Please use this identifier to cite or link to this item:
https://doi.org/10.1007/978-3-642-15546-8_10
DC Field | Value | |
---|---|---|
dc.title | A geometric approach for efficient licenses validation in DRM | |
dc.contributor.author | Sachan, A. | |
dc.contributor.author | Emmanuel, S. | |
dc.contributor.author | Kankanhalli, M.S. | |
dc.date.accessioned | 2013-07-04T07:58:11Z | |
dc.date.available | 2013-07-04T07:58:11Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Sachan, A.,Emmanuel, S.,Kankanhalli, M.S. (2010). A geometric approach for efficient licenses validation in DRM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6358 LNCS : 132-149. ScholarBank@NUS Repository. <a href="https://doi.org/10.1007/978-3-642-15546-8_10" target="_blank">https://doi.org/10.1007/978-3-642-15546-8_10</a> | |
dc.identifier.isbn | 3642155456 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40168 | |
dc.description.abstract | In DRM systems contents are distributed from the owner to consumers, often through multiple middle level distributors. The owner issues redistribution licenses to its distributors. The distributors using their received redistribution licenses can generate and issue new redistribution licenses to their sub-distributors and new usage licenses to consumers. For the rights violation detection, all the newly generated licenses must be validated. The validation process becomes complex when there exist multiple redistribution licenses for a content with the distributors. In such cases, it requires the validation using an exponential number of validation equations, which makes the validation process much computation-intensive. Thus to do the validation efficiently, in this paper we propose a method to geometrically derive the relationship between different validation equations to identify the redundant validation equations. These redundant validation equations are then removed using graph theory concepts. Experimental results show that the validation time can be significantly reduced using our proposed approach. © 2010 Springer-Verlag. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-642-15546-8_10 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1007/978-3-642-15546-8_10 | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 6358 LNCS | |
dc.description.page | 132-149 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.