Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.

Slides:



Advertisements
Similar presentations
Introduction to Digital Rights Management Grace Agnew SURA/ViDe Digital Video Conference March 2004.
Advertisements

Access Strategies for Digital Video and Digital Rights Management Grace Agnew, Georgia Institute of Technology Mairéad Martin, University of Tennessee.
Trust and Security for Next Generation Grids, Implementing UCON with XACML for Grid Services Bruno Crispo Vrije Universiteit Amsterdam.
Access management: challenges and approaches James Dalziel Adjunct Professor and Director Macquarie E-learning Centre of Excellence
NRL Security Architecture: A Web Services-Based Solution
Access management for repositories: challenges and approaches for MAMS James Dalziel Professor of Learning Technology and Director, Macquarie E-Learning.
Copyright Ann West This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Supporting education and research E-learning tools, standards and systems Sarah Porter Head of Development, JISC.
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration 4th Annual PKI R&D Workshop Tom Barton, Kate Keahey,
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Rights / Business Models in the NSDL Columbia University David Millman April, 2001.
Digital Rights Management on the Web Dr Renato Iannella IPR Systems Chief Scientist 10th World-Wide Web.
Addressing Metadata in the MPEG-21 and PDF-A ISO Standards NISO Workshop: Metadata on the Cutting Edge May 2004 William G. LeFurgy U.S. Library of Congress.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
GridShib Grid-Shibboleth Integration Von Welch, Tom Barton, Kate Keahey, Frank Siebenlist GlobusWORLD 2005.
SAML, XACML & the Terrorism Information Sharing Environment “Interoperable Trust Networks” XML Community of Practice February 16, 2005 Martin Smith Program.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
R EUTERS 150 Y EARS David Parrott Reuters/Chief Technology Office 18 July 2001 Report on Reuters Response to MPEG-21 CfR Report to XACML Committee Face-to-Face.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
OASIS XACML TC and Rights Language TC Hal Lockhart
Supporting further and higher education Middleware and AA within the JISC Environment Nicole Harris, JISC Development Group.
Digital Rights Management with XML Eamonn Neylon Technology Director The YRM Group.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
United States Department of Justice Implementing Privacy Policy in Justice Information Sharing: A Technical Framework John Ruegg,
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
Shibboleth at Columbia Update David Millman R&D July ’05
Shibboleth: An Introduction
DRM - NSDL Annual Meeting 1 14 Oct, 2003 Intellectual Property Rights and Digital Rights Management Background and Thoughts For the NSDL Robby Robson This.
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management.
Identity Management in DEISA/PRACE Vincent RIBAILLIER, Federated Identity Workshop, CERN, June 9 th, 2011.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Shibboleth: Overview and Status The Shibboleth Architecture Team.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Institutional Repositories July 2007 DIGITAL CURATION creating, managing and preserving digital objects Dr D Peters DISA Digital Innovation South.
Supporting education and research The JISC Core Middleware Call Brian Gilmore The University of Edinburgh and JISC Committee for Support of Research.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
The Technical and Legal Dangers of Code-Based Fair Use Environment John. S. Erickson & Deirdre K. Mulligan Proceedings of IEEE, vol. 92, NO. 6, June 2004.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Shibboleth Project at GSU
Chief Scientist, IPR Systems
DRM in Proprietary Products and Digital Archive
Federated Digital Rights Management
Advances in Digital Rights Management
Egon Verharen, SURFnet Vidmid-vc chair
The JISC Core Middleware Call
Presentation transcript:

Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 Presentation Topics Internet2 Middleware Focus What is Digital Rights Management (DRM)? DRM and middleware DRM challenges The Federated Digital Rights Management (FDRM) Project –Project Description –Architecture Background to the NSF Middleware Initiative

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 I2 Middleware Focus Technical components include: authentication and authorization, directories, community objectclasses, security credentials, identifier management, etc. Policy components include: trust models, privacy legislation and regulations, community standards developments, deployment models, etc.

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 What is DRM? The management of intellectual property and distribution of digital content But different interpretations exist ….. Industry: DRM = protect the copyright owner’s rights through enforcement and support licensing model. Emphasis on media packaging, encryption and trusted systems. Research & Education: DRM = enable access while managing intellectual property and protecting user’s privacy. Balance between copyright owner’s and user’s rights.

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 Rights Metadata Rights, permissions, constraints expressed in an XML-based Rights Expression Language (REL) REL is linked to a Rights Data Dictionary (Data Model) Current RELs include: XrML: eXtensible Rights Markup Language (ContentGuard) ODRL: Open Digital Rights Language OASIS, MPEG-21,, IEEE, Open eBook Forum

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 DRM: A middleware problem? Authorization decision based on intersection of attributes about user, content and usage Much of middleware development concerns user attributes: Directory development, Identity management, Authentication, Role Based Access Control (RBAC)

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 DRM: A Middleware Problem? Federation and inter-realm access critical DRM systems are policy vehicles

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 DRM Challenges DRM defined and driven by industry DRM technologies being protected by legislation Threats to fair use, “first sale principle,” and user privacy Proprietary systems

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 DRM Challenges Existing Rights Expression Languages (REL) have limitations and are immature DRM and REL deployment threatened by patent encumbrances (ContentGuard) Authorization Expressions: SAML (security assertions) XACML (policy assertions) REL (rights, permissions, constraints assertions)

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 DRM Workshop NSF Middleware Initiative and DRM Workshop, Sept. 9, 2002 Funded by the NSF NMI program to: Explore DRM requirements in Research and Education Look at ways NMI development might be leveraged 60 representatives from library, content management, middleware, copyright law and standards organizations

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 DRM Requirements for Research & Education Multiple roles in academia: consumers, producers, distributors of information Multiple applications: Instructional Management Systems, portals, databases, online content, electronic journals, online collaboration, ….. Degrees of risk: term papers vs. patient records

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 DRM Requirements for Research & Education DRM in Higher Education needs to support: Fair use “First Sale” principle Privacy of the end-user Derivatives Complex objects Inter-institutional collaboration and sharing of resources

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 DRM Models Industry One-to-one Pay-per-view User as consumer Trusted systems Use monitoring Static content Proprietary hardware/software Academia One-to-many, many-to-many Flexible access User as consumer, producer, distributor Privacy Dynamic content Inter-institutional, cross realm access Interoperability

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 Workshop Outcomes Conclusions: Additional DRM function - to record rights Current RELs insufficient Access more important than enforcement Not one unifying architecture Need for more discussion DRM Requirements for R&E: Discussion Paper submitted to OASIS Rights Language Technical Committee Creation of DRM Working Group within I2 Middleware Initiative

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 Federated DRM Project Fundamental Goal: Enable intersection of attributes about user, content and usage to manage objects Modeled on the I2 Shibboleth project Also federates rights administration University of Tennessee and Rutgers University leading project

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 Shibboleth Basics “Interrealm Attribute-based Authorization for Web Services” An initiative to develop an architecture, policy framework, and practical technologies to support inter- institutional sharing of resources Provides the secure exchange of interoperable attributes which can be used in access control decisions

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 Shibboleth Basics Controlled dissemination of attribute information, based on administrative defaults and user preferences Shifts the model from passive privacy towards active privacy Based on a federated administration trust framework Vendor participation - IBM/Tivoli Standards Alignment - OASIS/SAML

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 Why Shibboleth? Emphasis on federated administration Emphasis on flexible yet secure access Establishes trust communities Active privacy a core principle Open source, community development Project maturing

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 Resources NMI and DRM Workshop Discussion Paper: DRM Requirements for Research and Education resources.htm I2 Middleware Initiative DRM Working Group

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 NSF Middleware Initiative Goal to develop and deploy a national middleware infrastructure for science, research and higher education Internet2/EDUCAUSE/SURA and the GRIDs Center Development areas: identifiers, directories, authentication, authorization, GRIDs, PKI, digital video

TERENA GENERAL ASSEMBLY MEETING OCTOBER 24, 2002 NSF Middleware Initiative Deliverables: Software, community standards, best practices, schema and objectclasses, reference implementations, open source services, corporate relations NMI 1.0 (May 7, 2002) NMI 2.0 (October 25, 2002)