Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
The thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9. The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems, and theft-protected proprietary certificates.
Crypto '91 was the eleventh in a series of workshops on cryptology sponsoredby the International Association for Cryptologic Research and was held in Santa Barbara, California, in August 1991. This volume contains a full paper or an extended abstract for each of the 39 talks presented at the workshop. All theoretical and practical aspects of cryptology are represented, including: protocol design and analysis, combinatorics and authentication, secret sharing and information theory, cryptanalysis, complexity theory, cryptographic schemas based on number theory, pseudorandomness, applications and implementations, viruses, public-key cryptosystems, and digital signatures.
Modern day security technologies, such as passwords, authentication protocols, firewalls, and access-control mechanisms, are preventive in nature. That is, they stop unauthorized parties before they are able to access data, information and services or violate system policies. However, the dramatically increased scale and complexity of Internet commerce, social networking, remote work, distance learning, and myriad other forms of social, economic, and intellectual engagement online with both strangers and friends has increased the awareness that these preventive mechanisms are inadequate in certain circumstances. The result is a growing interest in accountability mechanisms to complement preventive measures. In this survey of the concept of accountability in information systems, the authors focus on systems in which policy violations are punished; that is, the actors are held accountable for their actions. As there is no accepted definition of the precise meaning of accountability in terms of such systems, the authors provide the reader with a broad overview of the concept. In doing so, they introduce the topic and place it in context of the social and systematic factors which help to define the term. They proceed to discuss in depth the mechanisms and domains across numerous disciplines before describing the available tools and proofs for implementing accountability in systems. Finally, they summarize the ideas, key published papers and ideas for future work. This monograph provides the reader with a thorough overview of the concept of accountability in modern day computing systems. In enables the reader to quickly understand the concept and the progress that has been to date in implementing the tools for the next generation of online security systems.
|
You may like...
|