Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/947380.947384acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Protecting digital archives at the Greek Orthodox Archdiocese of America

Published: 27 October 2003 Publication History
  • Get Citation Alerts
  • Abstract

    The Greek Orthodox Archdiocese of America~(GOA) has amassed a rich and varied collection of artifacts associated with two thousand years of religious and historical tradition, as well as more than a century of chronicles in America. The items in this archive include iconography, art, photographs, letters, and other memorabilia. The GOA has endeavored to digitize these assets in order to preserve them, while at the same time make them more accessible for appropriate and beneficial uses. Specifically, the Department of Internet Ministries at the GOA was tasked with overseeing this digitization effort, as well as with the creation of appropriate tools and technology for accessing the resulting digital archive. The challenges associated with this work included the wide diversity of media types, the need to attach specific restrictions to the use of different items, and the desire to provide a user experience that was transparent and not daunting or discouraging. At a fairly early stage it was determined that emerging digital rights management (DRM) capabilities would be necessary in order to realize the goals of the project. These capabilities, however, had to be implemented while accounting for a previously deployed digital asset management (DAM) and web publishing system, not to mention the existing IT infrastructure. This paper presents a case study that describes the efforts associated with the specification, creation, and deployment of an effective DRM system that incorporates rights enforcement technology, and works in synergy with the previously deployed DAM system at the GOA.

    References

    [1]
    B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Proceedings of the 21st Annual International Cryptology Conference, Santa Barbara, California, Lecture Notes in Computer Science 2139, pages 1--18. Springer-Verlag, 2001.]]
    [2]
    Canto Software. http://www.canto.com.]]
    [3]
    S. Chow, P. Eisen, H. Johnson, and P. van Oorschot. A white-box DES implementation for DRM applications. In Lecture Notes in Computer Science, Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, D.C. (to appear). Springer-Verlag, 2003.]]
    [4]
    Committee on Intellectual Property Rights and the Emerging Information Infrastructure, Computer Science and Information Board. The digital dilemma: Intellectual property in the information age. Technical report, National Research Council, Washington, D.C., 2000.]]
    [5]
    Elisar Software Corp. http://www.elisar.com.]]
    [6]
    InterTrust Technologies Corp. http://www.intertrust.com.]]
    [7]
    J. Feigenbaum, D. Boneh, and R. Venkatesan. Report on the DIMACS workshop on management of digital intellectual property. Technical report, DIMACS, April 17-18 2000. http://dimacs.rutgers.edu/Workshops/Management2/.]]
    [8]
    G. L. Heileman and C. E. Pizano. An overview of digital rights enforcement and the MediaRights technology. Technical report, Elisar Software Corporation, April 5, 2001. http://www.elisar.com/technology.html.]]
    [9]
    G. L. Heileman, C. E. Pizano, and C. T. Abdallah. Image watermarking for copyright protection. In M. T. Goodrich and C. C. McGeoch, editors, Lecture Notes in Computer Science 1619, Algorithm Engineering and Experimentation: International Workshop ALENEX'99, Selected Papers, pages 226--245. Springer-Verlag, 1999.]]
    [10]
    N. Koblitz. A Course in Number Theory and Cryptography. Springer-Verlag, New York, 2nd edition, 1994.]]
    [11]
    G. Naumovich and N. Memon. Preventing piracy, reverse engineering, and tampering. IEEE Computer, 36(7):64--71, 2003.]]
    [12]
    F. A. Petitcolas. Image watermarking: Weaknesses of existing schemes. www.cl.cam.ac.uk/~fapp2/watermarking/image_watermarking/, 1997.]]
    [13]
    F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In Proceedings, Second International Workshop on Information Hiding, Portland, OR, Lecture Notes in Computer Science. Springer-Verlag, April 1998. http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/.]]
    [14]
    J. Richter. Advanced Windows, chapter Breaking Through Process Boundary Walls. Microsoft Press, Redmond, WA, 3rd edition, 1997.]]
    [15]
    B. Rosenblatt and G. Dykstra. Integrating content management with digital rights management: Imperatives and opportunities for digital content lifecycles. Technical report, Giantsteps Media Technology and Dykstra Research, May 14 2003. http://www.giantstepsmts.com/cm-drm_white_paper.htm.]]
    [16]
    B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York, 2nd edition, 1996.]]
    [17]
    B. Schneier. The fallacy of trusted client software (cryptorhythms column). Information Security Magazine, August 2000.]]
    [18]
    D. R. Stinson. Cryptography: Theory and Practice. CRC Press, Inc., Boca Raton, FL, 2nd edition, 2002.]]
    [19]
    J. Viega, T. Kohno, and B. Potter. Trust (and mistrust) in secure applications. Communications of the ACM, 44(2):31--36, February 2001.]]

    Cited By

    View all
    • (2010)Translating handwritten bushman textsProceedings of the 10th annual joint conference on Digital libraries10.1145/1816123.1816139(109-118)Online publication date: 21-Jun-2010
    • (2008)Protecting Digital Library Collections with Collaborative Web Image Copy DetectionProceedings of the 11th International Conference on Asian Digital Libraries: Universal and Ubiquitous Access to Information10.1007/978-3-540-89533-6_37(331-334)Online publication date: 2-Dec-2008
    • (2006)Effective content tracking for digital rights management in digital librariesProceedings of the 10th European conference on Research and Advanced Technology for Digital Libraries10.1007/11863878_35(415-425)Online publication date: 17-Sep-2006
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DRM '03: Proceedings of the 3rd ACM workshop on Digital rights management
    October 2003
    161 pages
    ISBN:1581137869
    DOI:10.1145/947380
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 October 2003

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. content protection
    2. digital asset management
    3. digital image archive
    4. digital rights management

    Qualifiers

    • Article

    Conference

    CCS03
    Sponsor:

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2010)Translating handwritten bushman textsProceedings of the 10th annual joint conference on Digital libraries10.1145/1816123.1816139(109-118)Online publication date: 21-Jun-2010
    • (2008)Protecting Digital Library Collections with Collaborative Web Image Copy DetectionProceedings of the 11th International Conference on Asian Digital Libraries: Universal and Ubiquitous Access to Information10.1007/978-3-540-89533-6_37(331-334)Online publication date: 2-Dec-2008
    • (2006)Effective content tracking for digital rights management in digital librariesProceedings of the 10th European conference on Research and Advanced Technology for Digital Libraries10.1007/11863878_35(415-425)Online publication date: 17-Sep-2006
    • (2005)DRM interoperability analysis from the perspective of a layered frameworkProceedings of the 5th ACM workshop on Digital rights management10.1145/1102546.1102551(17-26)Online publication date: 7-Nov-2005
    • (2005)Constructing a wrapper-based DRM system for digital content protection in digital librariesProceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences10.1007/11599517_43(375-379)Online publication date: 12-Dec-2005
    • (2004)DRM as a layered systemProceedings of the 4th ACM workshop on Digital rights management10.1145/1029146.1029151(11-21)Online publication date: 25-Oct-2004

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media