Abstract
Achieving the privacy needs for applications as expressed in law is complex. Currently there is no commonly accepted technical approach for meeting these privacy requirements. An often-fruitful way for uncovering solutions to challenges such as this is to examine how technologies used in quite different applications may be adapted for the purpose. In this paper, we examine the prospect of adapting systems designed for Digital Rights Management for the purpose of Privacy Rights Management for European Community. We begin by outlining the legal requirements for privacy under the European Union Data Directive. After an overview of digital rights management systems, we describe adaptations for transforming a DRM system into a privacy rights management system. We also detail the strengths and weaknesses of this approach.
NRC paper number: NRC 44956
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Official Journal L 281, 23/11/1995, 0031 – 0050
Deitz, L.: Privacy and Security – EC’s privacy directive: protecting personal data and ensuring its free movement. Computers and Security Journal 17(4), 25–46 (1998)
Council of Europe Convention 108: Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, Available at http://conventions.coe.int/treaty/EN/Treaties/Html/108.htm
Feigenbaum, J., Freedman, M., Sander, T., Shostack, A.: Privacy Engineering for Digital Rights Management Systems. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management, Philedelphia (November 2001), Available at http://citeseer.nj.nec.com/feigenbaum01privacy.html
XrML is being contributed to the standards body OASIS Rights Language Technical Committee as its foundation technology. More information can be found at http://www.oasisopen.org/committees/rights/ or at http://www.xrml.org
Open Digital Rights Language (ODRL), Available at: http://www.odrl.net
Kenny, S., Korba, L.: Adapting Digital Rights Management to Privacy Rights Management. Computers & Security 21(7), 648–664 (2002)
Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Trans. on Information and System Security 2(2), 159–176 (1999)
Quova, Inc. at, http://www.quova.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Korba, L., Kenny, S. (2003). Towards Meeting the Privacy Challenge: Adapting DRM. In: Feigenbaum, J. (eds) Digital Rights Management. DRM 2002. Lecture Notes in Computer Science, vol 2696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44993-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-44993-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40410-1
Online ISBN: 978-3-540-44993-5
eBook Packages: Springer Book Archive