Enhancing efficiency of enterprise digital rights management

dc.AffiliationOctober University for modern sciences and Arts (MSA)
dc.contributor.authorSoliman A.H.
dc.contributor.authorIbrahim M.H.
dc.contributor.authorEl-Ramly S.H.
dc.contributor.otherECE Dept.
dc.contributor.otherFaculty of Engineering
dc.contributor.otherMSA University
dc.contributor.other6 of October
dc.contributor.otherEgypt; Electronics
dc.contributor.otherCommunications and Computers Dept.
dc.contributor.otherFaculty of Engineering
dc.contributor.otherHelwan University
dc.contributor.otherHelwan
dc.contributor.otherEgypt; ECE Dept.
dc.contributor.otherFaculty of Engineering
dc.contributor.otherAin Shams University
dc.contributor.otherCairo
dc.contributor.otherEgypt
dc.date.accessioned2020-01-09T20:41:39Z
dc.date.available2020-01-09T20:41:39Z
dc.date.issued2016
dc.descriptionScopus
dc.description.abstractMost of private enterprises and governmental institutions are in an increasing need for enterprise-oriented digital rights management (E-DRM) schemes. E-DRM schemes provide protection to digital contents that contain corporates' sensitive information and prevent unauthorized access to these data. Previous work proposed a storage reliable and efficient E-DRM systems based on the information dispersal algorithm. In this paper, we propose a computationally enhanced information dispersal and reconstruction algorithms. We achieve significant reduction in the computational complexity without affecting the E-DRM system security and with comparable storage requirements. � 2015 IEEE.en_US
dc.identifier.doihttps://doi.org/10.1109/ICACSIS.2015.7415190
dc.identifier.isbn9.78E+12
dc.identifier.otherhttps://doi.org/10.1109/ICACSIS.2015.7415190
dc.identifier.urihttps://ieeexplore.ieee.org/document/7415190
dc.language.isoEnglishen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofseriesICACSIS 2015 - 2015 International Conference on Advanced Computer Science and Information Systems, Proceedings
dc.subjectdigital rights managementen_US
dc.subjectinformation dispersal algorithmen_US
dc.subjectInformation securityen_US
dc.subjectsecure storageen_US
dc.subjectCopyrightsen_US
dc.subjectDigital storageen_US
dc.subjectInformation systemsen_US
dc.subjectSecurity of dataen_US
dc.subjectDigital Rights Managementen_US
dc.subjectGovernmental institutionen_US
dc.subjectInformation dispersalen_US
dc.subjectInformation dispersal algorithmsen_US
dc.subjectReconstruction algorithmsen_US
dc.subjectSecure storageen_US
dc.subjectSensitive informationsen_US
dc.subjectStorage requirementsen_US
dc.subjectInformation managementen_US
dc.titleEnhancing efficiency of enterprise digital rights managementen_US
dc.typeConference Paperen_US
dcterms.isReferencedByGuth, S., A sample DRM system (2003) Digital Rights Management SE-11, 2770, pp. 150-161. , E. Becker, W. Buhse, D. G�nnewig, and N. Rump, Eds Springer Berlin Heidelberg; Chang, C.-C., Yang, J.-H., A group-oriented digital right management scheme with reliable and flexible access policies (2013) I. J. Network Security, 15 (6), pp. 471-477; Chen, C.L., Chen, Y.Y., Chen, Y.H., Group-based authentication to protect digital content for business applications (2009) International Journal of Innovative Computing, Information and Control, 5 (5), pp. 1243-1251; Lin, C.-C.L.C.-C., Wu, S.-C.W.S.-C., Chiang, P.-H.C.P.-H., Chen, C.-C.C.C.-C., Enterprise-oriented digital rights management mechanism: EDRM (2009) 2009 International Conference on Availability, Reliability and Security, pp. 923-928; Ibrahim, M.H., Secure and robust enterprise digital rights management protocol with efficient storage (2015) International Journal on Information, 18 (2), pp. 625-640; Soliman, A.H., Ibrahim, M.H., El-Hennawy, A.E., Improving security and efficiency of enterprise digital rights management (2015) 6th International Conference on Computing, Communications and Networking Technologies (ICCCNT ' 15), , In press; Rabin, M.O., Efficient dispersal of information for security, load balancing, and fault tolerance (1989) Journal of the ACM, 36 (2), pp. 335-348. , Apr; Green, M., Secure blind decryption (2011) Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography, pp. 265-282; Cramer, R., Gennaro, R., Schoenmakers, B., A secure and optimally efficient multi-authority election scheme (1997) Advances in Cryptology EUROCRYPT 97, 1233 (5), pp. 103-118; Ibrahim, M.H., Eliminating quadratic slowdown in two-prime rsa function sharing (2008) International Journal of Network Security, 7 (1), pp. 106-113; Ibrahim, M.H., Ibrahim, I.I., El-Sawy, A.H., Fast three-party shared generation of rsa keys without distributed primality tests (2004) Proceedings of the Information Systems: New Generations (ISNG'04, pp. 7-12; Ibrahim, M.H., Ali, I.A., Ibrahim, I.I., El-Sawi, A.H., A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme (2003) Circuits and Systems 2003, IEEE 46th Midwest Symposium on, 1, pp. 276-280; Joye, M., Paillier, P., Vaudenay, S., Efficient generation of prime numbers (2000) Cryptographic Hardware and Embedded Systems-CHES 2000 SE-27, 1965, pp. 340-354. , �. Ko� and C. Paar, Eds. Springer Berlin Heidelberg; Maurer, U., Fast generation of prime numbers and secure public-key cryptographic parameters (1995) Journal of Cryptology, 8 (3), pp. 123-155; Beauchemin, P., Brassard, G., Cr�peau, C., Goutier, C., Pomerance, C., The generation of random numbers that are probably prime (1988) Journal of Cryptology, 1 (1), pp. 53-64; Plaisted, D.A., Fast verification, testing, and generation of large primes (1979) Theoretical Computer Science, 9 (1), pp. 1-16. , Jul; Java Platform, Standard Edition 7 API Specification, , http://docs.oracle.com/javase/7/docs/api/, [Online] . [Accessed: 01-Jul-2015]; Farebrother, R.W., (1988) Linear Least Squares Computations, 32 (3). , Marcel Dekker
dcterms.sourceScopus

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
avatar_scholar_256.png
Size:
6.31 KB
Format:
Portable Network Graphics
Description: