• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 26
  • 18
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 68
  • 68
  • 60
  • 21
  • 20
  • 12
  • 10
  • 9
  • 9
  • 9
  • 9
  • 7
  • 7
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Αξιολόγηση της υφιστάμενης κατάστασης και υλοποίηση συστήματος διαχείρισης ψηφιακών δικαιωμάτων (DRMS), με ένα σύστημα διαχείρισης περιεχομένου και τεχνολογίες ανοικτού κώδικα

Καπαρού, Αριστέα 24 October 2008 (has links)
Mελετάται το ζήτημα της διαχείρισης και προστασίας των Πνευματικών Δικαιωμάτων στον ψηφιακό κόσμο. Συγκεκριμένα, προτείνονται τα Συστήματα Ψηφιακής Διαχείρισης Δικαιωμάτων (DRM), ως μέσα προστασίας της νομοθετικής κατοχύρωσης των πνευματικών δικαιωμάτων (copyright) και υποστήριξης της διανομής του ψηφιακού περιεχομένου μέσω των δικτύων και του διαδικτύου, για την αποφυγή περιπτώσεων παραβίασης του νόμου της Πνευματικής Ιδιοκτησίας. Yλοποιήθηκε ένα πληροφοριακό σύστημα που ικανοποιεί τις λειτουργικές και τις τεχνικές προδιαγραφές των οντοτήτων που εμπλέκονται στο ζήτημα της διαχείρισης και της προστασίας των πνευματικών δικαιωμάτων. Η υλοποίηση του συστήματος έγινε με χρήση ανοικτών τεχνολογιών και ενός συστήματος διαχείρισης περιεχομένου (Drupal), ακολουθώντας διεθνή πρότυπα και πληρώντας κριτήρια ποιότητας και ευχρηστίας. / The issue of Management and Protection of Intellectual Rights is analysed in this project. Especially, Digital Rights Management Systems (DRMS)proposed as a way of legal protection of the copyright and support of the distribution of digital content throughout the internet, in order to avoid the infringement of the Intellectual Property Law. A system which satisfy the functional and technological requirements of the ontologies that include in the management and protection of the intellectual rights is implemented. Open technologies, international prototypes and a content management system (Drupal), are used for the implementation of a system of high quality and usability.
42

Copyright law in the digital environment: DRM systems, anti-circumvention, legislation and user rights

Latter, Gareth Paul January 2012 (has links)
This thesis deals with the way in which copyright law is changing in the digital environment and the mechanisms which are facilitating this change. It deals with these issues by analysing the mechanisms of this change, specifically Digital Rights Management (DRM)Systems and anti-circumvention legislation, and the impact which this change is having on the rights of copyright users. The purpose of copyright is to provide an incentive to authors to continue creating while simultaneously providing a public good in allowing the public to use those creations in certain ways. Copyright achieves this purpose by granting both the author and user certain rights. The author is given a limited monopoly over their work in exchange for allowing this work to enter the public sphere and ensuring that users of that work can utilise that work in certain limited ways. The success of copyright thus rests on maintaining the balance between the rights of these parties. The rise of digital technology has created a situation in which copyright content can be easily copied by any party with a Personal Computer and disseminated around the globe instantly via the Internet. In response to these dangers, copyright owners are making use of DRM systems to protect content. DRM systems include various measures of control within its scope. Theses systems allow for copyright owners to control both access and use of content by copyright users. DRM Systems are not foolproof measures of protection however. Technologically sophisticated users are able to circumvent these protection measures. Thus, in order to protect DRM Systems from circumvention, anti-circumvention legislation has been proposed through international treaties and adopted in many countries. The combined effect of these protection measures are open to abuse by copyright owners and serve to curtail the limited rights of copyright users. The end result of this is that the balance which copyright law was created to maintain is disrupted and copyright law no longer fulfils its purpose. This thesis undertakes an analysis of these issues with reference to how these issues affect copyright users in developing countries. This is done with particular reference to possible approaches to this issue in South Africa as South Africa is a signatory to these anti-circumvention treaties.
43

Analýza současných přístupů k DRM u elektronických knih a návrh alternativního přístupu k DRM / Analysis of the present approaches to DRM for electronic books and design of an alternative approach

Kolář, Martin January 2014 (has links)
This thesis deals with problems associated with the distribution of the electronic books. Those problems are mainly caused by the use of the digital rights management technologies and techniques. In the thesis those technologies and techniques are further explored as there are several stakeholder groups identified who are affected by them. It also explores ethical aspects of using those technologies and techniques and those aspects are then used as one of the starting points of the design of an alternative approach to the digital rights management. This approach is the primary objective of this thesis.
44

“Why you mad?” - User and media perception on game design anti-piracy measures

Raileanu, Petrut January 2020 (has links)
Video game developers have implemented multiple measures to combat piracy throughout history. One of these measures, defined in this study as in-game anti-piracy measures, prevents player progression on unauthorized copies by degrading gameplay or drastically increasing the difficulty.This study conducts a content analysis research on textual data gathered from the world wide web to assess the public perception in regards to this type of anti-piracy measures. The data gathered for this study consists of 425 statements in the form of comments and forum posts that have been coded, divided into themes and then analyzed inductively to generate findings that can be linked to Moshirnia’s (2012) previous research.Even though no clear results occurred that can confirm Moshirnia’s (2012) findings, this study has discovered a potential connection between in-game anti-piracy measures promoting piracy. The findings also suggest that the unique “broke features” might lead to the popularization of games modded to let legitimate users experience them too.
45

Best Practices in Digital Asset Management for Electronic Texts in Academic Research Libraries

Cleland, William A. 28 June 2007 (has links)
No description available.
46

Going digital? : The work processes with e-books at academic libraries in Sweden

Kunzmann, Bert January 2024 (has links)
Research regarding e-book management at academic libraries is scarce, especially referring to Swedish university libraries. The work with e-books regarding selection, acquisition, promotion etc. can give insight into the stance towards e-books and their use at Swedish academic libraries. Challenges and problems such as accessibility, licensing as well as DRM restrictions may hinder e-books from becoming worthy complements to printed books. This thesis gives more insight into the acquisition, work and distribution and general working processes with e-books at Swedish academic libraries. A total of eight Swedish university libraries with 13 representatives agreed to participate in semi-structured interviews. The main results are that selection and acquisition of e-books are both influenced by librarians themselves and by user demand, and that e-books are frequently used and sometimes even favored over print books. Complex licensing and DRM restrictions may lead to e-books not being fully appreciated, which is further complicated due to a lack of promotion of e-books by academic libraries. Academic e-books are offered in English due to a lack of Swedish titles. In some situations, print books are acquired, e.g. if electronic titles are not available or too expensive. Both formats have advantages and disadvantages regarding access, availability, usage and preference. While print books are cheaper and offer a tactile experience, e-books can be read by multiple users simultaneously and do not require storage space in contrast to print books.
47

Telemetry Post-Processing in the Clouds: A Data Security Challenge

Kalibjian, J. R. 10 1900 (has links)
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada / As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
48

Systematic Evaluations Of Security Mechanism Deployments

Sze Yiu Chau (7038539) 13 August 2019 (has links)
<div>In a potentially hostile networked environment, a large diversity of security mechanisms with varying degree of sophistication are being deployed to protect valuable computer systems and digital assets. </div><div><br></div><div>While many competing implementations of similar security mechanisms are available in the current software development landscape, the robustness and reliability of such implementations are often overlooked, resulting in exploitable flaws in system deployments. In this dissertation, we systematically evaluate implementations of security mechanisms that are deployed in the wild. First, we examine how content distribution applications on the Android platform control access to their multimedia contents. With respect to a well-defined hierarchy of adversarial capabilities and attack surfaces, we find that many content distribution applications, including that of some world-renowned publications and streaming services, are vulnerable to content extraction due to the use of unjustified assumptions in their security mechanism designs and implementations. Second, we investigate the validation logic of X.509 certificate chains as implemented in various open-source TLS libraries. X.509 certificates are widely used in TLS as a means to achieve authentication. A validation logic that is overly restrictive could lead to the loss of legitimate services, while an overly permissive implementation could open door to impersonation attacks. Instead of manual analysis and unguided fuzzing, we propose a principled approach that leverages symbolic execution to achieve better coverage and uncover logical flaws that are buried deep in the code. We find that many TLS libraries deviate from the specification. Finally, we study the verification of RSA signatures, as specified in the PKCS#1 v1.5 standard, which is widely used in many security-critical network protocols. We propose an approach to automatically generate meaningful concolic test cases for this particular problem, and design and implement a provenance tracking mechanism to assist root-cause analysis in general. Our investigation revealed that several crypto and IPSec implementations are susceptible to new variants of the Bleichenbacher low-exponent signature forgery.</div>
49

在網路上建構以SWRL為主的數位版權管理規範及應用 / Building SWRL-Based Digital Rights Management Policy and Application on the Web

陳進棋, Chen,Chin-Chi Unknown Date (has links)
本研究是探討如何運用語意網規則語言(Semantic Web Rule Language, SWRL)來表示網路上的數位版權管理(DRM)。以XML為主的版權表達語言(Rights Expression Language, REL)因為無法處理具有語意內涵層級的版權管理規則,所以在概念表達和處理能力上有所限制。因此,我們運用了結合本體論(Ontology)和規則(Rule)語言的SWRL來探討比較現有XML為主的版權表達語言的不足,並以實作驗證本體論和規則結合所具有語意特性,讓使用者能在網路上加以應用數位內容。 / In this research, we show how to use Semantic Web Rule language (Semantic Web Rule Language, SWRL) for the digit rights management (DRM) on the Web. Since XML-based Rights Expression Languages (REL) can not deal with the right management policies at the semantic level, their expression abilities for concept descriptions are limited. Therefore, we use SWLR to contrast the insufficiencies in existing XML-based RELs. In summary, we take advantage of semantic-supported REL for DRM systems on the Web.
50

Administration of Access Rights in Web Applications

Worm, Stefan 28 October 2005 (has links) (PDF)
This work deals with the problem to find and rate a solution how to administrate access rights in web based applications that are flexible and offer a fine-grained allocation of rights. In particular the program phpGACL is analyzed and integrated into an example application to prove the feasibility of this system in principle. / Diese Arbeit beschäftigt sich mit der Lösungsfindung und -bewertung des Problems, Zugriffsrechte webbasierter Anwendungen flexibel zu administrieren und eine möglichst feinkörnige Rechtevergabe zu erlauben. Insbesondere das Programm phpGACL wird analysiert und in eine Beispielanwendung integriert um die prinzipielle Realisierbarkeit des System zu überprüfen.

Page generated in 0.0509 seconds