• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 5
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 23
  • 23
  • 8
  • 7
  • 7
  • 6
  • 5
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Characterizing dissemination of illegal copies of content through BitTorrent networks

Schmidt, Adler Hoff January 2013 (has links)
Redes BitTorrent (BT) atualmente representam o método Par-a-Par (P2P) de compartilhamento de arquivos pela Internet mais utilizado. Relatórios de monitoramento recentes revelam que as cópias de conteúdo sendo compartilhadas são, em grande maioria, ilegais e que filmes são os tipos de mídia mais populares. Iniciativas de pesquisa que tentaram entender a dinâmica da produção e do compartilhamento de conteúdo em redes BT não conseguiram prover informações precisas acerca da disseminação de cópias ilegais. No presente trabalho realizamos um extenso estudo experimental para caracterizar o comportamento de produtores, publicadores, provedores e consumidores de arquivos violando direitos autorais. O estudo conduzido é baseado em dados coletados durante sete meses de monitoração de enxames compartilhando filmes por meio de uma das comunidades públicas mais populares de BT. Os dados foram obtidos via emprego de uma arquitetura de monitoração do \universo" BitTorrent, o que permitiu popular uma base com informações acerca de mais de 55.000 torrents, 1.000 rastreadores e 1,9 milhões de IPs. Nossa análise não somente mostra que um pequeno grupo de usuários ativos _e responsável pela maior parte do compartilhamento de cópias ilegais, como desvenda relacionamentos existentes entre esses atores e caracteriza os padrões de consumo respeitados pelos usuários interessados nesse tipo de conteúdo. / BitTorrent (BT) networks are nowadays the most employed method of Peerto- Peer (P2P) le sharing in the Internet. Recent monitoring reports reveal that content copies being shared are mostly illegal and movies are the most popular media type. Research e orts carried out to understand the dynamics of content production and sharing in BT networks have been unable to provide precise information regarding the dissemination of illegal copies. In this work we perform an extensive experimental study in order to characterize the behavior of producers, publishers, providers and consumers of copyright-infringing les. This study is based on seven months of traces obtained by monitoring swarms sharing movies via one of the most popular BT public communities. Traces were obtained with an extension of a BitTorrent \universe" observation architecture, which allowed the collection of a database with information about more than 55,000 torrents, 1,000 trackers and 1.9 million IPs. Our analysis not only shows that a small group of active users is responsible for the majority of disseminated illegal copies, as it unravels existing relationships among these actors and characterizes consuming patterns respected by users interested in this particular set of contents.
12

A Framework for Digital Investigation of Peer-to-Peer (P2P) Networks. An Investigation into the Security Challenges and Vulnerabilities of Peer-to-Peer Networks and the Design of a Standard Validated Digital Forensic Model for Network Investigations

Musa, Ahmad S. January 2022 (has links)
Peer-to-Peer (P2P) Networks have been presenting many fascinating capabilities to the internet since their inception, which has made and is still gathering so much interest. As a result, it is being used in many domains, particularly in transferring a large amount of data, which is essential for modern computing needs. A P2P network contains many independent nodes to form a highly distributed system. These nodes are used to exchange all kinds of files without using a single server as in a Client-Server architecture. Such types of files make the network highly vulnerable to malicious attackers. Nevertheless, P2P systems have become susceptible to different malicious attacks due to their widespread usage, including the threat of sharing malware and other dangerous programs, which can be significantly damaging and harmful. A significant obstacle with the current P2P network traffic monitoring and analysis involves many newly emerging P2P architectures possessing more intricate communication structures and traffic patterns than the traditional client-server architectures. The traffic volume generated by these networks, such as uTorrent, Gnutella, Ares, etc., was once well over half of the total internet traffic. The dynamic use of port numbers, multiple sessions, and other smart features of these applications complicate the characterization of current P2P traffic. Transport-level traffic identification is a preliminary but required step towards traffic characterization, which this thesis addresses. Therefore, a novel detection mechanism that relies on transport-level traffic characterization has been presented for P2P network investigation The importance of the investigation necessitates the formalization of frameworks to leverage the integration of forensics standards and accuracy to provide integrity to P2P networks. We employed the standard Analysis, Design, Development, Implementation, and Evaluation (ADDIE) model to aid a credible digital investigation. We considered the ADDIE model for validation as a standard digital forensic model for P2P network investigations using the United States’ Daubert Standard, the United Kingdom's Forensic Science Regulator Guidance – 218 (FSR-G-218), and Forensic Science Regulator Guidance – 201 (FSR-G-201) methodologies. The solution was evaluated using a realistic P2P investigation and showed accurate load distribution and reliable digital evidence. / Petroleum Technology Development Fund (PTDF) Nigeria
13

Semear à preciso, viver nÃo à preciso: economia do compartilhamento e dispersÃo de sementes digitais atravÃs de redes P2P. / Seeding is necessary, living is not necessary: sharing economy and dispersion of digital seeds through P2P networks

Daniel Costa Valentim 12 May 2017 (has links)
CoordenaÃÃo de AperfeÃoamento de Pessoal de NÃvel Superior / A presente tese versa sobre compartilhamento de arquivos na era da internet. Analisaremos aspectos da socialidade em uma comunidade online especializada na arte do cultivo, semeio, preservaÃÃo e disseminaÃÃo de arquivos digitais (compreendidos enquanto âsementes digitaisâ). As sementes digitais sÃo basicamente qualquer arquivo de computador digitalizado (por exemplo, um filme, uma mÃsica, um livro, um software etc.) que necessita ser semeado virtualmente atà que floresÃa e possa ser compartilhado atravÃs da internet via redes P2P (peer-to-peer). Nesse sentido, esta tese à uma narrativa sobre uma experiÃncia relacional que vivenciamos (de 2008 a 2017) em uma comunidade de âcyberagricultoresâ denominada OÃsis (nome fictÃcio). O OÃsis à uma comunidade fechada que possui cerca de 60 mil membros registrados (atà inÃcio de 2017). Nossa perspectiva metodolÃgica nos levou a seguir linhas errÃticas dos traÃados digitais que compÃem as dinÃmicas singulares que constituem aquilo que denominamos de âeconomia do compartilhamentoâ. Deste modo, tentamos elucidar o movimento das sementes digitais atravÃs dos sensos de moralidades creditados pelos âsemeadores de arquivosâ que frequentam esta comunidade em particular. Com efeito, relatamos nesta tese prÃticas e vivÃncias que compÃem aquilo que identificamos como âÃtica do compartilharâ, espÃcie de âespÃrito do compartilhamentoâ que atua (atravÃs de uma alquimia simbÃlica) na transformaÃÃo de arquivos ou mercadorias digitais em presentes, dÃdivas e honrarias prontas para serem dispersadas atravÃs de redes cooperativas e descentralizadas de compartilhamento. Dito de outro modo, uma semente digital pode ser melhor apresentada sob a forma de uma âcoisa vivaâ, isto Ã, como uma semente de vida carregada de riquezas, dignidades e esperanÃas, exatamente por estabelecer o entendimento de que produÃÃes culturais sÃo artefatos produzidos para serem dispersados livremente como um âbem comumâ. Por fim, ressaltamos de que forma esta cyberecologia se apresenta como um projeto que pretende garantir a implantaÃÃo de uma rede de proteÃÃo de sementes digitais ameaÃadas pelo esquecimento e pelo descaso. / The present thesis deals with file sharing in the age of the Internet. We will analyze aspects of sociality in a file sharing community specialized in the art of cultivating, sowing, preserving of digital files (described as âdigital seedsâ). Digital seeds are basically any digitized computer file (for example, a movie, a song, a book, a software etc.) that needs to be virtually planted until it blooms and can be shared over the internet by P2P (peer-to-peer) networks. In this sense, this thesis is a narrative about a relational experience that we experienced (from 2008 to 2017) in a community of cyber seeders named Oasis (fictitious name). Oasis is a closed community that has about 60,000 registered members (until early 2017). Our methodological perspective led us to follow erratic digital paths that make up the unique dynamic that constitutes what we call "sharing economy". In this way, we try to elucidate the movement of digital seeds through the senses of morality credited by the "file sharers" who particularly attend that community. Indeed, in this thesis we report practices and experiences that make up what we identify as "ethics of sharing", a sort of "spirit of sharing" that acts (through a symbolic alchemy) in the transformation of digital files or goods into gifts and honors ready to be dispersed through cooperative and decentralized sharing networks. In other words, a digital seed can best be presented in the form of a "living thing"; that is, as a seed of life laden with riches, dignities and hopes, exactly for establishing the understanding that cultural productions are artifacts produced to be freely dispersed as a "common good." Finally, we highlight how this cyber ecology presents itself as a project that intends to ensure the implementation of a protection network of digital seeds threatened by forgetfulness and neglect.
14

"Semear à preciso, viver nÃo à preciso": economia do compartilhamento e dispersÃo de sementes digitais atravÃs de redes P2P / Seeding is necessary, living is not necessary: sharing economy and dispersion of digital seeds through P2P networks

Daniel Costa Valentim 12 May 2017 (has links)
CoordenaÃÃo de AperfeÃoamento de Pessoal de NÃvel Superior / A presente tese versa sobre compartilhamento de arquivos na era da internet. Analisaremos aspectos da socialidade em uma comunidade online especializada na arte do cultivo, semeio, preservaÃÃo e disseminaÃÃo de arquivos digitais (compreendidos enquanto âsementes digitaisâ). As sementes digitais sÃo basicamente qualquer arquivo de computador digitalizado (por exemplo, um filme, uma mÃsica, um livro, um software etc.) que necessita ser semeado virtualmente atà que floresÃa e possa ser compartilhado atravÃs da internet via redes P2P (peer-to-peer). Nesse sentido, esta tese à uma narrativa sobre uma experiÃncia relacional que vivenciamos (de 2008 a 2017) em uma comunidade de âcyberagricultoresâ denominada OÃsis (nome fictÃcio). O OÃsis à uma comunidade fechada que possui cerca de 60 mil membros registrados (atà inÃcio de 2017). Nossa perspectiva metodolÃgica nos levou a seguir linhas errÃticas dos traÃados digitais que compÃem as dinÃmicas singulares que constituem aquilo que denominamos de âeconomia do compartilhamentoâ. Deste modo, tentamos elucidar o movimento das sementes digitais atravÃs dos sensos de moralidades creditados pelos âsemeadores de arquivosâ que frequentam esta comunidade em particular. Com efeito, relatamos nesta tese prÃticas e vivÃncias que compÃem aquilo que identificamos como âÃtica do compartilharâ, espÃcie de âespÃrito do compartilhamentoâ que atua (atravÃs de uma alquimia simbÃlica) na transformaÃÃo de arquivos ou mercadorias digitais em presentes, dÃdivas e honrarias prontas para serem dispersadas atravÃs de redes cooperativas e descentralizadas de compartilhamento. Dito de outro modo, uma semente digital pode ser melhor apresentada sob a forma de uma âcoisa vivaâ, isto Ã, como uma semente de vida carregada de riquezas, dignidades e esperanÃas, exatamente por estabelecer o entendimento de que produÃÃes culturais sÃo artefatos produzidos para serem dispersados livremente como um âbem comumâ. Por fim, ressaltamos de que forma esta cyberecologia se apresenta como um projeto que pretende garantir a implantaÃÃo de uma rede de proteÃÃo de sementes digitais ameaÃadas pelo esquecimento e pelo descaso. / The present thesis deals with file sharing in the age of the Internet. We will analyze aspects of sociality in a file sharing community specialized in the art of cultivating, sowing, preserving of digital files (described as âdigital seedsâ). Digital seeds are basically any digitized computer file (for example, a movie, a song, a book, a software etc.) that needs to be virtually planted until it blooms and can be shared over the internet by P2P (peer-to-peer) networks. In this sense, this thesis is a narrative about a relational experience that we experienced (from 2008 to 2017) in a community of cyber seeders named Oasis (fictitious name). Oasis is a closed community that has about 60,000 registered members (until early 2017). Our methodological perspective led us to follow erratic digital paths that make up the unique dynamic that constitutes what we call "sharing economy". In this way, we try to elucidate the movement of digital seeds through the senses of morality credited by the "file sharers" who particularly attend that community. Indeed, in this thesis we report practices and experiences that make up what we identify as "ethics of sharing", a sort of "spirit of sharing" that acts (through a symbolic alchemy) in the transformation of digital files or goods into gifts and honors ready to be dispersed through cooperative and decentralized sharing networks. In other words, a digital seed can best be presented in the form of a "living thing"; that is, as a seed of life laden with riches, dignities and hopes, exactly for establishing the understanding that cultural productions are artifacts produced to be freely dispersed as a "common good." Finally, we highlight how this cyber ecology presents itself as a project that intends to ensure the implementation of a protection network of digital seeds threatened by forgetfulness and neglect.
15

Influence Dynamics on Social Networks

Venkataramanan, Srinivasan January 2014 (has links) (PDF)
With online social networks such as Facebook and Twitter becoming globally popular, there is renewed interest in understanding the structural and dynamical properties of social networks. In this thesis we study several stochastic models arising in the context of the spread of influence or information in social networks. Our objective is to provide compact and accurate quantitative descriptions of the spread processes, to understand the effects of various system parameters, and to design policies for the control of such diffusions. One of the well established models for influence spread in social networks is the threshold model. An individual’s threshold indicates the minimum level of “influence” that must be exerted, by other members of the population engaged in some activity, before the individual will join the activity. We begin with the well-known Linear Threshold (LT) model introduced by Kempe et al. [1]. We analytically characterize the expected influence for a given initial set under the LT model, and provide an equivalent interpretation in terms of acyclic path probabilities in a Markov chain. We derive explicit optimal initial sets for some simple networks and also study the effectiveness of the Pagerank [2] algorithm for the problem of influence maximization. Using insights from our analytical characterization, we then propose a computationally efficient G1-sieving algorithm for influence maximization and show that it performs on par with the greedy algorithm, through experiments on a coauthorship dataset. The Markov chain characterisation gives only limited insights into the dynamics of influence spread and the effects of the various parameters. We next provide such insights in a restricted setting, namely that of a homogeneous version of the LT model but with a general threshold distribution, by taking the fluid limit of a probabilistically scaled version of the spread Markov process. We observe that the threshold distribution features in the fluid limit via its hazard function. We study the effect of various threshold distributions and show that the influence evolution can exhibit qualitatively different behaviors, depending on the threshold distribution, even in a homogeneous setting. We show that under the exponential threshold distribution, the LT model becomes equivalent to the SIR (Susceptible-Infected-Recovered) epidemic model [3]. We also show how our approach is easily amenable to networks with heterogeneous community structures. Hundreds of millions of people today interact with social networks via their mobile devices. If the peer-to-peer radios on such devices are used, then influence spread and information spread can take place opportunistically when pairs of such devices come in proximity. In this context, we develop a framework for content delivery in mobile opportunistic networks with joint evolution of content popularity and availability. We model the evolution of influence and content spread using a multi-layer controlled epidemic model, and, using the monotonicity properties of the o.d.e.s, prove that a time-threshold policy for copying to relay nodes is delay-cost optimal. Information spread occurs seldom in isolation on online social networks. Several contents might spread simultaneously, competing for the common resource of user attention. Hence, we turn our attention to the study of competition between content creators for a common population, across multiple social networks, as a non-cooperative game. We characterize the best response function, and observe that it has a threshold structure. We obtain the Nash equilibria and study the effect of cost parameters on the equilibrium budget allocation by the content creators. Another key aspect to capturing competition between contents, is to understand how a single end-user receives and processes content. Most social networks’ interface involves a timeline, a reverse chronological list of contents displayed to the user, similar to an email inbox. We study competition between content creators for visibility on a social network user’s timeline. We study a non-cooperative game among content creators over timelines of fixed size, show that the equilibrium rate of operation under a symmetric setting, exhibits a non-monotonic behavior with increasing number of players. We then consider timelines of infinite size, along with a behavioral model for user’s scanning behavior, while also accounting for variability in quality (influence weight) among content creators. We obtain integral equations, that capture the evolution of average influence of competing contents on a social network user’s timeline, and study various content competition formulations involving quality and quantity.
16

A Scalable P2P RIA Crawling System with Fault Tolerance

Ben Hafaiedh, Khaled January 2016 (has links)
Rich Internet Applications (RIAs) have been widely used in the web over the last decade as they were found to be responsive and user-friendly compared to traditional web applications. RIAs use client-side scripting such as JavaScript which allows for asynchronous updates on the server-side using AJAX (Asynchronous JavaScript and XML). Due to the large size of RIAs and therefore the long time required for crawling, distributed RIA crawling has been introduced with the aim to decrease the crawling time. However, the current RIA crawling systems are not scalable, i.e. they are limited to a relatively low number of crawlers. Furthermore, they do not allow for fault tolerance in case that a failure occurs in one of their components. In this research, we address the scalability and resilience problems when crawling RIAs in a distributed environment and we explore the possibilities of designing an efficient RIA crawling system that is scalable and fault-tolerant. Our approach is to partition the search space among several storage devices (distributed databases) over a peer-to-peer (P2P) network where each database is responsible for storing only a portion of the RIA graph. This makes the distributed data structure invulnerable to a single point of failure. However, accessing the distributed data required by crawlers makes the crawling task challenging when the number of crawlers becomes high. We show by simulation results and analytical reasoning that our system is scalable and fault-tolerant. Furthermore, simulation results show that the crawling time using the P2P crawling system is significantly faster than the crawling time using both the non-distributed crawling system and the distributed crawling system using a single database.
17

Serviço de resolução e descoberta de informações sobre objetos em sistemas baseados em RFID. / Resolution service and discovery of information about objects in RFID-based systems.

Gogliano Sobrinho, Osvaldo 30 August 2013 (has links)
Apresenta-se o resultado de uma pesquisa destinada a propor um serviço para a resolução e descoberta de informações sobre objetos. Neste contexto, entendem-se como objetos os itens de uma cadeia produtiva e, como prováveis clientes do serviço proposto, sistemas de informação destinados ao gerenciamento de logística junto às cadeias produtivas e/ou à manutenção de dados sobre a rastreabilidade das cadeias. Encontram-se no mercado diversos sistemas de informação com estas características. A conveniência da troca de informações diretas entre os membros das cadeias produtivas, motiva diversos pesquisadores a propor a criação de padrões de dados. Uma das propostas mais relevantes, apresentada pela entidade internacional GS1, envolve a especificação de uma arquitetura para estes sistemas, bem como um vocabulário de dados padronizado, a Rede EPCglobal®. A utilização da tecnologia RFID permite a obtenção automática de dados, quando da passagem dos itens por leitores RFID instalados ao longo da cadeia produtiva. A utilização de um código padronizado, denominado Electronic Product CodeTM (EPC) na gravação das etiquetas RFID é outra vantagem desta tecnologia. Uma das funcionalidades essenciais deste sistema consiste na possibilidade de obtenção de informações relativas a um determinado produto. Estas informações podem se encontrar não somente no produtor do item, mas em todos os membros da cadeia produtiva que tiveram acesso ao item. Esta funcionalidade é o único aspecto da rede EPCglobal® ainda não especificada pelo GS1. Por esta razão, diversos pesquisadores têm-se dedicado à elaboração de propostas. O resultado desta pesquisa é mais uma delas. A solução apresentada baseia-se no uso de redes peer-to-peer (P2P), mais especificamente do protocolo Kademlia, escolhido a partir da comparação entre os vários protocolos propostos na literatura, visando a uma melhor eficácia. A partir de uma simulação efetuada em software especialmente desenvolvido para esta finalidade, apresentam-se os detalhes da sugestão e os resultados obtidos com sua utilização. / This is the result of a survey intended to propose a resolution and discovery service of information about objects. In this context, objects are items of a production chain and, likely customers of the proposed service, are information systems intended for logistics management at the productive chains and/or maintenance of data on traceability of supply chains. This scenario fits perfectly to the paradigm of the Internet of Things, where objects of everyday use have active participation on the Internet. The convenience of direct exchange of information between the members and the supply chains motivates many researchers to propose the creation of data standards. One of the most relevant proposals, presented by the international organization GS1, involves the architecture specification for these systems, as well as a standard data vocabulary, the EPCglobal® Network. The use of RFID technology allows obtaining data, during the passage of items by RFID readers installed along the supply chain. The use of a standardized code in the recording of RFID tags, called the Electronic Product CodeTM (EPC), is another advantage of this technology. One of the essential features of this system is the possibility of obtaining information relating to an individual product. This information can be found not only in item producer, but also in all members of the supply chain that had access to the item. This functionality is the only aspect of EPCglobal® not yet specified by GS1. For this reason, several researchers have been working with new suggestions. The solution presented is another proposal based on the use of an implementation of a peer-to-peer (P2P) network, using the Kademlia Protocol, chosen from the comparison between the several protocols proposed in the literature, aiming at a better effectiveness. From a simulation carried out in software specially developed for this purpose, we present the details of the suggestion and the results obtained with its use.
18

Serviço de resolução e descoberta de informações sobre objetos em sistemas baseados em RFID. / Resolution service and discovery of information about objects in RFID-based systems.

Osvaldo Gogliano Sobrinho 30 August 2013 (has links)
Apresenta-se o resultado de uma pesquisa destinada a propor um serviço para a resolução e descoberta de informações sobre objetos. Neste contexto, entendem-se como objetos os itens de uma cadeia produtiva e, como prováveis clientes do serviço proposto, sistemas de informação destinados ao gerenciamento de logística junto às cadeias produtivas e/ou à manutenção de dados sobre a rastreabilidade das cadeias. Encontram-se no mercado diversos sistemas de informação com estas características. A conveniência da troca de informações diretas entre os membros das cadeias produtivas, motiva diversos pesquisadores a propor a criação de padrões de dados. Uma das propostas mais relevantes, apresentada pela entidade internacional GS1, envolve a especificação de uma arquitetura para estes sistemas, bem como um vocabulário de dados padronizado, a Rede EPCglobal®. A utilização da tecnologia RFID permite a obtenção automática de dados, quando da passagem dos itens por leitores RFID instalados ao longo da cadeia produtiva. A utilização de um código padronizado, denominado Electronic Product CodeTM (EPC) na gravação das etiquetas RFID é outra vantagem desta tecnologia. Uma das funcionalidades essenciais deste sistema consiste na possibilidade de obtenção de informações relativas a um determinado produto. Estas informações podem se encontrar não somente no produtor do item, mas em todos os membros da cadeia produtiva que tiveram acesso ao item. Esta funcionalidade é o único aspecto da rede EPCglobal® ainda não especificada pelo GS1. Por esta razão, diversos pesquisadores têm-se dedicado à elaboração de propostas. O resultado desta pesquisa é mais uma delas. A solução apresentada baseia-se no uso de redes peer-to-peer (P2P), mais especificamente do protocolo Kademlia, escolhido a partir da comparação entre os vários protocolos propostos na literatura, visando a uma melhor eficácia. A partir de uma simulação efetuada em software especialmente desenvolvido para esta finalidade, apresentam-se os detalhes da sugestão e os resultados obtidos com sua utilização. / This is the result of a survey intended to propose a resolution and discovery service of information about objects. In this context, objects are items of a production chain and, likely customers of the proposed service, are information systems intended for logistics management at the productive chains and/or maintenance of data on traceability of supply chains. This scenario fits perfectly to the paradigm of the Internet of Things, where objects of everyday use have active participation on the Internet. The convenience of direct exchange of information between the members and the supply chains motivates many researchers to propose the creation of data standards. One of the most relevant proposals, presented by the international organization GS1, involves the architecture specification for these systems, as well as a standard data vocabulary, the EPCglobal® Network. The use of RFID technology allows obtaining data, during the passage of items by RFID readers installed along the supply chain. The use of a standardized code in the recording of RFID tags, called the Electronic Product CodeTM (EPC), is another advantage of this technology. One of the essential features of this system is the possibility of obtaining information relating to an individual product. This information can be found not only in item producer, but also in all members of the supply chain that had access to the item. This functionality is the only aspect of EPCglobal® not yet specified by GS1. For this reason, several researchers have been working with new suggestions. The solution presented is another proposal based on the use of an implementation of a peer-to-peer (P2P) network, using the Kademlia Protocol, chosen from the comparison between the several protocols proposed in the literature, aiming at a better effectiveness. From a simulation carried out in software specially developed for this purpose, we present the details of the suggestion and the results obtained with its use.
19

Hudební dílo a jeho právní ochrana - aktuální otázky / Piece of music and its legal protection in relation to internet piracy

Jakubíček, Petr January 2009 (has links)
The thesis deals with contemporary author's law which is effective in Czech republic in relation to a piece of music and its legal protection. The goal of first chapters is to outline the crucial statutes concerning subjects as authors, executive artists and recording producers. A great deal of the thesis concerns with internet music piracy which results from a mass file-sharing. It also includes an evalution of current author's law and its efficiency in today's information society.
20

LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I

Homem, Irvin January 2013 (has links)
The Internet in its most basic form is a complex information sharing organism. There are billions of interconnected elements with varying capabilities that work together supporting numerous activities (services) through this information sharing. In recent times, these elements have become portable, mobile, highly computationally capable and more than ever intertwined with human controllers and their activities. They are also rapidly being embedded into other everyday objects and sharing more and more information in order to facilitate automation, signaling that the rise of the Internet of Things is imminent. In every human society there are always miscreants who prefer to drive against the common good and engage in illicit activity. It is no different within the society interconnected by the Internet (The Internet Society). Law enforcement in every society attempts to curb perpetrators of such activities. However, it is immensely difficult when the Internet is the playing field. The amount of information that investigators must sift through is incredibly massive and prosecution timelines stated by law are prohibitively narrow. The main solution towards this Big Data problem is seen to be the automation of the Digital Investigation process. This encompasses the entire process: From the detection of malevolent activity, seizure/collection of evidence, analysis of the evidentiary data collected and finally to the presentation of valid postulates. This paper focuses mainly on the automation of the evidence capture process in an Internet of Things environment. However, in order to comprehensively achieve this, the subsequent and consequent procedures of detection of malevolent activity and analysis of the evidentiary data collected, respectively, are also touched upon. To this effect we propose the Live Evidence Information Aggregator (LEIA) architecture that aims to be a comprehensive automated digital investigation tool. LEIA is in essence a collaborative framework that hinges upon interactivity and sharing of resources and information among participating devices in order to achieve the necessary efficiency in data collection in the event of a security incident. Its ingenuity makes use of a variety of technologies to achieve its goals. This is seen in the use of crowdsourcing among devices in order to achieve more accurate malicious event detection; Hypervisors with inbuilt intrusion detection capabilities to facilitate efficient data capture; Peer to Peer networks to facilitate rapid transfer of evidentiary data to a centralized data store; Cloud Storage to facilitate storage of massive amounts of data; and the Resource Description Framework from Semantic Web Technologies to facilitate the interoperability of data storage formats among the heterogeneous devices. Within the description of the LEIA architecture, a peer to peer protocol based on the Bittorrent protocol is proposed, corresponding data storage and transfer formats are developed, and network security protocols are also taken into consideration. In order to demonstrate the LEIA architecture developed in this study, a small scale prototype with limited capabilities has been built and tested. The prototype functionality focuses only on the secure, remote acquisition of the hard disk of an embedded Linux device over the Internet and its subsequent storage on a cloud infrastructure. The successful implementation of this prototype goes to show that the architecture is feasible and that the automation of the evidence seizure process makes the otherwise arduous process easy and quick to perform.

Page generated in 0.4343 seconds