[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Conditional Access Concepts and Principles

  • Conference paper
  • First Online:
Financial Cryptography (FC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1648))

Included in the following conference series:

  • 435 Accesses

Abstract

This paper describes concepts and principles for infrastructures that manage chargeable content, more commonly known as conditional access (CA) systems. We present a functional overview of CA systems and the security components and design principles that enable the solutions. We then present concepts that may be used to quantify the risk associated with the delivery of particular valued content in a particular way. Finally, we describe how the threat model changes as the networking bandwidth available to pirates and their customers increases, and propose a possible long-term solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson and M. Kuhn, “Low Cost Attacks on Tamper Resistant Devices,” 5th Security Protocols Workshop, Lecture Notes in Computer Sciences 1361, Springer-Verlag, 1997, pages 125–136.

    Chapter  Google Scholar 

  2. International Business Machine. 1997. Cryptolope containers: A white paper.

    Google Scholar 

  3. J.L. Cohen, M.H. Etzel, D.W. Faucher, and D.N. Heer, “Security for Broadband Digital Networks,” Communications Technology, August 1995, pages 58–69.

    Google Scholar 

  4. ‘Open Verifier’ Functionality in Consumer Electronics Devices, GD-T204, Release B, News Data Systems, Ltd.

    Google Scholar 

  5. ISO 7816 Identification Cards, Integrated Circuit Cards with Contact, 1987.

    Google Scholar 

  6. EIA-679, National Renewable Security Standard (NRSS) Parts A and B, March 1998.

    Google Scholar 

  7. D.M. Goldschlag and D.W. Kravitz, “Pirate Card Rejection,” Cardis 98,Louvain-la-Nueve, Belgium, September 14-16, 1998.

    Google Scholar 

  8. J.P.M.G. Linnartz, “The ‘Ticket’ Concept for Copy Control Based on Embedded Signalling,” ESORICS 98, Louvain-la-Nueve, Belgium, September 16-18, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kravitz, D.W., Goldschlag, D.M. (1999). Conditional Access Concepts and Principles. In: Franklin, M. (eds) Financial Cryptography. FC 1999. Lecture Notes in Computer Science, vol 1648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48390-X_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-48390-X_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66362-1

  • Online ISBN: 978-3-540-48390-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics