Protection of SCORM-compliant Content Magda Mourad T.J. Watson Research Center

Slides:



Advertisements
Similar presentations
Learning Objects Network We see the e-knowledge market being the next major growth phase of the Internet Michael Moe, Merrill Lynch Tom Barefoot, Chief.
Advertisements

Trust and Security for Next Generation Grids, Implementing UCON with XACML for Grid Services Bruno Crispo Vrije Universiteit Amsterdam.
Wei-Neng Hung 1/ Digital Content Launcher Generic DRM Wrapper for COTS: Client Architecture Generic DRM Wrapper Acrobat Reader IE DjVu plugin.
Title of IM2009 Application Session Paper Author(s) Affiliation(s) {john,
Enabling Secure Internet Access with ISA Server
Data Management Expert Panel - WP2. WP2 Overview.
Cognos Web Services Business Intelligence. SOA SOA (Service Oriented Architecture) The SOA approach involves seven key principles: -- Coarse -grained.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Tom Lewis Director, Academic & Collaborative Applications University of Washington.
Enterprise Content Management Departmental Solutions Enterprisewide Document/Content Management at half the cost of competitive systems ImageSite is:
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Providing a SCORM service in an IMS Learning Design player Paul Sharples The University of Bolton.
1 AAA for document delivery ~ Work in progress ~ Shuichi TASHIRO Electrotechnical Laboratory, Japan.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
German Research Center for Artificial Intelligence (DFKI GmbH) Saarbrücken, Germany Deutsches Forschungszentrum für Künstliche Intelligenz Course Generation.
Internet Information Server (IIS)
Creating your website Using Plain HTML. What is HTML? ► Web pages are authored in HyperText Markup Language (HTML) ► Plain text is marked up with tags,
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Use of Content Packaging to make Learning Management Systems Interact Nikhil Wason.
Digital Rights Management An Overview By Jude Umeh (MBCS)
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
MSc Education Supporting Infrastructure Emil Doychev Vladimir Valkanov University of Plovdiv Bulgaria.
Microsoft Exchange Exchange is more than just Electronic Mail The server that embraces Internet standards and extends rich messaging and collaboration.
Institut Mines-Télécom “Digital Safe Client via HTML5 ” Mayssa JEMEL Ahmed SERHROUCHNI Journée: Cloud Coffre Fort Numérique 26 Février 2015.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Implementing IMS Common Cartridge Warwick Bailey, Director Icodeon Ltd Cambridge, UK.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
魂▪創▪通魂▪創▪通 Use Case and Requirement for Future Work Sangrae Cho Authentication Research Team.
1 Functional reference model for Digital Rights Management Systems Vural Ünlü / Prof. Dr. Thomas Hess Munich School of Management Berlin, 5. September2004.
Dr David Massart, EUN AgLRs – Budapest, Hungary Nov. 2, 2009 Reusable Learning Content Discovery and Exchange.
Session 11: Security with ASP.NET
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
KX509: Leveraging Kerberos to Obtain Digital Certificates for Web Client Authentication University of Michigan Kevin Coffman Bill Doster.
AIRBUS LMS Customer Services 1 AIRBUS LMS C.B.T. Software Design - STDS2 Copyright © AIRBUS SAS 2003.
File-Mate 1500 Design Review II
SODA Archiving October 2013
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Phosphor A Cloud based DRM Scheme with Sim Card th International Asia-Pacific Web Conference Author : Peng Zou, Chaokun Wang, Zhang Liu, Dalei.
SWIM-SUIT Information Models & Services
CH1. Hardware: CPU: Ex: compute server (executes processor-intensive applications for clients), Other servers, such as file servers, do some computation.
File-Mate 1500 Design Review III Keven Abbott Tyler Crouse Kiana Delventhal Liam Westby.
Standards-based trackable E-learning in a Disconnected Environment NetGenica.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Building Security into Your System Bill Major Gregory Ponto.
Module 11: Securing a Microsoft ASP.NET Web Application.
A Web Services Model for Geoscience Information Lee Allison - Arizona Geological Survey 3-D Geologic Mapping for Hydrogeology – GSA Short Course – October.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Single Sign-On in the Danish Educational Sector Per Thorboll Deputy director UNI-C.
SCORM Course Meta-data 3 major components: Content Aggregation Meta-data –context specific data describing the packaged course SCO Meta-data –context independent.
Web 2.0 Applications. Tasks that can be completed with Dropbox.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
5/25/2018 2:39 AM © 2006 Microsoft Corporation. All rights reserved.
A secure and traceable E-DRM system based on mobile device
pVault Sharing Architecture
Topic 1: Data, information, knowledge and processing
Athith Amarnath, graduate Student Database and Security Research Group
IPortal Integration Customer Bank Employees Management Support iPortal.
Internet Skills ELEC135 Alan Noble Room 504 Tel:
National Trust Platform
Presentation transcript:

Protection of SCORM-compliant Content Magda Mourad T.J. Watson Research Center

Magda Mourad The Problem  Enforce digital rights of web-based educational content without requiring a proprietary browser.

Magda Mourad The Solution  The use of extensions to secure existing  web browsers and  Java players while ensuring  transparency to the user and  applicability to SCORM-compliant content.

Magda Mourad WebGuard Module View Print Save Clip Copy View Source Core Technology adapted to SCORM LOs

Magda Mourad WebGuard Technology  Developed by IBM Watson Research  Adapted to SCORM LO  Can be used with any XML based DRM language  Can be used with any standard compliant LMS  Currently works with IE 5.5 (Win’95 and above)  WebGuard module will be packaged in a Tamper Resistant wrapper  Tight integration with LMS is possible

Magda Mourad Browser Solution  Use pluggable protocols to extend browser  Launcher paradigm to create trusted environment  Control application menus to enforce usage rights

Magda Mourad Trusted Browser Architecture Web Browser Acquisition Usage Rights Access Content Client Trusted Content Handler Digital Rights Management Client Rights Key Map Content Application Digest Verify Integrity Clearing House Content Storage Content e-Store Content Preparation Encrypted Content Authorize Promo Get Keys Get Content Buy Rights

Magda Mourad Protected SCORM Content Flow WG Content Server WG Packer WG Store LMS Course SCO3 SCO2 SCO1 Asset Units Meta- Data Manifest Course Information (1) Registration and Request for Rights (2) Encrypted rights (5) rmhttp (3) Login & select a course (4) Course rmhttp URL Client Web Browser WG extension Rights Encrypted Content