[go: up one dir, main page]

Margolin et al., 2004 - Google Patents

Analysis of an incentives-based secrets protection system

Margolin et al., 2004

View PDF
Document ID
14333687098571743808
Author
Margolin N
Wright M
Levine B
Publication year
Publication venue
Proceedings of the 4th ACM workshop on Digital rights management

External Links

Snippet

Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the content's copyright owner and others. Our protocol, SPIES, allows one party to sell a secret to second …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
US11995625B1 (en) System and method for federated rights management
US7818811B2 (en) Off-line economies for digital media
Weinberg Hardware-Based ID, Rights Management, and Trusted Systems
CN111079136B (en) Fog computing intrusion detection feature sharing system based on block chain technology
KR102323722B1 (en) Copyright protection system using blockchain
Stubblebine et al. Unlinkable serial transactions: protocols and applications
Madhusudan et al. SC2Share: Smart contract for secure car sharing
Huang et al. Profit sharing for data producer and intermediate parties in data trading over pervasive edge computing environments
Huang et al. Fair and protected profit sharing for data trading in pervasive edge computing environments
Syverson et al. Unlinkable serial transactions
Yang et al. Enhanced digital rights management authentication scheme based on smart card
Catalano et al. A fair micro-payment scheme for profit sharing in P2P networks
Margolin et al. Analysis of an incentives-based secrets protection system
Masseport et al. Proof of usage: User-centric consensus for data provision and exchange
Tan et al. Some methods to depress the risks of the online transactions
Lemley Protecting Consumers from Themselves: Alleviating the Market Inequalities Created by Online Copyright Infringement in the Entertainment Industry
US20060100895A1 (en) Method for providing digital payload data
Christensen Fighting software piracy in Cyberspace: Legal and technological solutions
Heikkilä et al. SPKI based solution to anonymous payment and transaction authorization
Della Monica et al. Public Channel-Based Fair Exchange Protocols with Advertising
Margolin et al. Economic incentives for protecting digital rights online
Huang et al. A generic electronic payment model supporting multiple merchant transactions
Margolin et al. SPIES: Secret protection incentive-based escrow system
Furini et al. The impact of incentive mechanisms in multi-channel mobile music distribution
Xiang et al. Analysis of positive incentives for protecting secrets in digital rights management