Upload
elma
View
30
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Economic incentives for protecting digital rights online. Outline. Introduction Background & Related work The proposed protocol (SPIES) Exchange period Protection period Conclusions. Introduction. - PowerPoint PPT Presentation
Citation preview
Economic incentives for protecting digital rights online
Source:
Authors:
Reporter:Date:
Electronic Commerce Research and Applications, Vol.10, Issue 5, pp.553-564, 2011N. Boris Margolin, Brian Neil Levine, James D. Miller, Matthew WrightLu, Wan-Yu, Liang, Jiun-Lwen2012/11/01
2
Outline
• Introduction• Background & Related work• The proposed protocol (SPIES)– Exchange period– Protection period
• Conclusions
3
Introduction
• Once electronic content has been released, it is very difficult to prevent it from being shared.
• This disclosure often represents economic harm to the content’s owner and others.
• To discourage illegitimate sharing.
4
Background & Related work(1/2)
• Game theory
• Digital rights management (DRM)– DRM is the use of technological means to allow only
authorized uses of or access to content.
– Traditional DRM uses techniques: encryption & watermarking
– DRM-free
5
Background & Related work(2/2)
• Digital rights management (DRM)
Content providerContent consumer
Escrow service
6
The proposed protocol (1/5)
• Secret Protection Incentive-based Escrow System (SPIES).
• SPIES is best suited for applications in which the content is legitimately shared among a small set of participants.
• SPIES should not be used to replace traditional DRM. (ex. movie and music files sold online)
• SPIES used to limit unauthorized sharing of passwords for accessing content on websites.
7
The proposed protocol (2/5)
• SPIES is a protocol executed between several actors:
信託付款服務 (第三方 )
8
The proposed protocol (3/5)
• Variables in SPIES
9
The proposed protocol (4/5)
• Exchange period
10
The proposed protocol (5/5)
• Protection period
Fig. the Bounty Payment
11
Conclusions
• SPIES uses the techniques of game theory to analyze strategies and outcomes.
• Applicable: passwords, corporate knowledge-sharing, pre-release media.
• Its chief limitations are the requirements for a limited number of legitimate.
• To limit and detect unauthorized sharing.
Thanks for your attention !