Conceptual Model and Security Requirements for DRM Techniques Used for e-Learning Objects Protection
Data(s) |
09/04/2009
03/09/2009
09/04/2009
03/09/2009
2007
|
---|---|
Resumo |
This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of participators in DRM schemes (e-learning object author, content creator, content publisher, license creator and end user). Then a conceptual model of security related processes of DRM implementation is proposed which is improved afterwards to reflect some particularities in DRM protection of e-learning objects. A methodical way is used to describe the security related motives, responsibilities and goals of the main participators involved in the DRM system. Taken together with the process model, these security properties are used to establish a list of requirements to fulfill and a possibility for formal verification of real DRM systems compliance with these requirements. |
Identificador |
1313-048X |
Idioma(s) |
en |
Publicador |
Institute of Information Theories and Applications FOI ITHEA |
Palavras-Chave | #Security #DRM Protection #E-Learning |
Tipo |
Article |