Enhancing efficiency of enterprise digital rights management
dc.Affiliation | October University for modern sciences and Arts (MSA) | |
dc.contributor.author | Soliman A.H. | |
dc.contributor.author | Ibrahim M.H. | |
dc.contributor.author | El-Ramly S.H. | |
dc.contributor.other | ECE Dept. | |
dc.contributor.other | Faculty of Engineering | |
dc.contributor.other | MSA University | |
dc.contributor.other | 6 of October | |
dc.contributor.other | Egypt; Electronics | |
dc.contributor.other | Communications and Computers Dept. | |
dc.contributor.other | Faculty of Engineering | |
dc.contributor.other | Helwan University | |
dc.contributor.other | Helwan | |
dc.contributor.other | Egypt; ECE Dept. | |
dc.contributor.other | Faculty of Engineering | |
dc.contributor.other | Ain Shams University | |
dc.contributor.other | Cairo | |
dc.contributor.other | Egypt | |
dc.date.accessioned | 2020-01-09T20:41:39Z | |
dc.date.available | 2020-01-09T20:41:39Z | |
dc.date.issued | 2016 | |
dc.description | Scopus | |
dc.description.abstract | Most of private enterprises and governmental institutions are in an increasing need for enterprise-oriented digital rights management (E-DRM) schemes. E-DRM schemes provide protection to digital contents that contain corporates' sensitive information and prevent unauthorized access to these data. Previous work proposed a storage reliable and efficient E-DRM systems based on the information dispersal algorithm. In this paper, we propose a computationally enhanced information dispersal and reconstruction algorithms. We achieve significant reduction in the computational complexity without affecting the E-DRM system security and with comparable storage requirements. � 2015 IEEE. | en_US |
dc.identifier.doi | https://doi.org/10.1109/ICACSIS.2015.7415190 | |
dc.identifier.isbn | 9.78E+12 | |
dc.identifier.other | https://doi.org/10.1109/ICACSIS.2015.7415190 | |
dc.identifier.uri | https://ieeexplore.ieee.org/document/7415190 | |
dc.language.iso | English | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartofseries | ICACSIS 2015 - 2015 International Conference on Advanced Computer Science and Information Systems, Proceedings | |
dc.subject | digital rights management | en_US |
dc.subject | information dispersal algorithm | en_US |
dc.subject | Information security | en_US |
dc.subject | secure storage | en_US |
dc.subject | Copyrights | en_US |
dc.subject | Digital storage | en_US |
dc.subject | Information systems | en_US |
dc.subject | Security of data | en_US |
dc.subject | Digital Rights Management | en_US |
dc.subject | Governmental institution | en_US |
dc.subject | Information dispersal | en_US |
dc.subject | Information dispersal algorithms | en_US |
dc.subject | Reconstruction algorithms | en_US |
dc.subject | Secure storage | en_US |
dc.subject | Sensitive informations | en_US |
dc.subject | Storage requirements | en_US |
dc.subject | Information management | en_US |
dc.title | Enhancing efficiency of enterprise digital rights management | en_US |
dc.type | Conference Paper | en_US |
dcterms.isReferencedBy | Guth, S., A sample DRM system (2003) Digital Rights Management SE-11, 2770, pp. 150-161. , E. Becker, W. Buhse, D. G�nnewig, and N. Rump, Eds Springer Berlin Heidelberg; Chang, C.-C., Yang, J.-H., A group-oriented digital right management scheme with reliable and flexible access policies (2013) I. J. Network Security, 15 (6), pp. 471-477; Chen, C.L., Chen, Y.Y., Chen, Y.H., Group-based authentication to protect digital content for business applications (2009) International Journal of Innovative Computing, Information and Control, 5 (5), pp. 1243-1251; Lin, C.-C.L.C.-C., Wu, S.-C.W.S.-C., Chiang, P.-H.C.P.-H., Chen, C.-C.C.C.-C., Enterprise-oriented digital rights management mechanism: EDRM (2009) 2009 International Conference on Availability, Reliability and Security, pp. 923-928; Ibrahim, M.H., Secure and robust enterprise digital rights management protocol with efficient storage (2015) International Journal on Information, 18 (2), pp. 625-640; Soliman, A.H., Ibrahim, M.H., El-Hennawy, A.E., Improving security and efficiency of enterprise digital rights management (2015) 6th International Conference on Computing, Communications and Networking Technologies (ICCCNT ' 15), , In press; Rabin, M.O., Efficient dispersal of information for security, load balancing, and fault tolerance (1989) Journal of the ACM, 36 (2), pp. 335-348. , Apr; Green, M., Secure blind decryption (2011) Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography, pp. 265-282; Cramer, R., Gennaro, R., Schoenmakers, B., A secure and optimally efficient multi-authority election scheme (1997) Advances in Cryptology EUROCRYPT 97, 1233 (5), pp. 103-118; Ibrahim, M.H., Eliminating quadratic slowdown in two-prime rsa function sharing (2008) International Journal of Network Security, 7 (1), pp. 106-113; Ibrahim, M.H., Ibrahim, I.I., El-Sawy, A.H., Fast three-party shared generation of rsa keys without distributed primality tests (2004) Proceedings of the Information Systems: New Generations (ISNG'04, pp. 7-12; Ibrahim, M.H., Ali, I.A., Ibrahim, I.I., El-Sawi, A.H., A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme (2003) Circuits and Systems 2003, IEEE 46th Midwest Symposium on, 1, pp. 276-280; Joye, M., Paillier, P., Vaudenay, S., Efficient generation of prime numbers (2000) Cryptographic Hardware and Embedded Systems-CHES 2000 SE-27, 1965, pp. 340-354. , �. Ko� and C. Paar, Eds. Springer Berlin Heidelberg; Maurer, U., Fast generation of prime numbers and secure public-key cryptographic parameters (1995) Journal of Cryptology, 8 (3), pp. 123-155; Beauchemin, P., Brassard, G., Cr�peau, C., Goutier, C., Pomerance, C., The generation of random numbers that are probably prime (1988) Journal of Cryptology, 1 (1), pp. 53-64; Plaisted, D.A., Fast verification, testing, and generation of large primes (1979) Theoretical Computer Science, 9 (1), pp. 1-16. , Jul; Java Platform, Standard Edition 7 API Specification, , http://docs.oracle.com/javase/7/docs/api/, [Online] . [Accessed: 01-Jul-2015]; Farebrother, R.W., (1988) Linear Least Squares Computations, 32 (3). , Marcel Dekker | |
dcterms.source | Scopus |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- avatar_scholar_256.png
- Size:
- 6.31 KB
- Format:
- Portable Network Graphics
- Description: