DRM and trusted computing

DRM and trusted computingStefik (2002) states that trusted computing combine hardware and software (meeting certain security specifications approved by the content provider) to create a secure trusted platform for the exchange of digital content and information. The conceptual underpinnings of trusted computing technologies trace back to Dr. Mark Stefiks pioneering work at Xerox PARC. In very general terms, Stefik (2002) defined a trusted system as a system that can be relied on to follow certain rules. In the DRM and digital copyright protection context, a trusted system is a computer (or other device) that can be relied on to follow and enforce rules governing the access and use of protected digital content. The server relies on trusted elements of the recipients device to identify the recipient, to transmit only accurate information about the recipient, and to limit the recipients ability to manipulate any content it receives from the server in ways that exceed its authorization.Question: isn?t this setup prone to man in the middle attacks? Research, discuss and comment.

Our group of high quality writers are ready to help you with a similar paper within a specified deadline. Just click ORDER NOW and provide us with your assignment details, contact information and make payments. You will get periodic updates on order progress in your email.

USE THE CALCULATOR BELOW TO GET THE QUOTE

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total:
« »