11 research outputs found

    A language for information commerce processes

    Get PDF
    Automatizing information commerce requires languages to represent the typical information commerce processes. Existing languages and standards cover either only very specific types of business models or are too general to capture in a concise way the specific properties of information commerce processes. We introduce a language that is specifically designed for information commerce. It can be directly used for the implementation of the processes and communication required in information commerce. It allows to cover existing business models that are known either from standard proposals or existing information commerce applications on the Internet. The language has a concise logical semantics. In this paper we present the language concepts and an implementation architecture

    Privacy Engineering dalam Teknologi Digital Right Management (DRM) untuk Keamanan Produsen Distributor dan Konsumen

    Get PDF
    konten (produk dan jasa) berbasis Internet merupakan peluang yang besar bagi kalangan produsen, distributor dan konsumen untuk mendapatkan manfaatnya masing-masing. Namun di sisi lain dapat mengancam privacy bagi para penggunanya. Masalah privacy yang sering timbul biasanya gangguan pada tahapan transaksi bisnis (misal kasus pada industri credit card), namun masalah baru dan lebih serius akan dijumpai pada perkembangan selanjutnya. Dalam tulisan ini kami memaparkan kontribusi teknologi DRM dalam mengkompromikan dan melindungi privacy penggunanya. Selain itu akan dijelaskan salah satu prinsip DRM yang mudah untuk diimplementasikan dan secara potensial cukup efektif yakni privacy engineering untuk mengatasi masalah keamanan dan privacy bagi produsen, distributor dan konsumen sebagai para penggunanya. Kesemua keuntungan pihak yang terlibat diharapkan dapat memberikan dampak positif secara makro maupun mikro dunia industri

    Towards usage control models: beyond traditional access control

    Get PDF

    A language for information commerce processes

    Get PDF
    Automatizing information commerce requires languages to represent the typical information commerce processes. Existing languages and standards cover either only very specific types of business models or are too general to capture in a concise way the specific properties of information commerce processes. We introduce a language that is specifically designed for information commerce. It can be directly used for the implementation of the processes and communication required in information commerce. It allows to cover existing business models that are known either from standard proposals or existing information commerce applications on the Internet. The language has a concise logical semantics. In this paper we present the language concepts and an implementation architecture

    A framework for usage management

    Get PDF
    This thesis proposes a formal framework for usage management in distributed systems. The principles of system design are applied in order to standardize certain features of the framework, such as the operational semantics, and leave free of standards areas that necessitate choice and innovation. The framework enables use of multiple policy languages, and dynamic interpretation of usage policies in different computing environments. In addition, the framework provides formal semantics to reason about interoperability of policies with respect to computing environments. The use of this framework in different usage management scenarios is demonstrated including multi-level security, cloud computing and digital rights management (DRM) systems. Furthermore, DRM is cast in a setting that allows the modeling of a number of current approaches within a game theoretic setting. Current strategies that attempt to influence the outcome of such games are analyzed, and a new type of architectural infrastructure that makes novel use of a trust authority is considered in order to create a suitable environment for constructing DRM games that may prove useful in the future

    Interoperability of DRM Systems

    Get PDF
    The study deals with the cutting-edge subject of electronic contracts which have the potential to automatically process and control the access rights for (electronic) goods. It shows the design and the implementation of a rights expression exchange framework. The framework allows DRM systems to exchange electronic contracts, formulated in a standardized rights expression language, and thus provides DRM system interoperability. The work introduces a methodology for the standardized composition, exchange and processing of electronic contracts or rights expressions

    Secure fingerprinting on sound foundations

    Get PDF
    The rapid development and the advancement of digital technologies open a variety of opportunities to consumers and content providers for using and trading digital goods. In this context, particularly the Internet has gained a major ground as a worldwiede platform for exchanging and distributing digital goods. Beside all its possibilities and advantages digital technology can be misuesd to breach copyright regulations: unauthorized use and illegal distribution of intellectual property cause authors and content providers considerable loss. Protections of intellectual property has therefore become one of the major challenges of our information society. Fingerprinting is a key technology in copyright protection of intellectual property. Its goal is to deter people from copyright violation by allowing to provably identify the source of illegally copied and redistributed content. As one of its focuses, this thesis considers the design and construction of various fingerprinting schemes and presents the first explicit, secure and reasonably efficient construction for a fingerprinting scheme which fulfills advanced security requirements such as collusion-tolerance, asymmetry, anonymity and direct non-repudiation. Crucial for the security of such s is a careful study of the underlying cryptographic assumptions. In case of the fingerprinting scheme presented here, these are mainly assumptions related to discrete logarithms. The study and analysis of these assumptions is a further focus of this thesis. Based on the first thorough classification of assumptions related to discrete logarithms, this thesis gives novel insights into the relations between these assumptions. In particular, depending on the underlying probability space we present new reuslts on the reducibility between some of these assumptions as well as on their reduction efficency.Die Fortschritte im Bereich der Digitaltechnologien bieten Konsumenten, Urhebern und Anbietern große Potentiale fĂŒr innovative GeschĂ€ftsmodelle zum Handel mit digitalen GĂŒtern und zu deren Nutzung. Das Internet stellt hierbei eine interessante Möglichkeit zum Austausch und zur Verbreitung digitaler GĂŒter dar. Neben vielen Vorteilen kann die Digitaltechnik jedoch auch missbrĂ€uchlich eingesetzt werden, wie beispielsweise zur Verletzung von Urheberrechten durch illegale Nutzung und Verbreitung von Inhalten, wodurch involvierten Parteien erhebliche SchĂ€den entstehen können. Der Schutz des geistigen Eigentums hat sich deshalb zu einer der besonderen Herausforderungen unseres Digitalzeitalters entwickelt. Fingerprinting ist eine SchlĂŒsseltechnologie zum Urheberschutz. Sie hat das Ziel, vor illegaler VervielfĂ€ltigung und Verteilung digitaler Werke abzuschrecken, indem sie die Identifikation eines BetrĂŒgers und das Nachweisen seines Fehlverhaltens ermöglicht. Diese Dissertation liefert als eines ihrer Ergebnisse die erste explizite, sichere und effiziente Konstruktion, welche die BerĂŒcksichtigung besonders fortgeschrittener Sicherheitseigenschaften wie Kollusionstoleranz, Asymmetrie, AnonymitĂ€t und direkte Unabstreitbarkeit erlaubt. Entscheidend fĂŒr die Sicherheit kryptographischer Systeme ist die prĂ€zise Analyse der ihnen zugrunde liegenden kryptographischen Annahmen. Den im Rahmen dieser Dissertation konstruierten Fingerprintingsystemen liegen hauptsĂ€chlich kryptographische Annahmen zugrunde, welche auf diskreten Logarithmen basieren. Die Untersuchung dieser Annahmen stellt einen weiteren Schwerpunkt dieser Dissertation dar. Basierend auf einer hier erstmals in der Literatur vorgenommenen Klassifikation dieser Annahmen werden neue und weitreichende Kenntnisse ĂŒber deren ZusammenhĂ€nge gewonnen. Insbesondere werden, in AbhĂ€ngigkeit von dem zugrunde liegenden Wahrscheinlichkeitsraum, neue Resultate hinsichtlich der Reduzierbarkeit dieser Annahmen und ihrer Reduktionseffizienz erzielt
    corecore