Introduction of a New Non-Repudiation Service to Protect Sensitive Private Data
نویسندگان
چکیده
Current security systems dealing with sensitive private data do not provide sufficient options to find data leaks. An approach to find the last authorized receiver of a protected copy is proposed in this paper. Existing security concepts are extended by a new security service based on reliable tracking data embedding. Additionally, a new mechanism to protect the new tracking data is shown. Digital watermarking techniques are used to provide tracking abilities for forwarded copies of the protected data. This paper briefly describes approaches to improve security for both the owner of protected data and its recipients.
منابع مشابه
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملA Novel Approach For Intranet Mailing For Providing User Authentication
With the explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Various antidotes that are in fact inextricable with security issues are – Cryptography, Authentication, Int...
متن کاملTimed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction
This document introduces Timed Efficient Stream Loss-tolerant Authentication (TESLA). TESLA allows all receivers to check the integrity and authenticate the source of each packet in multicast or broadcast data streams. TESLA requires no trust between receivers, uses low-cost operations per packet at both sender and receiver, can tolerate any level of loss without retransmissions, and requires n...
متن کاملImplementation of Public-Private Partnerships (PPP) in Development of Hospital Service from the Viewpoint of Public and Non-Public Managers in Shiraz
Introduction: Public-Private Partnerships (PPPs) have been constructively considered in recent years to reform health sectors in many countries. The aim of this study was to investigate the viewpoints of Shiraz hospital managers on the implementation of public-private partnership model in providing hospital services. Methods: This descriptive study was conducted in Shiraz in 2016. Hospitals af...
متن کاملA New Advanced User Authentication and Confidentiality Security Service
Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service is implemented which is more secure than conventional network security services. This technique ...
متن کامل