31 |
An ontology based approach for managing and maintaining privacy in information systemsAbou-Tair, Dhiah e-Diehn I. January 2008 (has links)
Zugl.: Siegen, Univ., Diss., 2008
|
32 |
Nachfrageorientierte Preissetzung für Musikdownloads unter besonderer Berücksichtigung des Einsatzes von Digital Rights ManagementStrube, Jochen January 2008 (has links)
Zugl.: Darmstadt, Techn. Univ., Diss., 2008
|
33 |
Trusted Computing & Digital Rights Management : Theory & EffectsGustafsson, Daniel, Stewén, Tomas January 2004 (has links)
Trusted Computing Platform Alliance (TCPA), now known as Trusted Computing Group (TCG), is a trusted computing initiative created by IBM, Microsoft, HP, Compaq, Intel and several other smaller companies. Their goal is to create a secure trusted platform with help of new hardware and software. TCG have developed a new chip, the Trusted Platform Module (TPM) that is the core of this initiative, which is attached to the motherboard. An analysis is made on the TCG’s specifications and a summary is written of the different parts and functionalities implemented by this group. Microsoft is in the development stage for an operating system that can make use of TCG’s TPM and other new hardware. This initiative of the operating system is called NGSCB (Next Generation Secure Computing Base) former known as Palladium. This implementation makes use of TCG’s main functionalities with a few additions. An analysis is made on Microsoft’s NGSCB specifications and a summary is written of how this operating system will work. NGSCB is expected in Microsoft’s next operating system Longhorn version 2 that will have its release no sooner than 2006. Intel has developed hardware needed for a trusted platform and has come up with a template on how operating system developers should implement their OS to make use of this hardware. TCG’s TPM are also a part of the system. This system is called LaGrande. An analysis is also made on this trusted computing initiative and a sum up of it is written. This initiative is very similar to NGSCB, but Microsoft and Intel are not willing to comment on that. DRM (Digital Rights Management) is a technology that protects digital content (audio, video, documents, e-books etc) with rights. A DRM system is a system that manages the rights connected to the content and provides security for those by encryption. First, Microsoft’s RMS (Rights Management System) that controls the rights of documents within a company is considered. Second, a general digital media DRM system is considered that handles e-commerce for digital content. Analysis and discussion are made on what effects TC (Trusted Computing) and DRM could result in for home users, companies and suppliers of TC hardware and software. The different questions stated in the problemformulation is also discussed and considered. There are good and bad effects for every group but if TC will work as stated today, then the pros will outweigh the cons. The same goes for DRM on a TC platform. Since the benefits outweights the drawbacks, we think that TC should be fullfilled and taken into production. TC and DRM provides a good base of security and it is then up to the developers to use this in a good and responsible way.
|
34 |
Digital Rights Management, Evaluation of existing systems. / Digital Rights Management, Utvärdering av existerande systemBurström, Anders, Callander, Jonas January 2004 (has links)
The aim of this report is to examine if existing Digital Rights Management systems are useful and satisfying to the consumer, copyright owner and distributor. If not, is it possible to design a useful and satisfying Digital Rights Management system? During the past few years, copyright owners of music, movies and other media have seen how piracy has increased with the introduction of affordable broadband technology. Record and movie corporations have pushed for a solution to piracy and one of them is Digital Rights Management. They want their customers to pay for and then enjoy the digital media but at the same time protect the rights of the copyright owner. That is what Digital Rights Management is all about; protect the copyright owner while allowing the consumer to enjoy their digital media. Digital Rights Management can restrict the users rights to copy and transfer the contents to other devices as well as restrict the number of times a user is allowed to use the media. The present DRM systems are focusing on preventing digital media from being freely distributed by limiting the ability to copy or move the media. This puts limitations on fair use such as making personal copies of music. Copyright owners and distributors want more consumers to discover DRM, but so far, the consumers have shown little interest. This report is based on various resources on the Internet such as white papers on Digital Rights Management, our own experimentation and on Microsoft Media Rights Management SDK documentation. We do not believe it is possible to design a DRM system that consumers, copyright owners and distributors are satisfied with. It is not possible to combine the demands of copyright owners and the consumers’ claims of fair use.
|
35 |
Digital Watermarking of Images towards Content Protection.Nasir, Ibrahim A. January 2010 (has links)
With the rapid growth of the internet and digital media techniques over the last decade, multimedia data such as images, video and audio can easily be copied, altered and distributed over the internet without any loss in quality. Therefore, protection of ownership of multimedia data has become a very significant and challenging issue. Three novel image watermarking algorithms have been designed and implemented for copyright protection. The first proposed algorithm is based on embedding multiple watermarks in the blue channel of colour images to achieve more robustness against attacks. The second proposed algorithm aims to achieve better trade-offs between imperceptibility and robustness requirements of a digital watermarking system. It embeds a watermark in adaptive manner via classification of DCT blocks with three levels: smooth, edges and texture, implemented in the DCT domain by analyzing the values of AC coefficients. The third algorithm aims to achieve robustness against geometric attacks, which can desynchronize the location of the watermark and hence cause incorrect watermark detection. It uses geometrically invariant feature points and image normalization to overcome the problem of synchronization errors caused by geometric attacks.
Experimental results show that the proposed algorithms are robust and outperform related techniques found in literature.
|
36 |
Rights Expression Languages in Libraries : Development of an Application Profile / Förvaltning av digitala rättigheter på bibliotek : Utvecklingen av en tillämpningsprofilHohmann, André January 2016 (has links)
The goal of the thesis is the development of an exemplary application profile for one institution guiding the use of Rights Expression Languages (REL) to include the rights information of digital documents in the metadata. Cultural heritage institutions face many challenges with regard to the growing number of digital documents. One challenge is the effective and efficient management, administration and presentation or publication of the documents according to their inherent rights. A basic issue is the inclusion of the rights information in the metadata file of the digital documents to enable automated administration of the documents. The application profile is supposed to show the REL’s potential for solving the challenge. Whether RELs can be applied practically in the cultural heritage sector is not in the scope of the thesis and must be examined in a large scale study. As applied research, the thesis does not follow a strict quantitative or qualitative research method but gathers, examines and evaluates data to develop an application profile. Due to the focus on technical issues, it aims at developers and not at end users. To reach the thesis’ goal, RELs are located in the area of digital rights. Four RELs are examined basi-cally by literature analysis. In addition, various representative licenses from one library are chosen which are “translated” into the most appro-priate REL. The findings flow into a prototype application profile which is evaluated in one iteration step by experts according to heuristic evaluation to identify technical and conceptual flaws. Based on the identified flaws, the prototype is revised. Finally, the exemplary application profile for the METS metadata schema is presented and recommendations for further elaborated appli-cation profiles are given.
|
37 |
Die urheberrechtliche Pauschal- und Individualvergütung für Privatkopien im Lichte technischer Schutzmassnahmen unter besonderer Berücksichtigung der Verwertungsgesellschaften /Wiesemann, Hans Peter. January 2007 (has links)
Zugl.: Münster, Universiẗat, Diss., 2007.
|
38 |
Συγκριτική μελέτη και εφαρμογή της DRM τεχνολογίας στα P2P συστήματα διανομής δεδομένωνΤσιλιχρήστου, Ευανθία 19 January 2010 (has links)
Η ανοδική πορεία των Ρ2Ρ δικτύων ήταν το αναπόφευκτο συνεπακόλουθο της ραγδαίας ανάπτυξης του διαδικτύου. Δυστυχώς, τα Ρ2Ρ δίκτυα εξελίχθησαν από χρήσιμα εργαλεία για την εύκολη και γρήγορη διαμοίραση της πληροφορίας, σε δίκτυα που επιτρέπουν τη μη εξουσιοδοτημένη διακίνηση των παράνομων αντιγραφών της πνευματικής ιδιοκτησίας. Για το λόγο αυτό, οι κάτοχοι της πνευματικής ιδιοκτησίας, χρησιμοποιούν ως αμυντικό τους όπλο, για την προστασία τους από τις παραβιάσεις στο copyright της πνευματικής τους ιδιοκτησίας, τις DRM τεχνολογίες, έτσι ώστε να κατορθώνεται ο έλεγχος στη διανομή της πνευματικής ιδιοκτησίας για να μην πέφτει το περιεχόμενο τους σε λάθος χέρια.
Οι οπαδοί των Ρ2Ρ δικτύων εμφανίζονται να μην συμφωνούν με την εφαρμογή της DRM τεχνολογίας, η οποία τεχνολογία υποστηρίζει τους κατόχους της πνευματικής ιδιοκτησίας. Τα Ρ2Ρ δίκτυα προσφέρουν πολλές δυνατότητες στους χρήστες, καθώς και στους άλλους συμμετέχοντες στα επιχειρηματικά μοντέλα διανομής περιεχομένου. Για τους λόγους αυτούς, η μελλοντική ύπαρξη των Ρ2Ρ δικτύων θεωρείτε δεδομένη. Επομένως, η ενοποίηση της DRM τεχνολογίας με τις Ρ2Ρ αρχιτεκτονικές είναι αναπόφευκτή, επειδή οι κάτοχοι της πνευματικής ιδιοκτησίας προσπαθούν να διατηρούν τις ισορροπίες, ώστε να συνδυάζουν τη διατήρηση του ελέγχου της πνευματικής ιδιοκτησίας που τους ανήκει, με τη λειτουργικότητα που επιθυμούν οι χρήστες να εμφανίζει το ψηφιακό περιεχόμενο.
Στα πλαίσια αυτής της διπλωματικής εργασίας θα μελετήσουμε το ζήτημα της ολοκλήρωσης των Ρ2Ρ δικτύων μέσω της τεχνολογίας των DRM συστημάτων. Στο πρώτο κεφάλαιο της εργασίας μας, θα αναφερθούμε γενικά στο τι είναι η DRM τεχνολογία, για ποιο λόγο είναι σημαντική η εφαρμογή της τεχνολογίας αυτής στα ψηφιακά δεδομένα, ποιους περιορισμούς θέτει στους χρήστες και ποια μειονεκτήματα εμφανίζει. Στη συνέχει του κεφαλαίου, θα παρουσιάσουμε μια αναλυτική μελέτη της έννοιας του Digital Rights Management, των τεχνολογιών που σχετίζονται με την έννοια αυτή και θα γίνει μελέτη της μορφής που εμφανίζουν τα υπάρχοντα DRM συστήματα. Αρχικά, παρουσιάσουμε τους ορισμούς που σχετίζονται με την έννοια του DRM, καθώς και τις υπάρχουσες όψεις. Έπειτα, παραθέτουμε τις υπάρχουσες DRM τεχνολογίες, καθώς και τις ελλείψεις που παρουσιάζουνε οι τεχνολογίες αυτές. Στη συνέχεια, παρουσιάζουμε περιληπτικά ένα τυπικό DRM σύστημα και αναφερόμαστε στις απαιτήσεις και στα συστατικά στοιχεία ενός τέτοιου συστήματος. Επίσης, κάνουμε μια μικρή αναφορά στους τύπους των επιθέσεων που αντιμετωπίσουν συνήθως τα DRM συστήματα.
Στο δεύτερο κεφάλαιο της εργασίας μας μελετάμε την έννοια Ρ2Ρ και αναφερόμαστε στην τεχνολογία των Ρ2Ρ δικτύων. Στο πρώτο μέρος του κεφαλαίου, θα ασχοληθούμε με την περιγραφή των Ρ2Ρ δικτύων. Θα αναφερθούμε στη δομή τους, στις κατηγοριοποιήσεις τους, καθώς και στα πλεονεκτήματα που εμφανίζουν. Στο δεύτερο μέρος του κεφαλαίου, ασχολούμαστε με την οικονομία των Ρ2Ρ δικτύων. Αρχικά, μελετάμε κάποιες σημαντικές Ρ2Ρ αρχιτεκτονικές και εφαρμογές, ενώ στη συνέχεια τονίζουμε τα οικονομικά χαρακτηριστικά που εμφανίζουν τα δίκτυα αυτά και τα συγκρίνουμε με τα όμοια χαρακτηριστικά που εμφανίζονται στη βιβλιογραφία της οικονομίας. Στο τρίτο μέρος του κεφαλαίου, συζητάμε τους κινδύνους που αντιμετωπίζουν οι προμηθευτές περιεχομένου και τις επιχειρηματικές ευκαιρίες που προκύπτουν από τα μοντέλα των Ρ2Ρ υπηρεσιών. Προτείνονται κάποιοι μηχανισμοί, οι οποίοι δίνουν κίνητρα συμμετοχής για το μετριασμό των κινδύνων που προκύπτουν από το free-riding και για τη βελτίωση της συνολικής οικονομικής δραστηριότητας των Ρ2Ρ υπηρεσιών συναλλαγής και περιγράφουμε σε γενικές γραμμές πως αυτό μπορεί να εφαρμοστεί ως χαρακτηριστικό του λογισμικού στα Ρ2Ρ συστήματα εφαρμογών. Εξετάζουμε επίσης, το ρόλο που παίζουν οι ενδιάμεσοι στα Ρ2Ρ συστήματα και τελειώνουμε το κεφάλαιο με την περιγραφή ενός μοντέλου τριών επιπέδων, το οποίο περιγράφει τις Ρ2Ρ υπηρεσίες στο επίπεδο των τεχνολογικών εφαρμογών, στο επίπεδο των εφαρμογών της κοινότητας και τέλος, στο επίπεδο των επιχειρηματικών εφαρμογών.
Στο τρίτο κεφάλαιο της διπλωματικής, επεξηγείται το κίνητρο για την αναπόφευκτη κατάσταση της ενοποίησης της DRM τεχνολογίας με τις αρχιτεκτονικές των Ρ2Ρ δικτύων. Μετά από τη σύντομη ανασκόπηση που θα κάνουμε για το πώς απέκτησαν ύπαρξη τα DRM συστήματα και τα Ρ2Ρ δίκτυα, επεξηγούμε τις ανάγκες που δημιούργησαν και τις ευκαιρίες που οδήγησαν στην ανάπτυξη της διαδικασίας ενοποίησης της λειτουργικότητας των DRM συστημάτων με τα Ρ2Ρ δίκτυα. Στη συνέχεια, συζητάμε τα χαρακτηριστικά της DRM τεχνολογίας, τα οποία καθιστούν την τεχνολογία αυτή εξαιρετικά κατάλληλη για την ενοποίηση της με τα Ρ2Ρ δίκτυα, και συνοψίζουμε με τις ελλείψεις που εμφανίζουν πολλές από τις υπάρχουσες DRM επιλύσεις, εκτιμώντας και τα χαρακτηριστικά που αυτές εμφανίζουν. Τέλος, στο τελευταίο μέρος του κεφαλαίου μελετάμε κάποιες υπάρχουσες μελέτες για αρχιτεκτονικές συστημάτων, τα οποία συστήματα προσπαθούν να ενοποιήσουν τις εφαρμογές των DRM συστημάτων με τις τεχνολογίες των Ρ2Ρ δικτύων. Για την κάθε αρχιτεκτονική συστήματος παρουσιάζουμε μια αναλυτική μελέτη των τεχνολογιών που χρησιμοποιεί και των συστημάτων που εφαρμόζει.
Τέλος, στα πλαίσια της διπλωματικής θα προσπαθήσουμε να υλοποιήσουμε ένα σύστημα το οποίο θα παρουσιάζει τα DRM συστήματα και τα Ρ2Ρ δίκτυα ως συμπληρωματικές τεχνολογίες. Πιο συγκεκριμένα, προτείνεται μια Ρ2Ρ υποδομή, η οποία επιτρέπει την ευρεία ανταλλαγή του ψηφιακού περιεχομένου, ενώ παράλληλα υποστηρίζει την προστασία του copyright και τη διαχείριση του διαμέσου των DRM τεχνολογιών. Η προστασία του ψηφιακού περιεχομένου θα πραγματοποιείται με τον έλεγχο στη πρόσβαση και τη χρησιμοποίηση των τεχνολογιών κρυπτογράφησης και ψηφιακής υδατοσήμανσης για τα υπό προστασία πνευματικά δεδομένα. / The ascendant course of P2P networks were the inevitable consequence of rapid growth of the internet. Unfortunately, the P2P networks were evolved by useful tools for the easy and fast distribution of information, in networks that allow the not permitted distribution of illegal copies of intellectual property. For this reason, the holders of intellectual property, use as their defensive arm, for their protection from the violations in the copyright of their intellectual property, the DRM technologies, so as to is achieved the control in the distribution of intellectual property in order to not fall their content in error hands.
The partisans of P2P networks present itself to not agree with the application of DRM technology, which supports the holders of intellectual property. The P2P networks offer a lot of possibilities in the users, as well as in the other participating in the enterprising models for the distribution of the content. For this reasons, the future existence of P2P networks considering given. Consequently, the integration of DRM technology with the P2P architectures is inevitable, because the holders of intellectual property try to maintain the balances, so that they combine the maintenance of control of intellectual property that belongs to them, with the functionality that wish the users to present the digital content.
In the frames of this diplomatic work, we will study the question of completion of P2P networks via the technology of DRM systems. In the first chapter of our work, we will be reported, as generally speaking, in what is the DRM technology, for who reason is important the application of this technology in the digital data, who restrictions it places in the users and what disadvantages it presents. Then, we will present an analytic study of significance of Digital Rights Management, the technologies that are related with this significance and will become study of form that presents the existing DRM systems. Initially, we present the definitions that are related with the significance of DRM, as well as the existing aspects. Then, we mention the existing DRM technologies, as well as the lack of these technologies. Afterwards, we present a formal DRM system and then, we report the requirements and the constitutive elements of such system. Also, we make a small report in the types of attacks that face usually the DRM systems.
In the second chapter of our work, we study the significance of P2P and report the technology of P2P networks. In the first part of chapter, we will deal with the description of P2P of networks. We will be reported in their structure, in their classifications, as well as in the advantages that they present. In the second part, we dealt with the economy of P2P networks. Initially, we study certain important P2P architectures and applications, while afterwards we stress the economic characteristics that present these networks and compare these characteristics with the similar characteristics that are presented in the bibliography of economy. In the third part, we discuss the dangers that face the suppliers of content and the enterprising occasions that result from the models of P2P services. Are proposed certain mechanisms, which give motives of attendance for the mitigation of dangers that results from the free-riding and for improvement of total economic activity of P2P services of transaction and describes in general lines that this can be applied as characteristic of software in the applications of P2P systems. We examine also, the role that play the intermediary in the P2P systems and we finish the chapter with the description of a three-levels model, which describes the P2P services in the level of technological applications, in the level of applications of community and finally, in the level of enterprising applications.
In the third chapter of diplomatic, is explained the motive for the inevitable situation of integrating DRM technology with the architecture of P2P networks. After the short examination that we will make for how acquired existence the DRM systems and the P2P networks, we explain the needs that created and the occasions that led to the growth of process of integrating the functionality of DRM systems with the P2P networks. Afterwards, we discuss the characteristics of DRM technology, which render this technology exceptionally suitable for integration with P2P networks, and we conclude with the lacks that present many from the existing DRM resolutions, appreciating and the characteristics that these present. Finally, in the last part of chapter we study some existing studies on architecture systems, which systems try to integrate the applications of DRM systems with the technologies of P2P networks. For each architecture system we present an analytic study of technologies that it uses and the systems that it applies.
Finally, in the frames of diplomatic we will try to implement a system which will present the DRM systems and P2P networks as complementary technologies. More concretely, is proposed a P2P infrastructure, which allows the wide exchange of digital content, while at the same time supports the protection of the copyright and the management of digital content through the DRM technology. The protection of digital content will be realized with access control and utilization of encryption and digital watermarking technologies for the protected intellectual data.
|
39 |
Αξιολόγηση της υφιστάμενης κατάστασης και υλοποίηση συστήματος διαχείρισης ψηφιακών δικαιωμάτων (DRMS), με ένα σύστημα διαχείρισης περιεχομένου και τεχνολογίες ανοικτού κώδικαΚαπαρού, Αριστέα 24 October 2008 (has links)
Mελετάται το ζήτημα της διαχείρισης και προστασίας των Πνευματικών Δικαιωμάτων στον ψηφιακό κόσμο. Συγκεκριμένα, προτείνονται τα Συστήματα Ψηφιακής Διαχείρισης Δικαιωμάτων (DRM), ως μέσα προστασίας της νομοθετικής κατοχύρωσης των πνευματικών δικαιωμάτων (copyright) και υποστήριξης της διανομής του ψηφιακού περιεχομένου μέσω των δικτύων και του διαδικτύου, για την αποφυγή περιπτώσεων παραβίασης του νόμου της Πνευματικής Ιδιοκτησίας. Yλοποιήθηκε ένα πληροφοριακό σύστημα που ικανοποιεί τις λειτουργικές και τις τεχνικές προδιαγραφές των οντοτήτων που εμπλέκονται στο ζήτημα της διαχείρισης και της προστασίας των πνευματικών δικαιωμάτων. Η υλοποίηση του συστήματος έγινε με χρήση ανοικτών τεχνολογιών και ενός συστήματος διαχείρισης περιεχομένου (Drupal), ακολουθώντας διεθνή πρότυπα και πληρώντας κριτήρια ποιότητας και ευχρηστίας. / The issue of Management and Protection of Intellectual Rights is analysed in this project. Especially, Digital Rights Management Systems (DRMS)proposed as a way of legal protection of the copyright and support of the distribution of digital content throughout the internet, in order to avoid the infringement of the Intellectual Property Law. A system which satisfy the functional and technological requirements of the ontologies that include in the management and protection of the intellectual rights is implemented. Open technologies, international prototypes and a content management system (Drupal), are used for the implementation of a system of high quality and usability.
|
40 |
Copyright law in the digital environment: DRM systems, anti-circumvention, legislation and user rightsLatter, Gareth Paul January 2012 (has links)
This thesis deals with the way in which copyright law is changing in the digital environment and the mechanisms which are facilitating this change. It deals with these issues by analysing the mechanisms of this change, specifically Digital Rights Management (DRM)Systems and anti-circumvention legislation, and the impact which this change is having on the rights of copyright users. The purpose of copyright is to provide an incentive to authors to continue creating while simultaneously providing a public good in allowing the public to use those creations in certain ways. Copyright achieves this purpose by granting both the author and user certain rights. The author is given a limited monopoly over their work in exchange for allowing this work to enter the public sphere and ensuring that users of that work can utilise that work in certain limited ways. The success of copyright thus rests on maintaining the balance between the rights of these parties. The rise of digital technology has created a situation in which copyright content can be easily copied by any party with a Personal Computer and disseminated around the globe instantly via the Internet. In response to these dangers, copyright owners are making use of DRM systems to protect content. DRM systems include various measures of control within its scope. Theses systems allow for copyright owners to control both access and use of content by copyright users. DRM Systems are not foolproof measures of protection however. Technologically sophisticated users are able to circumvent these protection measures. Thus, in order to protect DRM Systems from circumvention, anti-circumvention legislation has been proposed through international treaties and adopted in many countries. The combined effect of these protection measures are open to abuse by copyright owners and serve to curtail the limited rights of copyright users. The end result of this is that the balance which copyright law was created to maintain is disrupted and copyright law no longer fulfils its purpose. This thesis undertakes an analysis of these issues with reference to how these issues affect copyright users in developing countries. This is done with particular reference to possible approaches to this issue in South Africa as South Africa is a signatory to these anti-circumvention treaties.
|
Page generated in 0.0716 seconds