Skip to main content

Cryptographic Containers and the Digital Library

  • Chapter
Verläßliche IT-Systeme

Part of the book series: DUD-Fachbeiträge ((DUD))

Abstract

Today, information is distributed on the Internet and other communication infrastructures mainly for free. However, once information or digital contents is assigned some value, a means is needed to protect its copyrights and control its use.

In this paper we describe an approach for rights management in the digital library. A digital library is a huge repository of digital content which is offered to the community of its users. The first step to control the use of its content is encryption. Encrypted content is not usable unless the decrypting or unlocking keys are acquired. The management of all keys involved in content transactions and their appropriate use is the task of rights management.

After a short introduction into issues of electronic publishing we present in section 2 the cryptolopeTM 1 technology as a container for both encrypted content and information to purchase the content which serves as the basis for rights management. The second section will introduce the structure of cryptolopes and the procedures to use them. In the third section we will present the results of a digital library pilot project for rights management using cryptolope-like technology. The fourth section gives an outlook on advanced cryptolope transactions. We conclude the paper with a summary in section 5.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ryoichi Mori, Masaji Kawahara: Superdistribution: The Concept and the Architecture. Transactions of the IEICE, Vol. E 73, No. 7, My 1990. http://www.virmalschool.edu/mon/ElectronicPropertyMoriSuperdist.html

    Google Scholar 

  2. Marc A. Kaplan: IBM Cryptolopes, SuperDistribution and Digital Rights Management. Working Paper, VI.3.0, December 1996. http://www.research.ibm.com/people/k/kaplan/cryptolope-docs/crypap.html

    Google Scholar 

  3. Cryptolope Showcase Homepage. http://www.cryptolope.ibm.com

  4. IBM infoMarket Homepage, http://www.infomarket.ibm.com

  5. Cryptolope Container Technology. Whitepaper. http://www.cryptolope.ibm.com/white.htm, March 1997.

  6. Mark Stefik: The Digital Property Rights Language. Manual and Tutorial. Xerox Corporation, February 1997.

    Google Scholar 

  7. Neal R. Wagner: Fingerprinting. Proc. IEEE Symposium on Security and Privacy, 1983.

    Google Scholar 

  8. Ronald Rivest, Adi Shamir, Leonard Adleman: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, Vol. 21, pp. 120–126, 1978. http://theory.lcs.mit.edu/~rivest/rsapaper.ps

    Article  MathSciNet  MATH  Google Scholar 

  9. ISO 1995: International Standardization Organization: Information Technology - Open Systems Interconnection - The Directory: Authentication Framwork. International Standard 9594–8, ISO, Geneva 1995. http://www.itu.ch/itudoc/itu-t/rec/x/x500up/x509_27505.html

    Google Scholar 

  10. Internet Engineering Task Force: Internet Public Key Infrastructure. http://www.ietf.Org/ids.by.wg/X.509.html

  11. Public Key Cryptosystems (PKCS) Standards Homepage. RSA Laboratories 1997. http://www.rsa.com/rsalabs/pubs/PKCS

  12. Verisign Digital ID Center Homepage. http://digitalid.verisign.com

  13. Edgardo Gerck: Overview of Certification Systems: X.509, CA, PGP and SKIP. http://novaware.cps.softex.br/mcg/cert.htm

  14. Ulrich Kohl: Benutzerbezogene Datensicherheit in Kommunikationssystemen (User Oriented Security in Communication Systems). VDI Fortschrittberichte, Reihe 10, Nr. 446, VDI Verlag 1996

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Günter Müller Kai Rannenberg Manfred Reitenspieß Helmut Stiegler

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden

About this chapter

Cite this chapter

Lotspiech, J., Kohl, U., Kaplan, M.A. (1997). Cryptographic Containers and the Digital Library. In: Müller, G., Rannenberg, K., Reitenspieß, M., Stiegler, H. (eds) Verläßliche IT-Systeme. DUD-Fachbeiträge. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-86842-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-86842-8_3

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05594-3

  • Online ISBN: 978-3-322-86842-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics