Margolin et al., 2004 - Google Patents
Analysis of an incentives-based secrets protection systemMargolin et al., 2004
View PDF- Document ID
- 14333687098571743808
- Author
- Margolin N
- Wright M
- Levine B
- Publication year
- Publication venue
- Proceedings of the 4th ACM workshop on Digital rights management
External Links
Snippet
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the content's copyright owner and others. Our protocol, SPIES, allows one party to sell a secret to second …
- 238000004458 analytical method 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11995625B1 (en) | System and method for federated rights management | |
| US7818811B2 (en) | Off-line economies for digital media | |
| Weinberg | Hardware-Based ID, Rights Management, and Trusted Systems | |
| CN111079136B (en) | Fog computing intrusion detection feature sharing system based on block chain technology | |
| KR102323722B1 (en) | Copyright protection system using blockchain | |
| Stubblebine et al. | Unlinkable serial transactions: protocols and applications | |
| Madhusudan et al. | SC2Share: Smart contract for secure car sharing | |
| Huang et al. | Profit sharing for data producer and intermediate parties in data trading over pervasive edge computing environments | |
| Huang et al. | Fair and protected profit sharing for data trading in pervasive edge computing environments | |
| Syverson et al. | Unlinkable serial transactions | |
| Yang et al. | Enhanced digital rights management authentication scheme based on smart card | |
| Catalano et al. | A fair micro-payment scheme for profit sharing in P2P networks | |
| Margolin et al. | Analysis of an incentives-based secrets protection system | |
| Masseport et al. | Proof of usage: User-centric consensus for data provision and exchange | |
| Tan et al. | Some methods to depress the risks of the online transactions | |
| Lemley | Protecting Consumers from Themselves: Alleviating the Market Inequalities Created by Online Copyright Infringement in the Entertainment Industry | |
| US20060100895A1 (en) | Method for providing digital payload data | |
| Christensen | Fighting software piracy in Cyberspace: Legal and technological solutions | |
| Heikkilä et al. | SPKI based solution to anonymous payment and transaction authorization | |
| Della Monica et al. | Public Channel-Based Fair Exchange Protocols with Advertising | |
| Margolin et al. | Economic incentives for protecting digital rights online | |
| Huang et al. | A generic electronic payment model supporting multiple merchant transactions | |
| Margolin et al. | SPIES: Secret protection incentive-based escrow system | |
| Furini et al. | The impact of incentive mechanisms in multi-channel mobile music distribution | |
| Xiang et al. | Analysis of positive incentives for protecting secrets in digital rights management |