3 Hits in 6.5 sec

Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme [chapter]

M. Torabi Dashti, S. Krishnan Nair, H. L. Jonker
Lecture Notes in Computer Science  
A finite model of the extended scheme is subsequently model checked and shown to satisfy its design requirements, including secrecy, fairness and resisting content masquerading.  ...  The security requirements of the scheme are formalized and using them as the basis, the scheme is verified.  ...  Formal analysis In this section we describe the steps followed to formally verify that Nuovo DRM achieves its design goals.  ... 
doi:10.1007/978-3-540-75698-9_3 dblp:conf/fsen/DashtiNJ07 fatcat:n6pis6er5nelte3avl2kx6sfsi

Security matters:privacy in voting and fairness in digital exchange [article]

Jonker, HL (Hugo), Mauw, S (Sjouke), Baeten, JCM (Jos), Pang, J (Jun)
We design a new system, Nuovo DRM to address these flaws and provide fair exchange.  ...  Hence, Nuovo DRM provides a secure DRM scheme which encompasses content redistribution.  ...  Nuovo DRM resists content masquerading attacks in S 1 , ensuring that a compliant device only receives the content which it has requested.  ... 
doi:10.6100/ir643467 fatcat:vlcfc6brhvbzji4lwq5tlj43ie

La privacy by design: un'analisi comparata nell'era digitale [article]

Bincoletto Giorgia
security by design.  ...  We propose to use a two-step authentication scheme using a mobile communication device, eg, a smart phone or tablet.  ...  of a product, program or service and (2) Maintaining appropriate management processes and practices throughout the data lifecycle that are designed to ensure that information systems comply with: (A)  ... 
doi:10.15168/11572_177733 fatcat:nf4mt7uyz5asxegdagtrpgg7om