DRM, Trusted Computing and Operating System Architecture

Reid, Jason F. & Caelli, William J. (2005) DRM, Trusted Computing and Operating System Architecture. In Australasian Information Security Workshop (AISW) 2005, January 31 - February 3, Newcastle, Australia.


Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an open computing platform such as a PC. Recent trusted computing initiatives namely, the Trusted Computing Group (TCG) specification, and Microsoft's Next Generation Secure Computing Base (NGSCB) aim in part to address this problem. The protection architecture and access control model of mainstream operating systems makes them inappropriate as a platform for a DRM content rendering client because decrypted content cannot be protected against a privileged process. If a DRM client is to be deployed on an open computing platform, the operating system should implement the reference monitor concept, which underpins the mandatory access control model. The TCG model of trusted computing has important limitations when combined with an operating system enforcing discretionary access control. We argue that the TCG services of sealed storage and remote attestation which are important in DRM applications, cannot operate in a secure and efficient manner on such an operating system.

Impact and interest:

18 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

1,113 since deposited on 03 Nov 2004
33 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 515
Item Type: Conference Paper
Refereed: Yes
Additional Information: Proceedings will be published in revised form through the Australian Computer Society in its Conferences in Research and Practice in Information Technology series.
Keywords: Trusted computing, trusted systems, digital rights management, DRM, TCG, NGSCB
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Format not elsewhere classified (080499)
Divisions: Past > QUT Faculties & Divisions > Faculty of Science and Technology
Current > Institutes > Institute for Future Environments
Copyright Owner: Copyright 2005 Australian Computer Society
Copyright Statement: Reproduced in accordance with the copyright policy of the publisher.
Deposited On: 03 Nov 2004 00:00
Last Modified: 29 Feb 2012 13:12

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page