Mishra et al., 2021 - Google Patents
A provably secure content distribution framework for portable DRM systemsMishra et al., 2021
- Document ID
- 10596565238276927646
- Author
- Mishra D
- Rana S
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
The growing demand for digital content using smart devices has taken the attenuation towards the enforcement of rights in digital content distribution. Digital rights management (DRM) systems support copyrights and try to control the access of digital content in a user …
- 238000004458 analytical method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mishra et al. | A provably secure content distribution framework for portable DRM systems | |
Zhang et al. | Blockchain-based privacy preserving e-health system for healthcare data in cloud | |
Zhu et al. | Digital asset management with distributed permission over blockchain and attribute-based access control | |
US9032497B2 (en) | System and method for securing embedded media | |
US10554634B2 (en) | Techniques for shared private data objects in a trusted execution environment | |
CN108462689B (en) | Techniques for remote SGX enclave authentication | |
US20200067694A1 (en) | Techniques for key provisioning in a trusted execution environment | |
TW201830280A (en) | Trusted login method, server, and system | |
GB2581913A (en) | Access control in microservice architectures | |
CN110176987A (en) | A kind of method, apparatus, equipment and the computer storage medium of equipment certification | |
GB2473566A (en) | Systems and method for data security | |
WO2010011919A3 (en) | Http authentication and authorization management | |
PH12014502304B1 (en) | Abstracted and randomized one-time passwords for transactional authentication | |
CN104995634A (en) | Key refresh between trusted units | |
JP2013511103A5 (en) | ||
WO2015116998A3 (en) | Electronic transfer and obligation enforcement system | |
US20150113276A1 (en) | Distributing Keys for Decrypting Client Data | |
CN103366135A (en) | Tenant driven security system and method in a storage cloud | |
CN108234451A (en) | Electric power intranet and extranet request forwarding Proxy Method and computer readable storage medium | |
CN105812350A (en) | Cross-platform single-point registration system | |
CN105100248A (en) | Cloud storage security realization method based on data encryption and access control | |
CN111245861A (en) | Power data storage and sharing method | |
CN104463584A (en) | Method for achieving mobile terminal App safety payment | |
CN103188208A (en) | Authority control method and authority control system of webpage access, and call center | |
KR20150116537A (en) | Method for user authentication in virtual private cloud system and apparatus for providing virtual private cloud service |