Secure Books: Protecting the Distribution of Knowledge

نویسندگان

  • Ross J. Anderson
  • Václav Matyás
  • Fabien A. P. Petitcolas
  • Iain E. Buchan
  • Rudolf Hanka
چکیده

We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, drug formularies, and teaching material. An initial attempt, using digital signatures (in line with a recent European standard) and certificates conforming to X.509 has thrown up a number of interesting problems with current approaches to public key infrastructures. While the X.509 philosophy may be suitable for many electronic commerce applications, signatures on which we may have to rely for many years — such as those on books and contracts — appear to require a different approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Your Internet Identity: Are You Naked Online?

In what case do you like reading so much? What about the type of the protecting your internet identity are you naked online book? The needs to read? Well, everybody has their own reason why should read some books. Mostly, it will relate to their necessity to get knowledge from the book and want to read just to get entertainment. Novels, story book, and other entertaining books become so popular...

متن کامل

Investigating the Predominant Levels of Learning Objectives in General English Books

This study investigated nine General English books (five produced by non-native Iranian speakers and four produced by native speakers) in terms of learning objectives in Bloom’s Revised Taxonomy (2001). The aim was to find out which levels of Bloom’s Revised Taxonomy are dominant in the books. So, the contents of the books were codified based on a coding scheme designed by Razmjoo and Kazempurf...

متن کامل

Information Behaviors of Children and Adolescents’ Interaction with Print and Digital Books

Background and Aim: This research is dedicated to assessing information behaviors of children and adolescents’ interaction with print and digital books. To reach this goal, digital books of Iranian virtual library for children and teenagers, have been used as sources of research. The purpose is assessing the influence of participants’ gender, age and graphical effects of books, with their prefe...

متن کامل

Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication

Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. Because of unguarded communication, new security threats emerge. Considering that multimedia will be widely used in various applications over M2M network, it is very urgent to meet new security requirements for multimedia communication. This paper focuses on a joint fingerprinting and encry...

متن کامل

Secure Video-on-Demand Server Project: Requirements and Solutions

When cryptographic techniques are added to advanced network services such as Multimediaon-demand many aspects have to be considered. Especially, when commercial services are being offered, aspects related to secure payments, server fraud protection and client rights have to be studied. The Security Module in SSADE (Secure System for the Access and Efficient Distribution of Multimedia-on-Demand ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997