A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
A finite model of the extended scheme is subsequently model checked and shown to satisfy its design requirements, including secrecy, fairness and resisting content masquerading. ... The security requirements of the scheme are formalized and using them as the basis, the scheme is verified. ... Formal analysis In this section we describe the steps followed to formally verify that Nuovo DRM achieves its design goals. ...doi:10.1007/978-3-540-75698-9_3 dblp:conf/fsen/DashtiNJ07 fatcat:n6pis6er5nelte3avl2kx6sfsi
We design a new system, Nuovo DRM to address these flaws and provide fair exchange. ... Hence, Nuovo DRM provides a secure DRM scheme which encompasses content redistribution. ... Nuovo DRM resists content masquerading attacks in S 1 , ensuring that a compliant device only receives the content which it has requested. ...doi:10.6100/ir643467 fatcat:vlcfc6brhvbzji4lwq5tlj43ie
security by design. ... We propose to use a two-step authentication scheme using a mobile communication device, eg, a smart phone or tablet. ... of a product, program or service and (2) Maintaining appropriate management processes and practices throughout the data lifecycle that are designed to ensure that information systems comply with: (A) ...doi:10.15168/11572_177733 fatcat:nf4mt7uyz5asxegdagtrpgg7om