

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS

More information

Electronic Rights Enforcement for Learning Media

Electronic Rights Enforcement for Learning Media Electronic Rights Enforcement for Learning Media Susanne Guth Department of IS-New Media Lab Vienna University of Economics and Business Administration, Austria Phone: +43 (1) 31336 4427 susanne.guth@wu-wien.ac.at

More information

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Enrich the user experience and build more valuable customer relationships by delivering personal, seamless and social multiscreen video services Embrace

More information

Digital Rights Management for E-Commerce Systems

Digital Rights Management for E-Commerce Systems Digital Rights Management for E-Commerce Systems Dimitrios Tsolis University of Patras, Greece Lambros Drossos TEI of Messolonghi, Greece Spyros Sioutas Ionian University, Greece Theodore Papatheodorou

More information

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011 W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) (KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).

More information

Digital Signing without the Headaches

Digital Signing without the Headaches Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom nickpope@secstan.com 2 Universitat Politècnica de Catalunya Barcelona,

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) www.oasis-open.org Management Interoperability Protocol (KMIP) Storage Developer s Introduction SNIA Fall 2009 Gordon Arnold, garnold@us.ibm.com Chair, Storage Security Industry Forum 1 2009 Insert Copyright

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

Enterprise effectiveness of digital certificates: Are they ready for prime-time? Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1

More information

Key Challenges in DRM: An Industry Perspective

Key Challenges in DRM: An Industry Perspective Key Challenges in DRM: An Industry Perspective Brian A. LaMacchia Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA bal@microsoft.com Abstract. The desires for robust digital rights management

More information

Enterprise Data Protection

Enterprise Data Protection PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION

More information

Using a digital repository for managing digital rights and copyright information

Using a digital repository for managing digital rights and copyright information Using a digital repository for managing digital rights and copyright information Chris Jones The Learning Edge International Hobart This presentation will demonstrate how a digital repository can facilitate

More information

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Virtual Private Networks Solutions for Secure Remote Access. White Paper Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information

More information

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,

More information

Developing accessible portals and portlets with IBM WebSphere Portal

Developing accessible portals and portlets with IBM WebSphere Portal Developing accessible portals and portlets with IBM WebSphere Portal Level: Introductory IBM Human Ability and Accessibility Center Austin, Texas February, 2006 Copyright International Business Machines

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

PrivyLink Cryptographic Key Server *

PrivyLink Cryptographic Key Server * WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology

More information

Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.

More information

IBM Data Security Services for endpoint data protection endpoint encryption solution

IBM Data Security Services for endpoint data protection endpoint encryption solution Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such

More information

BDS FOR RETAIL AND SALES

BDS FOR RETAIL AND SALES BDS FOR RETAIL AND SALES BDS s industry-standard, information-rich data is created to offer today s booksellers and media retailers the edge in a competitive market place. BDS aggregates data on books,

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T S u p p o r t i n g Softw a re Business Transformation w ith Sys t e m s D e s i g n e d for the Task November 2014 Adapted from Managing Business Model Transitions

More information

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0 PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved

More information

Rights Management Services

Rights Management Services www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

File Formats. Summary

File Formats. Summary Summary Rapid changes in technology mean that file formats can become obsolete quickly and cause problems for your records management strategy. A long-term view and careful planning can overcome this risk

More information

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ an OAGi White Paper Document #20110408V1.0 Open standards that open markets TM Open Applications Group, Incorporated OAGi A consortium

More information

Nonius: Implementing a DRM Extension to an XML Browser

Nonius: Implementing a DRM Extension to an XML Browser Nonius: Implementing a DRM Extension to an XML Browser Olli Pitkänen, Ville Saarinen, Jari Anttila, Petri Lauronen, Mikko Välimäki Helsinki Institute for Information Technology HIIT P.O. Box 9800, 02015

More information

A Four-Layer Model for Security of Digital Rights Management

A Four-Layer Model for Security of Digital Rights Management A Four-Layer Model for Security of Digital Rights Management Eric Diehl THOMSON R&D France 1 Avenue Belle Fontaine CESSON SEVIGNE, FRANCE +33 2 99 27 32 54 eric.diehl@thomson.net ABSTRACT Defining Digital

More information

The Comprehensive, Yet Concise Guide to Credit Card Processing

The Comprehensive, Yet Concise Guide to Credit Card Processing The Comprehensive, Yet Concise Guide to Credit Card Processing Written by David Rodwell CreditCardProcessing.net Terms of Use This ebook was created to provide educational information regarding payment

More information

Wireless Computing and IT Ecosystems

Wireless Computing and IT Ecosystems Wireless Computing and IT Ecosystems William R Simpson Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria, Virginia 22311 USA, rsimpson@ida.org Abstract. We have evolved an IT system that

More information

EMC PERSPECTIVE. Understanding Content Management and Digital Asset Management Functionality

EMC PERSPECTIVE. Understanding Content Management and Digital Asset Management Functionality EMC PERSPECTIVE Understanding Content Management and Digital Asset Management Functionality Reader ROI Content management systems solutions are generally designed for content aggregators, distributors,

More information

Protexis Inc. s Comments on Technological Protection Systems for Digitized Copyrighted Works

Protexis Inc. s Comments on Technological Protection Systems for Digitized Copyrighted Works January 14, 2003 Attn: Velica Steadman United States Patent and Trademark Office Office of Legislative and International Affairs Room 902 2121 Crystal Drive Arlington, VA 22202 Re: Protexis Inc. s Comments

More information

Web Services Security Standards Forum. Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.

Web Services Security Standards Forum. Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc. Web Services Security Standards Forum Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc. Web Services Security Standards For Um For um: Meeting to tell people that everyone agrees on an issue Walk the

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) econsent Trial Project Architectural Analysis & Technical Standards Produced

More information

What is an SSL Certificate?

What is an SSL Certificate? Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert

More information

ASPECTS OF XML TECHNOLOGY IN ebusiness TRANSACTIONS

ASPECTS OF XML TECHNOLOGY IN ebusiness TRANSACTIONS ASPECTS OF XML TECHNOLOGY IN ebusiness TRANSACTIONS Darek Bober, Piotr Muryjas Lublin University of Technology, Department of Computer Science, Borowik@pluton.pol.lublin.pl 1. INTRODUCTION A problem of

More information

What is Digital Rights Management (DRM) for Documents?

What is Digital Rights Management (DRM) for Documents? WhitePaper What is Digital Rights Management (DRM) for Documents? What is a Document? It used to be a piece of paper. In the digital world, when we speak of documents, we mean information that starts out

More information

ETSI TS 132 375 V7.0.0 (2007-06) Technical Specification

ETSI TS 132 375 V7.0.0 (2007-06) Technical Specification TS 132 375 V7.0.0 (2007-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Telecommunication management; Security services

More information

TechNote 0006: Digital Signatures in PDF/A-1

TechNote 0006: Digital Signatures in PDF/A-1 TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity

More information

Retailer Operating Manual for e-books

Retailer Operating Manual for e-books Retailer Operating Manual for e-books Wholesale Distribution and Fulfillment Services Volume 1.1a Ingram Content Group, through its CoreSource and Lightning Source (LSI) companies, provides content fulfillment

More information

HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM)

HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) Nasim Khozoie Department of Computer Engineering,yasuj branch, Islamic Azad University, yasuj, Iran n_khozooyi2003@yahoo.com ABSTRACT Information

More information

SDSD-CPRM: Flexible Protection for Digital Content

SDSD-CPRM: Flexible Protection for Digital Content SDSD-CPRM Flexible Protection for Digital Content December 2007 Executive Summary SDSD-CPRM is a new extension to the SD Memory Card that addresses the difficulties that authorized sharing of protected

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0 Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0 SAP WebAS 6.40 Version 1.0 1.0 1 Copyright Copyright 2004 SAP AG. All rights reserved. No part of this documentation may

More information

INCREASE THE POWER OF SSL WITH ncipher

INCREASE THE POWER OF SSL WITH ncipher INCREASE THE POWER OF SSL WITH ncipher CREATING A SECURE ONLINE SERVICE OPTIMIZE WEB SERVER SECURITY In the world of e-business, where an organization s reputation and its users loyalty can be shattered

More information

Internet Technologies for Digital Libraries

Internet Technologies for Digital Libraries Internet Technologies for Digital Libraries Larry Masinter September 1998 THE DOCUMENT COMPANY (about the author) September 1998 1 For copies of slides... http://www.parc.xerox.com/masinter Send email

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2413 Category: Informational S. Weibel OCLC Online Computer Library Center, Inc. J. Kunze University of California, San Francisco C. Lagoze Cornell University

More information

DCML - The Standard that Enables ITIL Compliance

DCML - The Standard that Enables ITIL Compliance oasis-open.org DCML - The Standard that Enables ITIL Compliance white paper The Data Center Markup Language is the emerging standard that will enable IT organizations worldwide to successfully adopt and

More information

VoiceXML Data Logging Overview

VoiceXML Data Logging Overview Data Logging Overview - Draft 0.3-20 August 2007 Page 1 Data Logging Overview Forum Tools Committee Draft 0.3-20 August 2007 Data Logging Overview - Draft 0.3-20 August 2007 Page 1 About the Forum: Founded

More information

Digital Rights Management

Digital Rights Management Digital Rights Management Master s thesis in Image Coding by Cristina García Valverde and Rubén Cano Collado Report nº LITH-ISY-EX-3423-2003 Date: 2003-07-15 Digital Rights Management Master s thesis

More information

Background. excerpt from the October 2012, World Bank Publication Innovations in Retail Payments Worldwide a snapshot

Background. excerpt from the October 2012, World Bank Publication Innovations in Retail Payments Worldwide a snapshot The role of Inter-operability and access to National Payments System in promoting innovations in retail payments findings from the World Bank survey on innovations in retail payments 1 This note has been

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Digital Rights Management a Technological Measure for Copyright Protection and its Possible Impacts on Libraries

Digital Rights Management a Technological Measure for Copyright Protection and its Possible Impacts on Libraries Digital Rights Management a Technological Measure for Copyright Protection and its Possible Impacts on Libraries Dr. Sabuj Kumar Chaudhuri Librarian, Basanti Devi College, 147B, Rash Behari Avenue, kolkata-700

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Cognitive Interfaces for Legal Expressions Description Application to Copyrighted Works Online Sharing and Transactions

Cognitive Interfaces for Legal Expressions Description Application to Copyrighted Works Online Sharing and Transactions 121 Cognitive Interfaces for Legal Expressions Description Application to Copyrighted Works Online Sharing and Transactions Melanie Dulong de Rosnay Research Centre for Administrative Science (CERSA) Information

More information

Information and documentation The Dublin Core metadata element set

Information and documentation The Dublin Core metadata element set ISO TC 46/SC 4 N515 Date: 2003-02-26 ISO 15836:2003(E) ISO TC 46/SC 4 Secretariat: ANSI Information and documentation The Dublin Core metadata element set Information et documentation Éléments fondamentaux

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

Electronic Records Management Guidelines - File Formats

Electronic Records Management Guidelines - File Formats Electronic Records Management Guidelines - File Formats Rapid changes in technology mean that file formats can become obsolete quickly and cause problems for your records management strategy. A long-term

More information

White Paper. IP Datacasting Bringing TV to the Mobile Phone

White Paper. IP Datacasting Bringing TV to the Mobile Phone IP Datacasting Bringing TV to the Mobile Phone Bringing TV to Mobile Phones In the near future morning commuters will be able to pass the time on the train by selecting the market news channel on their

More information

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

Billing and Payment with the Elastic Path Ecommerce Platform

Billing and Payment with the Elastic Path Ecommerce Platform Billing and Payment with the Elastic Path Ecommerce Platform The Elastic Path Ecommerce Platform As the industry s most open and flexible ecommerce platform, Elastic Path is the right solution for large

More information

Checklist and guidance for a Data Management Plan

Checklist and guidance for a Data Management Plan Checklist and guidance for a Data Management Plan Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan. v.1.0. Available online: https://wiki.helsinki.fi/x/dzeacw

More information