22 research outputs found

    Towards Better Sharing of Cultural Heritage -- An Agenda for Copyright Reform

    Get PDF
    This paper is intended to act as a pillar and reference point for CC's advocacy work in copyright reform in the cultural heritage context, with a focus on issues arising in the digital environment. It may serve to support members of the CC community in their own advocacy efforts, guide policymakers in their legislative processes, and inform anyone interested in the policy issues gravitating around access and reuse of culture and cultural heritage. It will likely be adapted into a GLAM Guide for Policymakers and will be augmented with real-life examples, case studies and practical advice.It starts with an overview of copyright challenges to the legitimate activities of GLAMs, notably preservation (largely through digitization) and sharing of digital and digitized content images and data for access, use and reuse. It also notes copyright's chilling effects in the face of the GLAM sector's general risk aversion. The paper then offers insights towards effective copyright reform addressing those challenges, with a focus on the opportunities related to the digital environment. The proposals for reform aim to create legal certainty and international harmonization as well as to facilitate cross-border transactions.The paper encourages policymakers to recognize and support the pivotal roles of GLAMs in preserving and providing access to knowledge and culture to all members of society. It urges policymakers to engage with stakeholders to ensure there are clear, simple, and effective policies in place to support better sharing of cultural heritage in the public interest.The paper provides a high-level overview of the policy issues and, as a whole, it does not necessarily reflect the current situation in any specific jurisdiction.

    Trust[ed | in] computing, signed code and the heat death of the internet

    No full text
    The Trusted Computing Group (TCG) is an industry con-sortium which has invested in the design of a small piece of hardware (roughly a smartcard), called a Trusted Plat-form Module (TPM), and associated APIs and protocols which are supposed to help increase the reliability of TPM-endowed computing platforms (trusted platforms). The TCG envisions that boot loaders, OSes and applications programs on trusted platforms will all collaborate in building a cryp-tographic hash chain which represents the current execution state of the platform, and which resides on the TPM. Re-mote sites can then verify that the platform in question is \in a trusted state " by requesting the TPM to produce a signed data blob containing the value of this hash chain, which can then be compared against a library of recognize

    Secure Intrusion-tolerant Replication on the Internet

    No full text
    Architecture (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number of group communication primitives, such as binary and multi-valued Byzantine agreement, reliable and consistent broadcast, and an atomic broadcast channel. Atomic broadcast immediately provides secure statemachine replication. The protocols are designed for an asynchronous wide-area network, such as the Internet, where messages may be delayed indefinitely, the servers do not have access to a common clock, and up to one third of the servers may fail in potentially malicious ways. Security is achieved through the use of threshold public-key cryptography, in particular through a cryptographic common coin based on the Diffie-Hellman problem that underlies the randomized protocols in SINTRA. The implementation of SINTRA in Java is described and timing measurements are given for a test-bed of servers distributed over three continents. They show that extensive use of public-key cryptography does not impose a large overhead for secure coordination in wide-area networks

    Method and Device for Verifying the Security of a Computing Platform

    Get PDF
    Avhandlingen omhandler når bruk av isolasjon overfor domfelte i fengsel utgjør et brudd på EMK artikkel 3. Formålet med avhandlingen er å klarlegge om nasjonal rett harmonerer med de menneskerettslige forpliktelsene som følger av EMK artikkel 3. Det har lenge vært anerkjent at isolasjon kan være svært skadelig. Til tross for dette resulterer få dommer fra EMD i brudd på EMK artikkel 3. Det fremkommer av praksis fra EMD at det beror på en helhetsvurdering av ulike relevante momenter om det foreligger konvensjonsbrudd ved bruk av isolasjon. I januar 2020 var spørsmålet om isolasjon og mangelen på menneskelig kontakt i norske fengsler oppe til høring på Stortinget med bakgrunn Særskilt melding fra Sivilombudsmannen. I Norge er isolasjon et av de mest restriktive inngrepene innsatte i fengsel utsettes for, og det har i en lenger periode blitt uttrykt bekymring for bruken av isolasjon i norske fengsler. Gjennom å vurdere momentene som er utpenslet av EMD opp mot nasjonal lovgivning og praksis blir det i avhandlingen klarlagt om norsk rett harmonerer med de menneskerettslige skrankene som følger av EMK artikkel 3
    corecore