Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
17,093 result(s) for "Digital rights management"
Sort by:
Digital Copyright Management Mechanism Based on Dynamic Encryption for Multiplatform Browsers
In recent years, the internet and smart devices have developed rapidly. Many people no longer rely on newspapers, magazines, or television to receive news. They can see the latest news using computers or mobile phones. According to a study by the Taiwan Internet Information Center, nearly 90% of Taiwanese people have used the internet. Many online streaming services have emerged, and people can easily watch movies and TV programs through computers or mobile phones. Hence, some websites use digital copyright management mechanisms to protect videos from being directly downloaded. However, 30% of websites use AES-128 encryption to protect their content. If the key access mechanism is not well protected, the encryption methodology may be useless. Therefore, this paper proposes a cross-platform digital copyright management mechanism for adaptive streaming. With this mechanism, users do not need to download additional applications, as the mechanism implements Web-Assembly language through the browser.
Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case
PurposeEmployee compliance with information system security policies (ISSPs) has been emphasized as a key factor in protecting information assets against insider threats. Even though previous studies have identified extrinsic factors (in the form of external pressure, rewards and social norms) influencing employee compliance, the functioning of employees' intrinsic motivation has not been clearly analyzed. Thus, the aim of this study is to explore the influence of intrinsic motivations on employees' ISSP compliance.Design/methodology/approachThis study follows a survey approach and conducts structural equation modeling using WarpPLS 5.0 to test the research model and hypotheses. The survey respondents are users of an enterprise digital rights management (EDRM) system.FindingsThe analysis results demonstrate that work impediments, perceived responsibility and self-efficacy significantly influence the intention to comply with ISSP. Additionally, autonomy significantly affects self-efficacy and perceived responsibility. Furthermore, autonomy plays a moderating role in the relationship between work impediment and ISSP compliance intentions.Originality/valueThis study initiatively explores the effect of intrinsic motivations on ISSP compliance intention of employees for a specific information security system (i.e. the EDRM system). This study clarifies the enabling role of intrinsic motivations in ISSP compliance and helps organizations to understand that employee's self-motivated intention, i.e. autonomy, is an essential factor that achieves a higher level of ISSP compliance in the workplace.
A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System
NBA (National Basketball Association) trading cards are a hot collector’s item, with sales increasing rapidly every year. However, with the popularity of online trading, some sellers have started to intentionally and unintentionally sell imitation trading cards, and even PwC (Pricewaterhouse Coopers) is not immune. However, the PSA (Professional Sports Authenticator), which is the authentication agency, is not liable for this. Faced with the above situation, we moved trading cards online and proposed a blockchain-based anti-counterfeit and traceable NBA digital trading card management system, using blockchain technology to protect digital trading cards, and special digital copyright, to move from relying on other regulators to achieve the fight against counterfeit cards and maintain the security of the digital trading card market. Finally, we analyzed the security of the system and compared it with other methods. Our system uses Hyperledger Fabric to share data while protecting corporate privacy. Proxy re-encryption enables secure and trusted access authorization for digital transaction cards. Asymmetric encryption protects the data and uses signatures to achieve traceability and non-repudiation. Overall, our system solves the problem of counterfeiting and traceability that can occur in the digital trading card process from production to purchase.
Digital rights management
In a world of users that routinely click “I Agree” buttons, librarians may be the lone voice raising an alert to the privacy, use, and ownership issues arising in connection with the design and implementation of digital rights management (DRM) technologies. DRM reflects the efforts of copyright owners to prevent the illegal distribution of copyrighted material – an admirable goal on its face. A common misunderstanding is that DRM is copyright law. It is not. Rather it is a method of preventing copyright infringement however, if unchecked, DRM has the potential to violate privacy, limit ownership rights, and undermine the delicate balance of rights and policies established by our current system of copyright. All three of these arenas are critical for both librarians and their users. Reflecting the shift from ownership to access, libraries are increasingly providing access to rights-protected digital content. Libraries strive to provide access to rights-protected content in a manner that protects both the content creator and the privacy of the user. DRM encompasses a variety of technologies and strategies utilized by content owners and managers to limit access to and the use of rights-protected content. Librarians need to understand DRM to effectively enable users to access and use rights-protected digital content while at the same time protecting the privacy of the user. Designed to address the practical operational and planning issues related to DRM, this guide explores the critical issues and challenges faced by librarians. After reading it, librarians will better understand: •the digital content rights protection scheme •the various DRM technologies and how they are used •how to use authentication and authorization standards, strategies, and technologies and, •the privacy and security issues related to DRM. Edited by two librarians who also hold law degrees, this is a best practices guide for front-line librarians on how to best respond to the impact of DRM schemes on collection development, staffing, budget, service, and other library concerns.
A construction of post quantum secure authenticated key agreement design for mobile digital rights management system
The quantum computing being a threat motivates us to design a post quantum secure authentication protocol for mobile digital rights management system. In current, a post quantum secure protocol “learning with error based secure mobile digital rights management system” has been proposed. The protocol has been claimed to post quantum secure under the ring learning with errors assumption. We have analyzed that this protocol allows the server to keep a fixed private/public key that causes less communication and computation overheads. But, this leads to signal leakage/modified signal leakage attacks. In this paper, we have discussed signal leakage attacks during the authentication phase of the existing protocol. We have proposed a new post quantum authenticated key agreement protocol for the digital rights management system. In the proposed protocol, the server uses a random value instead of using fixed value chosen by the user, and it establishes a session key with the user. Moreover, this protocol needs to exchange just two messages that confirm the efficiency. The protocol has been proved secure in a random oracle model under ring learning with errors assumption. Moreover, the article contains an informal security discussion and a simulation using NS3 simulator.
Information Doesn't Want to Be Free
“Filled with wisdom and thought experiments and things that will mess with your mind.\" — Neil Gaiman, author of The Graveyard Book and American Gods In sharply argued, fast-moving chapters, Cory Doctorow's Information Doesn't Want to Be Free takes on the state of copyright and creative success in the digital age. Can small artists still thrive in the Internet era? Can giant record labels avoid alienating their audiences? This is a book about the pitfalls and the opportunities that creative industries (and individuals) are confronting today — about how the old models have failed or found new footing, and about what might soon replace them. An essential read for anyone with a stake in the future of the arts, Information Doesn't Want to Be Free offers a vivid guide to the ways creativity and the Internet interact today, and to what might be coming next. This book is DRM-free.
A new blockchain-based trusted DRM scheme for built-in content protection
With the development of Internet technology, transmitting, editing and misusing the digital multimedia bring great challenges in misusing detection for multimedia content protection. In this paper we proposed an artwork image digital rights management scheme for Internet misusing detection based on watermark and blockchain with robustness and high-level security. We embed artwork right information such as author, RightHolder, Date and Location information into the artwork image data. In the scheme, we use image Arnold transform to enhance the security and use image DCT coefficients of middle frequency to embed watermark for robustness. In the transparence of watermark, HVS and Watson models are used to control the watermark strength, which can enhance the invisibility. Once the suspicious image data from Internet are misused and spreading the image data on Internet without authorization, especially the high value artwork image data, we can trace the misuse responsibility by extracting the watermark. And according to the above algorithm, we implemented the scheme as DRMChain based on the consortium blockchain which stored the artwork and DRM information in an un-tampered ledger for decentralized rights confirmation. Large amount of experiments indicate the proposed watermark-based trusted blockchain DRM scheme is secure, robust, and for the protection and misuse detection of image data.
A lightweight three-factor authentication protocol for digital rights management system
Recent advances in communication technology and low-power devices have led digital-content services to be provided in various resource limited environments such as smart home, Internet of Things, and the Vehicle-to-Everything. However, digital content is easily replicated and distributed through open channels. Authentication is therefore becoming increasingly important for digital rights management (DRM) systems to provide secure services to authorized users. In 2018, Lee et al. proposed a biometric-based authentication scheme for DRM systems. We here demonstrate that Lee et al.’s scheme is vulnerable to mobile device theft and user impersonation attacks and does not allow secure mutual authentication. We propose an alternative secure three-factor authentication protocol for DRM systems to overcome these security shortcomings. Using formal/informal security analysis and a BAN logic analysis, we also show that our protocol protects against various types of attacks and allows secure mutual authentication. Furthermore, we demonstrate that the proposed protocol is secure against replay attacks and man-in-the-middle attacks using the formal verification simulation tool AVISPA. The proposed protocol is therefore applicable to resource-limited environments.
An authenticated access control framework for digital right management system
With the growing development in digital content distribution, researchers focus on the construction of an access right enabled digital content distribution framework for the legal user. Digital rights management (DRM) is the system which tries to ensure authorized content distribution. Current, DRM systems either provide authentication or constrain access right, but access control with legal authentication in the digital content distribution has remained a challenging issue for public-key cryptography (PKC) or identity-based public-key cryptography (ID-PKC). PKC associates certificate management, which includes revocation, storage, distribution and verification of certificates. As a result, certificate authority becomes the bottleneck in a large network. On the other hand, ID-PKC has the drawback of key escrow. For secure and authorized content distribution, evacuation from these problems is needed. In this paper, we present an authenticated access control protocol, which maintains user’s right with authorized content distribution for the digital right management system. Its security has been proved in the random oracle model. An analysis of performance shows enhancement in efficiency, which indicates that the proposed scheme presents a secure and authorized access control mechanisms for resource-constrained devices.
Authorization Mechanism Based on Blockchain Technology for Protecting Museum-Digital Property Rights
In addition to the exhibition, collection, research, and educational functions of the museum, the development of a future museum includes the trend of leisure and sightseeing. Although the museum is a non-profit organization, if it can provide digital exhibits and collections under the premises of “intellectual property rights” and “cultural assets protection”, and licensing and adding value in various fields, it can generate revenue from digital licensing and handle the expenses of museum operations. This will be a new trend in the sustainable development of museum operations. Especially since the outbreak of COVID-19 at the beginning of this year (2020), the American Alliance of Museums (AAM) recently stated that nearly a third of the museums in the United States may be permanently closed since museum operations are facing “extreme financial difficulties.” This research is aimed at museums using the business model of “digital authorization”. It proposes an authorization mechanism based on blockchain technology protecting the museums’ digital rights in the business model and the application of cryptography. The signature and time stamp mechanism achieve non-repudiation and timeless mechanism, which combines blockchain and smart contracts to achieve verifiability, un-forgery, decentralization, and traceability, as well as the non-repudiation of the issue of cash flow with signatures and digital certificates, for the digital rights of museums in business. The business model proposes achievable sustainable development. Museums not only achieve the goal of promoting social education, but also solve their financial problems.