321 research outputs found

    Using Java and Linux to crack the DES challenge

    Get PDF
    DES has been used for a long time to guarantee the privacy of transactions in open communication environments, especially in inter-banking and financial ones. Nevertheless, the security level offered by this algorithm is not the same that was before. The DES working conditions have been shifting with the exponential growth of the Internet, and what was considered as being safe a decade ago is not safe anymore. What this article intends to show is how weak the actual DES strength is, and how and what a determined attacker can do to break it using the new Java programming language and the Linux operating system

    iDRM - Interoperability Mechanisms for Open Rights Management Platforms

    Get PDF
    Today’s technology is raising important challenges in the Intellectual Property (IP) field in general and to Copyright in particular [Arkenbout et al., 2004]. The same technology that has made possible the access to content in a ubiquitous manner, available to everyone in a simple and fast way, is also the main responsible for the challenges affecting the digital content IP of our days [Chiariglione, 2000]. Technological solutions and legal frameworks were created to meet these new challenges. From the technological point of view, Rights Management Systems (RMS) and Copy Protection Systems (CPS) have been developed and deployed to try to cope with them. At first, they seemed to work however, their closed and non-interoperable nature and a growing number of wrong strategic business decisions, soon lead to a strong opposition. One of the strongest negative points is the lack of rights management interoperability [Geer, 2004]. The work presented on this thesis primarily addresses the RMS interoperability problems. The objective of the thesis is to present some possible mechanisms to improve the interoperability between the different existing and emerging rights management platforms [Guth, 2003a]. Several different possible directions to rights management interoperability are pointed in this thesis. One of the most important is openness. Interoperability between different rights management mechanisms can only be achieved if they are open up to a certain level. Based on this concept, an open rights management platform is designed and presented in this thesis. Also, some of the interoperability mechanisms are presented and explained. This platform makes usage of the emerging service-oriented architectures to provide a set of distributed rights management services. Rights management solutions rely heavily on the establishment of authenticated and trust environments between its different elements. While considering different RMS, the establishment of such trust environments can be somehow complex. This thesis provides a contribution to the establishment of interoperable RMS trust environments through the usage of Public-Key Infrastructure (PKI) mechanisms. Modern rights management systems have to handle with both keying material and licenses which are used mostly to define how content is governed by the system. Managing this is a complex and hard task when different rights management solutions are considered. This thesis presents and describes a generic model to handle the key and license management life cycle, that can be used to establish a global interoperable management solution between different RMS

    Improving Content Privacy on Social Networks Using Open Digital Rights Management Solutions

    Get PDF
    AbstractAmong Internet users, the social networks have gained a huge popularity. Millions of users are part of some online social network in order to share their own experiences and content with others. Documents, videos, music and pictures are among some of the most shared content types online, relying on the privacy and security controls that are offered by the social network platform. In this equation, the end-user has little control, resulting in serious privacy concerns – once content is shared on the social network, is out of end-user hands and they cannot enforce their own privacy rules.A different approach for social networks shared content privacy is proposed in this paper - centered on the user and not on the social network platform. To ensure this, an architecture based on an open rights management platform is presented. This architecture will enforce the necessary security and privacy mechanisms extending the original controls provided by the social network platform. That way, users will be able to control the disclosure and protection of their content, even when they are no longer part of the social network (because they have deleted or suspended their accounts)

    Protecting Intellectual Proprietary Rights through Secure Interactive Contract Negotiation

    Get PDF
    Protection of Intellectual Proprietary Rights is currently one of the most important barriers to electronic commerce of digital contents over networks. Authors and content providers understand the immense advantages of the digital world but show some reserve. However, technologies and techniques to protect IPR in digital content exist, their deployment in a coherent way is still in an early stage. In this paper, we describe the approach followed by the OCTALIS Project towards and effective electronic commerce of digital images. After describing briefly enabling technologies, the emphasis is on contract negotiation over Internet through a secure dialog between the Service Provider and the User

    Space and Planetary Imaging using JPEG2000

    Get PDF
    The raising demand for Digital content Rights Management (DRM), protection and security, enabling effective on-line access, exchange and trading of all types of digital media items (ranging from a simple text file to a large space or planetary image) and, at the same time, supporting global interoperability of customer devices and traded items, can only be met by a good mix of open architectures and proprietary technologies. In this paper, we present a novel integrated architecture that supports the secure handling of large remote sensing ISO JPEG2000 coded images, obtained from satellite. This effort is within the scope of further developments and new extensions for this standard, namely: - Trans-coding of proprietary digital image formats used in satellite imagery, to the new JPEG2000 format; - Inexpensive network clusters for parallel computing to improve the algorithmic process of coding very large digital images obtained from satellites. - Coding of multi-component and multi-spectral images as well as volumetric images (JP3D); - Exploration of interactive on-line image satellite catalogues (JPIP); - Secure transmission, and protection of the image content based in OpenSDRM (JPSEC)

    IM@GIX - An Electronic Commerce Digital Image Bank

    Get PDF
    This paper describes the usage of specific web application designed for the Electronic Commerce of Digital Still Images using some of the state-of-the-art technologies in the field of digital imaging, namely copy right protection. Still images are not only traded using this platform but also value is added to the images through the means of cataloguing, metadata and watermark insertion. This work is performed using some auxiliary tools, which are also referred in the present paper. This paper also proposes and discusses a methodology for streamlining the production of still digital image content. The methodology proposed and described here, called DIGIPIPE, encompasses several steps which range from the simple image digitalization until the image trading, without omitting the image copy rights protection procedures

    Rights management on knowledge-based digital content

    Get PDF
    The digital networks have facilitated the digital content access and sharing. Although this creates the opportunities to a wider dissemination of information and knowledge, on the other hand it creates challenges on what concerns the protection and enforcement of Intellectual Property (IP). This is particular important on the IP management of digital knowledge-based that is create on a daily basis on educational and research institutions, where a set of researchers and educators contribute with their knowledge creation works to the education value-adding processes. This paper will address the different scenarios/stages where the application of rights management solutions to the protection and management of knowledge-based content can provide an appropriate management of IP. These scenarios will consider the production and protection of the content, the rights establishment for the dissemination of content and the appropriate IP enforcement on the content user-side. This would establish a global environment where knowledge-based content IPR can be governed, allowing authors to establish the conditions that allow others to use their own work

    A New Paradigm for Content Producers

    Get PDF
    WOS:000277653800010 (Nº de Acesso Web of Science)The production, distribution, and consump- tion of information goods have endured numerous challenges over the years. Most recently, the Internet and digital consumer technologies have severely disrupted estab- lished intellectual-property regimes, enabling the near costless reproduction and distribution of information commodities. In addition, so- phisticated tools have enabled new collabora- tive spaces (such as blogs, social websites, and so forth) for media production and distribution, posing new challenges to traditional creator- producer consumer paradigms. This article analyzes the present situation’s main technological characteristics, its eco- nomic implications, and the industry’s response-and outlines a possible solution to the problems

    O Castelo de Porto de Mós: da arqueologia à arquitectura uma visão de complementaridade. O Castelo do século XII a XV

    Get PDF
    Dissertação apresentada para cumprimento dos requisitos necessários à obtenção do grau de Mestre em ArqueologiaO presente trabalho tem como principal objectivo efectuar o estudo do castelo de Porto de Mós, não apenas na sua vertente histórica e arqueológica, mas procurar efectuar um estudo de simbiose entre a informação disponível pela Arquitectura e pela Arqueologia. Efectuámos o estudo do espólio arqueológico cerâmico exumado no interior da fortificação datável dos séculos XII-XIII até ao século XVII, assim como uma análise do remanescente arquitectónico de modo a tentar perceber a evolução da fortificação e dos seus quotidianos até ao período de governo de D. Afonso, IV Conde de Ourém
    • …
    corecore