José Edson Cano Barrón. Current Problems and Challenges for Developing a Standard Digital Rights Management System |
Abstract: This review presents a series of problems and challenges which must be considered
towards developing a standard Digital Rights Management System (DRMS). We present the
importance of counting on a definition for DRM and proposed a way to get it. We have
recognized four main areas involved. These areas are: information technology, law,
business/economics and social/ethics. And we expose some challenging issues related to
each area and offer some recommendations about them. With this paper, we recognized
that developing DRMS is a complex work, because it requires the development of new
business models and solution architectures and it has an economic, cultural and legal
impact on the society, but we also are working on proposals towards getting solved the
problem of having a generic DRMS. |
|
Marius Erwes and Ruediger Grimm. The management of rights for digital University libraries |
Abstract: Traditional University libraries (and other library providers) have started to digitize communication functions as well as content in order to offer their services across the Internet. This paper discusses opportunities and risks of the digitization of communication and content. It does not address the more radical migration from traditional to virtual organization forms, which is subject to further research on the basis of these findings. |
|
Nicholas Bentley. Trading Rights to Digital Content |
Abstract: Trading rights to digital content is a review of the use of an Intellectual Contributions model
for describing how an intellectual work is produced and distributed and the role of all users
and contributors in this production chain. Examination of the contributions model
demonstrates how traditional copyright uses the proxy of copies as a means to link intangible
expression to the tangible world and how, in turn, this produces a largely self regulating
trading environment for copyrighted works. When digital copies are the transmission medium
this tangible linkage breaks down and so do the self regulating characteristics. Further analysis
of this contributions model suggests that DRM in the form of technological protection
measures is not an ideal solution to this situation and that an alternative regime, where
individual rights to the creative work are allocated, regulated and traded, might be a productive
route forward. The paper concludes by presenting a distributed 'Rights Office' system that
would facilitate a practical, Internet based, implementation of this trade in rights that offers
new business models while protecting the availability of intellectual works for the overall
benefit of society. |
|
Mario Kubek and Juergen Nuetzel. Mobile Multi-level Superdistribution |
Abstract: This paper describes solutions which enable mobile multi-level superdistribution of DRM (Digital Rights Management) protected content. It also discusses how multi-level rewarding schemes via transaction tracking can support new business models based on legal superdistribution. First we describe the motivation and the fields of application for mobile superdistribution in general. After that we explain how providers and customers can get additional benefit from using this technology in conjunction with multi-level rewarding schemes. Then we present our technical solutions including client- and server-sided realizations with the focus on our mobile application, called BlueMatch, which supports multi-level superdistribution for OMA (Open Mobile Alliance) DRM protected content via Bluetooth through its special architecture using different file distribution strategies. This program aims at helping und motivating users to distribute DRM protected media files. The paper concludes with a comparing view on the characteristics of mobile multi-level superdistribution via further infrastructures as 3G networks and WLAN. |
|
Alapan Arnab and Andrew Hutchison. DRM Use License Negotiation Using ODRL V2 |
Abstract: In [9], Camp discussed why DRM is not equivalent to copyright enforcement. In 2005, Arnab et al. discussed
how DRM is in fact the enforcement of licensing agreements, and promoted the use of negotiation in DRM as a
mechanism to handle fair use scenarios [3].
In this paper, we detail negotiation protocols for two of the three types of negotiation – bidding and bargaining
(the third type, auctioning, can easily be handled without any new technology). We motivate the correctness and
completeness of our protocols through the use of Petri net modeling. We also motivate the use of the latest draft
of the ODRL v2.0 rights expression language (REL) as a language for expressing negotiations in DRM systems.
By using a REL in the protocol specifications we remove the need to translate between the protocol and the rights
expression language, thus speeding up the overall license acquisition process and reducing the risk of translation
errors. |
|
Barbara Fichtinger , Eckehard Hermann, Nicolai Kuntze and Andreas Schmidt, . Trusted Infrastructures for Identities |
Abstract: The establishment of trust relationships across multiple identifier
domains in identity management architectures enables a service
provider in a certain domain to trust the decisions of an identity provider
located in a foreign identifier domain. As a result, users do not have
to create new credentials for every identifier domain they communicate
with. This trust relationship can be established by using the infrastructure
provided by the Trusted Computing Group. In this paper, a concept
for the establishment of this trust relationship based on trusted computing
technology is developed. |
|
Margaret Jackson and Marita Shelly . Search Engines and Australian Law: Commercial Fair Dealing or Copyright Infringement? |
Abstract: The growth of the Internet and the growing activities and use of search engines, such as
Google and Yahoo are challenging copyright law. This paper explores the current fair
dealing exceptions in Australian copyright law, the fair use doctrine in United States and
similar provisions in the European Union (EU) Electronic Commerce Directive and the
United Kingdom (UK) in relation to the copying of whole documents by search engines
during the process of searching, locating and indexing web pages. By applying these
exceptions to the activities of search engines and through the analysis of cases which involve
search engines and those involving claims of fair dealing or fair use over the Internet, this
paper concludes that unlike in the United States, search engines in Australia, will most likely
not be protected by the safe harbour provision of the Copyright Act 1968 (Cth). |
|
Andreas Lang, Jana Dittmann and Andrea Oermann . Cross Media Evaluation of Digital Watermarking Schemes on the Example of Biometric Authentication System and User Distinction |
Abstract: The evaluation of digital watermarks has grown into an important research area. Mostly,
the researchers focus on the basic properties of a watermarking scheme like transparency
or robustness while other properties are often neglected. Profiles are designed to improve
the evaluation strategy of a watermarking algorithm. Our paper mainly focus on the application
based evaluation of digital watermarking schemes for the example of biometric user
authentication. An evaluation process is introduced and formalized. Exemplary selected
watermarking schemes are used to evaluate the transparency in the context of the biometric
user authentication. We setup a test scenario and present our test results regarding the
application based evaluation of digital audio watermarks in a cross media content of female
and male German, Indian and Italian speaker classes and different spoken languages.
Hence, the approach presented in this paper of bringing together watermarking and biometrics
focusses not only on security and privacy as well as content protection aspects, also its
cultural impacts on the society are evaluated. |
|
Gangadharan G.R.. ODRL Service Licensing Profile |
Abstract: Service licensing is a significant way to manage the rights between
service consumers and service providers. Licensing, being the mechanism of
technology transfer, is the common denominator for distribution of services associated
with designing business strategies and relationships. The currently available
service description standards and languages do not cover the critical clauses
of licensing. This paper proposes ODRL-S, a profile of the ODRL for Service
Licensing, to represent exclusively the licenses for services, in machine interpretable
form. |
|
Nicholas Paul Sheppard and Rei Safavi-Naini. Fuzzy Domains - Modelling Social Networks as Authorised Domains with Decay |
Abstract: Sharing multimedia among friends and acquaintances is a common practice that,
in appropriate settings, need not be detrimental to the interests of copyright owners.
In this paper, we propose a model for sharing multimedia based on the notion of an
acquaintance domain whose members will have access to the domain owner’s multimedia.
Membership of an acquaintance domain is determined by the closeness of a
relationship – where “closeness” can be defined by factors such as the frequency of
visits – and membership of the domain deteriorates as the relationship becomes more
distant. We have made an implementation of the proposal based on the Open Mobile
Alliance’s specification for an authorised domain. |
|
Eetu Luoma. The requirements for electronic Copyright Management Systems |
Abstract: This paper studies the requirements of Electronic Copyright Management Systems (ECMS) having increasing relevance to the DRM domain. The aim is to define the requirements using established framework for information management as a baseline. The focus is on what information a ECMS should manage and how the information should be managed. The results of a conceptual-analytical discussion suggests that main requirements are in 1) describing the copyright contracts using ODRL or similar rights expression language, 2) managing contract documents through electronic document management practises, and in 3) managing the contract negotiation workflows using generic
workflow engine. |
|
Renato Iannella. Supporting the Instant License Model with ODRL |
Abstract: Report on the use of the ODRL REL to express the semantics of instant license regimes, in particular, Creative Commons and AEShareNet.
Some case studies at the intersection of instant and mediated licences and their implications. |
|
Martin Steinebach and Hua Jian Hua Jian Liu. Watermarking small images: Applications, Challenges & Approaches |
Abstract: Digital watermarking has become a mature technology utilized in various application
domains. This is especially true for digital image watermarking, where, compared to
other media types like audio or video, the most proposals for algorithms as well as
commercial applications are introduced. With respect to variety of embedding
approaches, synchronization strategies as well as security and robustness evaluation
methods digital image watermarking therefore can be seen as the most advanced
watermarking technology. Still, when digital image watermarking is applied in real-world
use cases, some challenges still exist. In our work, we identify and discuss one of these:
Watermarking of small images, e.g. with the size of thumbnails. While these images have
been ignored by most researchers as they have been seen to be without value to be
protected, usage scenarios today raise interest in the group of images. The protection of
catalogue entries and eBay product photos is one obvious example for this. While the
image itself may be of little values, its theft and usage by third parties can assist in fraud
and forgery. We therefore provide an overview of applications, challenges and
approaches to watermarking of small images. In addition, we discuss our recent
optimizations of existing watermarking strategies for usage with small images. |
|
Christoph Ringelstein, Felix Schwagereit and Daniel Pähler. Opportunities and Risks for Privacy in Service-oriented Architectures |
Abstract: This paper identifies privacy issues that arise from using service-oriented architectures,
which ease the ad-hoc creation of complex workflows. These workflows may
also integrate external services. Thus, virtual organizations emerge. Simultaneously
with the complexity, the existing privacy issues increase. On the other hand, the flexibility
and dynamics gained by using service-oriented architectures give the enterprises
new opportunities for controllability, allowing them to reduce the risks and be in compliance
with data protection principles as demanded by law and trade agreements. This
paper analyzes these risks and opportunities and sketches a solution space for controllability
in service-oriented architectures. |
|
Martin Springer and Roberto García. Promoting Music Sampling by Semantic Web-enhanced DRM tools |
Abstract: The digital revolution has provided new incentives and facilities for content creation. Music has
particularly benefited from this opportunity and creative processes like music sampling currently
constitute their techniques in digital technologies. However, the digitisation has also carried some
shortcomings, like the proliferation of DRM tools that menace traditional rights and usages.
This paper proposes to combine a sampling tool based on technologies and DRM tools developed
by the Digital Media Project with a Copyright Ontology based on Semantic Web technologies.
The ontology allows modelling copyright issues that traditionally allowed the creative process to
continue without losing momentum.
In the context of sampling music, the private copy right is particularly important. It is modelled
using the Copyright Ontology together with the whole sampling value chain in order to keep track
of the involved works and actors. Users can enjoy the private copy right, but this does not mean
that, if they make the results of their creative process public, the rights of the original creators are
ignored. At this point, thanks to the tracking process and lightweight enforcement measures
applied by the DMP-compliant sampling tool, the royalties’ chain can be assembled and the
corresponding measures based on metadata can take place. |
|
Gregory Heileman. The Indirect DRM Evaluation Architecture (IDEA) |
Abstract: In this paper we consider some of the basic design principles that should support the development of future DRM systems. We begin by discussing some of the problems associated with current DRM environments, and how they might be alleviated through the adoption of an open architectural framework based on basic design principles. We then demonstrate a particular implementation referred to as the IDEA architecture. |
|
Hess Thomas, Ahrens Sophie and Freese Behrend. Superdistribution Revisited – Empirical Evidence from the User Perspective |
Abstract: Superdistribution is not new to the music industry. Quite a few suppliers of digital content have started to implement this concept already. Be it to share bandwidth as it is mainly the case for movies or to spread content faster and to stimulate the user to engage in direct marketing actions to promote his favourite content as it is true for the music industry.
These ambitious projects are starting to get support from major labels as the Digital Rights Management discussions come to the conclusion that the rigid enforcement of copy and usage rights protection measures do more damage to the music industry than buffering the bereaved losses encountered due to digitalization.
Still, (illegal) peer-to-peer file sharing is by far more popular than the manifold legal offers.
Applying the triangulation method, we created and experimentally tested and evaluated a prototype equipped with Superdistribution and domain sharing implementations as well as a revenue sharing incentive scheme. Results indicate that Superdistribution by itself is likely not the remdy for legal content dissemination and revenue sharing does not work well as an incentive within social networks consisting of close friends. |
|
Wieneke Lars and Juergen Nuetzel. Turning visitors into productive users. User created content for a real world museum in Second Life. |
Abstract: Museums use digital media to communicate their exhibitions within and outside of the museum environment.
Nevertheless, they often lack in resources to continuously provide new content for their visitors. In this paper
we present an approach that enables museums to incorporate the creative potential of their visitors in order to
cope with the demand for new content. As a point of departure we apply a quest/reward cycle to a real world
museum and its virtual representation in Second Life. Visitors of the museum can conduct quests in the real
world environment which are then rewarded with virtual objects and status points. The status points and the
accompanying system of levels allow the museum to grant productive users different abilities depending on
their score. In turn, the virtual objects form building blocks that users can combine in order to create new
artefacts and events in Second Life. Furthermore we will discuss how user contributions in Second Life can be
integrated in the real world museum in order to blend real and virtual environments. |
|