Annales Des Télécommunications

, Volume 61, Issue 3–4, pp 284–331 | Cite as

LicenseScript: a logical language for digital rights management

  • Cheun Ngen Chong
  • Ricardo Corin
  • Jeroen Doumen
  • Sandro Etalle
  • Pieter Hartel
  • Yee Wei Law
  • Andrew Tokmakoff


We propose LicenseScript, a language for digital rights management (Drm) based on multiset rewriting and logic programming. LicenseScript enjoys a precise syntax and semantics, and it is rich enough to embed other rights expression languages (Rel). We show that LicenseScript is expressive and flexible by exploring several application domains representing different aspects ofDrm. We present an implementation. Finally, we extend the core of the language to account for multiple devices in authorized domains.

Key words

Intellectual property Literary artistic property Digital recording Copyright prolog language Security Management Logical programming 

Licensescript : Un Formalisme Logique Pour la Gestion des Droits Numériques


Cet article présente LicenseScript, un formalisme pour la gestion des droits numériques basé sur la réécriture multi-ensembles et sur la programmation logique. LicenseScript dispose d’une syntaxe et d’une sémantique précises, et est suffisamment expressif pour contenir d’autres langages de gestion des droits numériques. L’expressivité et la flexibilité de LicenseScript sont illustrées à travers son utilisation dans plusieurs domaines d’applications couvrant différents aspects de la gestion des droits digitaux. Nous présentons une implementation. Finalement, nous étendons le langage pour prendre en compte la présence de plusieurs objets sécurisés dans les domaines autorisés.

Mots clés

Propriété intellectuelle Propriété littéraire et artistique Enregistrement numérique Droit d’auteur prolog Sécurité Gestion Programmation logique 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Apt (K.R.), Introduction to Logic Programming. InVan Leeuwen (J.), editor, Handbook of Theoretical Computer Science, volume B: Formal Models and Semantics, pages 495–574. Elsevier, Amsterdam and TheMit Press, Cambridge, 1990.Google Scholar
  2. [2]
    Apt (K.R.), From Logic Programming to Prolog.Prentice Hall, Hertfordshire, United Kingdom, 1997.Google Scholar
  3. [3]
    {au{fnApt} {gn(K. R.)}}, {au{fnPedreschi} {gn(D.)}}, {atReasoning about termination of pure Prolog programs}. {jtInformation and Computation}, {vn106} ({sn1}):{pp109-157}, {dy1993}.Google Scholar
  4. [4]
    Balacheff (B.),Chen (L.),Pearson (S.),Plaquin (D.),Proudler (G.), Trusted Computing Platforms:Tcpa Technology in Context. Prentice HallPtr. Upper Saddle River, New Jersey,Usa, 2003.Google Scholar
  5. [5]
    Banâtre (J.-P.), Fradet (P.), Métayer (D. L.), Gamma and the chemical reaction model: Fifteen years after. InCalude (C), Paun (G.), Rozenbero (G.), Salomaa (A.), editors, Workshop on Multiset Processing (Wmp),2235 ofLncs, p. 17–44.Springer-Verlag, Berlin, August 2001.CrossRefGoogle Scholar
  6. [6]
    Banâtre (J.-P.), Le Métayer (D.), The gamma model and its discipline of programming.Sci. Comput. Program., 15(1):55–77, 1990.MATHCrossRefGoogle Scholar
  7. [7]
    Birney (B.),Gill (T.), Microsoft Windows Media Resource Kit.Microsoft Press, February 2003.Google Scholar
  8. [8]
    Boley (H.), Relationships between logic programming andRdf. In Advances in Artificial Intelligence,Pricai 2000 Workshop Reader,2112 ofLncs, p. 201–218.Springer-Verlag, 2001.Google Scholar
  9. [9]
    Bossi (A.), Cocco (N.), Fabris (M.), Proving termination of logic programs by exploiting term properties. InAbramsky (S.), Maibaum (T.S.E.), editors, Theory and Practice of Software Development (Tapsoft 91),494 ofLncs, p. 153–180, Brighton, United Kingdom, 1991.Springer-Verlag.Google Scholar
  10. [10]
    Camp (L.J.),Drm: doesn’t really mean digital copyright management. In Proceedings of the 9thAcm conference on Computer and Communications Security, p. 78-87.Acm Press, 2002. doi: Scholar
  11. [11]
    Cederquist (J.), Corin (R.), Dekker (M. A. C), Etalle (S.), Den Hartog (J. I.), An audit logic for accountability. InSahai (A.), Winsborough (W.), editors, 6th Int. Workshop on Policies for Distributed Systems & Networks (Policy), pages 34–43, Stockholm, Sweden, Jun 2005.Ieee Computer Society Press, Los Alamitos, California,Url Scholar
  12. [12]
    Cheng (J.), Chong (C. N.), Doumen (J.), Etalle (S.), Hartel (P. H.), Nikolaus (S.), StreamTo: Streaming content using tamperresistant tokens. Technical ReportTr-ctit-04-47, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, November 2004.Google Scholar
  13. [13]
    Chong (N.), Corin (R.), Etalle (S.), Hartel (P. H.), Jonker (W.), Law (Y. W.), LicenseScript: A novel digital rights language and its semantics.In Ng (K.), Busch (C), Nesi (P.), editors, 3rd International Conference on Web Delivering of Music (Wedelmusic), pages 122–129, Los Alamitos, California, United States, September 2003a.Ieee Computer Society Press.CrossRefGoogle Scholar
  14. [14]
    Chong (N.), Etalle (S.), Hartel (P. H.), Comparing Logic-based andXml-based Rights Expression Languages. InMeersman (R.), Tari (Z.), editors, Proceedings of On The Move to Meaningful Internet Systems 2003:Otm 2003 Workshops,2889 ofLncs, p. 779–792, Berlin, Germany, November 2003b.SpringerVerlag.CrossRefGoogle Scholar
  15. [15]
    Chong (N.),Etalle (S.),Hartel (P. H.),Joosten (R.),Kleinhuis (G.), Service brokerage with Prolog. In Proceedings of 7th International Conference on Enterprise Information Systems (Iceis 2005), pages 409–412, iNSTicc Press, May 2005.Google Scholar
  16. [16]
    Chong (C N.),Peng (Z.),Hartel (P. H.), Secure audit logging with tamper-resistant hardware, inGritzalis (D.),Di Vimercati (S. D. C),Samarati (P.),Katsikas (S. K.), editors, 18thIfip International Information Security Conference (Ifipsec)250 ofIfip Conference Proceedings, pages 73–84. Kluwer Academic Publishers, May 2003c.Google Scholar
  17. [17]
    Chong (C. N.),Ren (B.),Doumen (J.),Etalle (S.),Hartel (P. H.),Corin (R.), {atLicense protection with a tamper-resistant token}. InLim (C. H.),Yung (M.), editors, 5th Workshop on Information Security Applications (Wisa 2004),3325 ofLncs, pages 224–238. Springer-Verlag, August 2004.Google Scholar
  18. [18]
    Chong (C. N.),Van Buuren (R.),Hartel (P. H.),Kleinhuis (G.), Security attribute based digital rights management (Sabdrm). InBoavida (F.),Monteiro (E.),Orvalho (J.), editors, Joint Int. Workshop on Interactive istributed Multimedia Systems/Protocols for Multimedia Systems (Idms/proms),2515 ofLncs, pages 339–352. Springer-Verlag, November 2002.Google Scholar
  19. [19]
    De Schreye (D.), Decorte (S.), Termination of logic programs: the never-ending story.Journal of Logic Programming, 19–20:199–260, 1994.Google Scholar
  20. [20]
    DeTreville (J.), Binder, a Logic-Based security language. In 23rd Symp. on Security and Privacy (S&P), p. 105–113, Berkeley, California, Mar 2002.Ieee Computer Society Press, Los Alamitos, California,Url id=545.Google Scholar
  21. [21]
    Etalle (S.), Gabbrieli (M.), Layered modes.The Journal of Logic Programming, 39(1–3):225–244, 1999.MATHCrossRefGoogle Scholar
  22. [22]
    Eyers (D.),Shepherd (J.),Wong (R.), Merging Prolog and xml databases. InThom (J.),Kay (J.), editors, Proceeding of the 7th Australasian Document Computing Symposium (Adcs 2002), pages 57–62, 2002.Google Scholar
  23. [23]
    Fiat (A.), Naor (M.), Broadcast encryption. In Advances in Cryptology (Crypto’03) Proceedings,773 ofLncs, pages 480–191, Santa Barbara, California, 1994. Springer-Verlag.Google Scholar
  24. [24]
    Gunter (C.), Weeks (S.), Wright (A.), Models and languages for digital rights, In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (Mcss-34), pages 4034–4038, Maui, Hawaii, United States, January 2001. IEEE Computer Society Press.Google Scholar
  25. [25]
    Gunter (C. A.), Semantics of Programming Languages: Structures and Techniques,Mit Press, 1992.Google Scholar
  26. [26]
    Guo (H.), Digital rights management (Drm) usingXrml. InT-l 10.501Seminar on Network Security 2001, page Poster paper 4, 2001.Url Scholar
  27. [27]
    Guth (S.), Rights expression languages. InBecker (E.),Buhse (W.),Günnewig (D.),Rump (N.), editors, Digital Rights Management: Technological, Economic, Legal and Political Aspects,2770 ofLncs, pages 101–112.Springer-Verlag, November 2003.Google Scholar
  28. [28]
    Harrison (M. H.), Ruzzo (W. L.), Ullman (J. D.), Protection in operating systems. Communications of theAcm, 19(8): 461–471, 1974.MathSciNetCrossRefGoogle Scholar
  29. [29]
    Hartung (F.), Ramme (F.), Digital rights management and watermarking of multimedia content for m-commerce applications,Ieee Communications Magazine, 38(11):78–84, November 2000.CrossRefGoogle Scholar
  30. [30]
    Iannella (R.), Open digital rights management. In World Wide Web Consortium (W3C)Drm Workshop, Position paper 23, January 2001.Url Scholar
  31. [31]
    Koenen (R. H.), Lacy (J.), Mackay (M.), Michell (S.), The long march to interoperable digital rights management. Proceedings of theIeee, Special Issue on Digital Rights Management, 92(6):883–897, June 2004.Google Scholar
  32. [32]
    Li (N.), Mitchell (J.), Winsborough (W.), Beyond proof of compliance: Security analysis in trust management. Journal ofAcm, 52(3):474–514, May 2005.MathSciNetCrossRefGoogle Scholar
  33. [33]
    Lloyd (J. W.), Foundations of Logic Programming. Symbolic Computation — Artificial Intelligence.SpringerVerlag, 1987. Second edition.Google Scholar
  34. [34]
    Lotspiech (J.), Nusser (S.), Pestoni (F.), Anonymous trust: Digital rights management using broadcast encryption. Proceedings of theIeee Special Issue on Digital Rights Management, 92(6):898–909, June 2004.Url http: // free.jsp?arNumber=1299165.Google Scholar
  35. [35]
    Mulligan (D.),Burstein (A.), Implementing copyright limitations in rights expression languages. In J.Feigenbaum, editor, Proceedings of 2002Acm ccs-9 Workshop on Security and Privacy in Digital Rights Management,2696 ofLncs, pages 137–154. Springer-Verlag, November 2002.Google Scholar
  36. [36]
    Parrott (D.), Requirements for a rights data dictionary and rights expression language. Technical Report version 1.0, Reuters Ltd., 85 Fleet St., LondonEc4p 4Aj, June 2001. In responseTo iso/iec jtc1/Sc29/Wg11N4044: “Reissue of the Call for Requirements for a Rights Data Dictionary and a Rights Expression Language” —Mpeg-21.Google Scholar
  37. [37]
    Petkovic (M.),Hammouténe (M.),Conrado (C),Jonker (W.), Securing electronic health records using digital rights management. In 10th International Symposium for Health Information Management Research (Ishimir), page to appear. South-East European Research Center (Seerc), September 2005.Google Scholar
  38. [38]
    Popescu (B. C),Crispo (B.),Tanenbaum (A. S.),Kamperman (F. L. A. J.), ADrm security architecture for home networks. In 4thAcm workshop on Digital rights management (Drm), pages 1–10, Washington DC,Usa, October 2004.Acm Press,Url Scholar
  39. [39]
    Pucella (R.), Weissman (V), A logic for reasoning about digital rights. InIeee Proceedings of the Computer Security Foundations Workshop, pages 282–294, Cape Breton, Nova Scotia, Canada, June 2002,Ieee Computer Society Press.Google Scholar
  40. [40]
    Rosenblatt (B.), Trippe (B.), Mooney (S.), Digital Rights Management: Business and Technology.John Wiley & Sons, New York, United States, November 2002.Google Scholar
  41. [41]
    Rust (G.),Bide (M.), The lt;indecsτ; metadata framework, June 2000.Url Scholar
  42. [42]
    Samuelson (P.), Digital rights management {and,or,vs.} the law. Communications ofAcm, 46(4):41–45, April 2003.CrossRefGoogle Scholar
  43. [43] SmartRight Technical white paper Version 1.7. Thompson, Paris, France, January 2003.Url http: // tech whitepaper% jan28.pdf.Google Scholar
  44. [44]
    Sterling (L.), Shapiro (E.), The Art of Prolog (Second Edition).The mit Press, Cambridge, Massachusetts 02142, Uniter States, 1994.MATHGoogle Scholar
  45. [45]
    van den Heuvel (S.A.F.A.), Jonker (W.), Kamperman (F.L.A.J.), Lenoir (P. J.), Secure content management in authorised domains. In Int. Broadcasting Convention (Ibc), pages 467–474, Amsterdam, The Netherlands, September 2002. Broadcastpapers Pty Ltd,Po Box 259, Darlinghurst,Nsw, 1300, Australia.Google Scholar

Copyright information

© Springer-Verlag France 2006

Authors and Affiliations

  • Cheun Ngen Chong
    • 1
  • Ricardo Corin
    • 2
  • Jeroen Doumen
    • 2
  • Sandro Etalle
    • 2
  • Pieter Hartel
    • 2
  • Yee Wei Law
    • 3
  • Andrew Tokmakoff
    • 4
  1. 1.Philips Research LaboratoriesProf. Holtslaan 4EindhovenThe Netherlands
  2. 2.University of TwenteEnschedeThe Netherlands
  3. 3.Riscure BVDelftThe Netherlands
  4. 4.Telematica InstituutEnschedeThe Netherlands

Personalised recommendations