The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a novel implementation for the distribution of cultural heritage digital images via a Peer-to-Peer network. This implementation consists of a Peer-to-Peer (P2P) network for the distribution of cultural heritage digital images and Digital Rights Management (DRM) technologies for the copyright protection of these digital images. In this approach, we design and implement a software...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
Summary form only given. Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
This paper describes an automated technique for protecting portable executable files used in Windows NT Platform. The proposed technique mainly works on Portable Executable format for 32-bit applications. The paper describes the PE format illustrating its main structures followed by an overview on existing protection techniques, and then it illustrates the proposed technique used in packing the PE...
Digital rights management systems (DRMS) tend to solve two aspects about rights protection of the protected content for content provider: access control and usage control. Access control concerns about how users access the content, while usage control focuses on how users use it. In this paper, we introduce some key techniques and strategies to overcome the difficulties in implementation of a compatible...
Secure computing is gaining importance as computing capability is increasingly becoming distributed and information is available everywhere. Prevention of piracy and digital rights management have become very important and information security is now mandatory rather than an additional feature. Various software schemes have been proposed to provide certain levels of copyright and intellectual property...
Usage control is the field of security which deals with the issue of access decisions on a client platform which is outside the domain of the original owner. These issues include digital rights management, privacy issues and concepts such as content redistribution. UCON is a highly expressive usage control model, which significantly enhances traditional access control models through decision continuity...
The National Institute of Standards and Technology give the following definition: "Digital rights management is a system of information technology components and services along with corresponding law, policies and business models which strives to distribute and control intellectual property and its right." However, most existing DRM systems are designed for powerful protection. The portability...
The TCG (Trusted Computing Group) is an industry working group which aims to establish industry standards for trust and security in computing platforms. This paper enriches the TCG architecture by adding a SPM (Secure Process Manager) into the trusted platform as a kernel component for the purpose of process management. To attest a process/software to a remote peer, SPM will attest itself first and...
The digital rights management (DRM) systems aim at protecting and enforcing the legal rights associated with the use of digital content distributed on the Internet. Most of such systems use watermarking techniques to implement the content protection. Although the effectiveness of the implemented protection strictly depends on the adopted watermarking techniques, an important role is also played by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.