Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management.

Slides:



Advertisements
Similar presentations
ViDe Video-on-Demand Initiatives Mairéad Martin, University of Tennessee April 25, 2002.
Advertisements

Introduction to Digital Rights Management Grace Agnew SURA/ViDe Digital Video Conference March 2004.
Access Strategies for Digital Video and Digital Rights Management Grace Agnew, Georgia Institute of Technology Mairéad Martin, University of Tennessee.
Digital Rights Management and e-Learning Sarah Currier and Lorna M. Campbell Centre for Educational Technology Interoperability Standards (CETIS) Centre.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Shibboleth: How It Relates to SAML Marlena Erdos Aug 27, 2001.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration 4th Annual PKI R&D Workshop Tom Barton, Kate Keahey,
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
June 30, 2004CAMP Shibboleth Implementation Workshop Shibboleth Mockup - ARP GUI Management by Steven Carmody Brown University proxy Walter Hoehn.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Administrative Information Systems Shibboleth: The Next Generation ISIS Technical Information Session for Developers Datta Mahabalagiri March
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Rights / Business Models in the NSDL Columbia University David Millman April, 2001.
Digital Rights Management on the Web Dr Renato Iannella IPR Systems Chief Scientist 10th World-Wide Web.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
Shibboleth Possible Features – Version 2 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
GridShib Grid-Shibboleth Integration Von Welch, Tom Barton, Kate Keahey, Frank Siebenlist GlobusWORLD 2005.
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
VidMid Video-on-Demand BoF Mairéad Martin University of Tennessee October 4, 2001.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
R utgers C ommunity R epository RU CORE 1 A Statewide Community of Trust: An RUcore Implementation using Shibboleth and XACML The Fourth International.
Digital Rights Management with XML Eamonn Neylon Technology Director The YRM Group.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
METSRights and related topics Sally H. McCallum Library of Congress
Shibboleth at Columbia Update David Millman R&D July ’05
Shibboleth: An Introduction
Current list of common attributes of the EDIT federation Single Sign-On for the EDIT platform Lutz Suhrbier¹, Andreas Kohlbecker², Andreas Müller² 1 Freie.
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
Shibboleth: Technical Architecture Marlena Erdos and Scott Cantor Revised Oct 2, 2001 Marlena Erdos and Scott Cantor Revised Oct 2, 2001.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Alternative Architecture for Information in Digital Libraries Onno W. Purbo
1 herbert van de sompel CS 502 Computing Methods for Digital Libraries Cornell University – Computer Science Herbert Van de Sompel
Digital Diversity: Multi- institutional Access to Distributed Course Resources Barry Ribbeck UT HSC - Houston.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
Open Access and Institutional Repositories. Accra, June 2007 Institutional repositories in SA research institutions: the DISA experience Dr D Peters.
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
WebISO, Single Sign-On & Authorization General Overview Shelley Henderson Project Manager, Grid Software USC Information Services Copyright.
Filling institutional repositories: considering copyright issues Susan Veldsman eIFL Content Manager
Shibboleth for Middle Schools James Burger -
Blackboard Learning System r6 and Shibboleth Barry Ribbeck U.Texas Health Science Center at Houston Christopher Etesse Blackboard Inc.
Access Policy - Federation March 23, 2016
Shibboleth Project at GSU
e-Infrastructure Workshop 28th March 2006, University of Leeds
Adding Distributed Trust Management to Shibboleth
PHP / MySQL Introduction
Michael R Gettes, Duke University On behalf of the shib project team
Overview and Development Plans
Federated Digital Rights Management
Shibboleth Deployment Overview
Shibboleth: Status and Pilots
The Attribute and the ecosystem
KC-ROLO Project Kidderminster College – Repository Of Learning Objects
Distributed Digital Rights Management
Presentation transcript:

Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management

Topics Background to VidMid DRM Project DRM Problem Space NMI and DRM Workshop FDRM Architecture Interface/functionalities

VidMid DRM Project Originated in ViDe Video Access Working Group VidMid Video-on-Demand Working Group a subgroup of VidMid DRM principal project Application beyond digital video

DRM Problem Space DRM - the management of intellectual property and distribution of digital content But different interpretations abound ….. Publishers: DRM = protect the copyright owner’s rights, and support licensing model (one-to-one ecommercial model) Research & Education: DRM = enable access while managing Intellectual Property and protecting user’s privacy, (distributed sharing and collaboration model)

DRM Problem Space Where does DRM end and Digital Access Management begin? Are they the same thing? Is DRM a middleware problem? Can commercial DRM systems satisfy R&E requirements? Does an ontological model for DRM exist to reflect R&E requirements? Can fair use be accommodated in DRM systems? Can end-user privacy be protected in DRM systems?

DRM Problem Space Are existing and emerging rights metadata schemes flexible and extensible enough to describe sharing of resources in a distributed environment? (ODRL, XrML, OASIS Rights Language, MPEG-21) Patent encumbrance (ContentGuard/XrML) Who is going to provide DRM “services” on our campuses?

NMI and DRM Workshop Funded by the NSF NMI program to: Explore DRM requirements in Research and Education Look at ways NMI development might be leveraged Create an NMI collaboration of middleware/content management experts Propose rights metadata core CNI, EDUCAUSE, I2, SURA, ViDe

Federated DRM Project Fundamental Goal: Enable intersection of attributes about user, content and usage to manage objects An application of Shib Also federates rights administration Tennessee and Rutgers leading project

Why Shibboleth? Emphasis on federated administration Emphasis on trust User privacy a core principle Club Shib can be leveraged Open source, community development

FDRM Architecture: Components

FDRM Components Resource Attribute Authority (RAA) Function: A database of metadata containing rights records with rights, permissions and constraints associated with a digital resources. Shibboleth Object Attribute Resolver (SHOAR) Function: A component that interacts with the RAA in order to obtain the rights metadata associated with the requested resource.

FDRM Components Resource Manager (RM) Function: The RM resolves the user’s attributes with the resource attributes (rights, permissions and constraints), and forwards the details of the package request to the P/LS. The RM is the equivalent of a DRM Controller in a commercial DRM model. Packaging/License Service (P/LS) Function: A fundamental component of DRM architecture, the P/LS dynamically packages content for delivery. The licensing function of the P/LS entails specification of the rights the user is allowed to exercise on the content (e.g., play, annotate, edit, transfer, etc.).

1 A user in an origin site launches a web browser and selects a URL to access a managed resource from a HTTP server. FDRM Architectural Flows 1

FDRM Architectural Flows 2 2 The Shibboleth Indexical Resource Establisher (SHIRE) receives the user's request and sends the location of the requested resource and the SHIRE's URL to an off-site "Where Are You From?“ (WAYF) server.

FDRM Architectural Flows 3 3 The WAYF server establishes a connection with the requesting user and the Handle Service responsible for the origin site.

FDRM Architectural Flows 4 4 The local Handle Service returns the handle package to the SHIRE. The handle package includes the opaque handle and the address of the user's local AA (UAA) server.

FDRM Architectural Flows 5 5 The SHIRE then passes the received handle package to the Shibboleth Attribute Requester (SHAR).

FDRM Architectural Flows 6 6 The SHAR constructs an Attribute Query Message (AQM) and submits it to the UAA defined in the handle package. The AQM includes the opaque handle, the target URL and the SHAR name.

FDRM Architectural Flows 7 7 The UAA responds to the AQM with an Attribute Response Message (ARM), which includes the SHAR name, target URL and the user attributes as allowed by the user's Attribute Release Policy (ARP).

FDRM Architectural Flows 8 The SHAR passes the results of the ARM to the Shibboleth Object Attribute Resolver (SHOAR). 8

FDRM Architectural Flows 9 9 The SHOAR constructs a Resource Attribute Query (RAQ) and submits it to the Resource Attribute Authority (RAA) associated with the requested resource.

FDRM Architectural Flows 10 The RAA returns a Resource Attribute Response (RAR) to the SHOAR detailing the supporting services and access rights associated with the requested resource. 10

FDRM Architectural Flows Depending on the assertions received from the UAA and the RAA, the SHOAR sends a package request to the Resource Manager (RM).

FDRM Architectural Flows The RM forwards the package request to the Packaging and License Service (P/LS).

FDRM Architectural Flows The P/LS creates the requested package and sends it back to the RM.

FDRM Architectural Flows The RM passes the requested resource to the user.

Scenario Two researchers at different institutions are collaborating on a research paper. They assign differential access to the paper based on roles: as principal authors, only they have read/write permissions, and the academic community has read-only permissions during the development of the work.

FDRM Rights Assignment 1

FDRM Rights Assignment 2

FDRM Rights Assignment 3

FDRM Rights Assignment 4

FDRM Functionalities: Annotate

FDRM Functionalities: Read

FDRM Functionalities: Write

FDRM Access

Resources VidMid Website: video/ “FDRM: A Proposed DRM Solution for Research & Education.” DLib Magazine, July 2002 issue ( (Includes Shib and FDRM Glossary).