Improving security and efficiency of enterprise digital rights management
dc.Affiliation | October University for modern sciences and Arts (MSA) | |
dc.contributor.author | Soliman A.H. | |
dc.contributor.author | Ibrahim M.H. | |
dc.contributor.author | El-Hennawy A.E. | |
dc.contributor.other | ECE Department | |
dc.contributor.other | Faculty of Engineering | |
dc.contributor.other | MSA University | |
dc.contributor.other | Egypt; Department of Electronics | |
dc.contributor.other | Communications and Computers | |
dc.contributor.other | Faculty of Engineering | |
dc.contributor.other | Helwan University | |
dc.contributor.other | Egypt; ECE Department | |
dc.contributor.other | Faculty of Engineering | |
dc.contributor.other | Ain Shams University | |
dc.contributor.other | Egypt | |
dc.date.accessioned | 2020-01-09T20:41:40Z | |
dc.date.available | 2020-01-09T20:41:40Z | |
dc.date.issued | 2016 | |
dc.description | Scopus | |
dc.description.abstract | Recently, private enterprises, governmental and military institutions have been relied mainly on digitizing their work. Digital files containing sensitive information should be protected against external and internal malicious attacks. Enterprise digital rights management (E-DRM) schemes provides several approaches to protect and securely distribute digital contents while empowering the enterprise's administration to monitor and control access to these contents. In this paper we propose a new secure and efficient E-DRM system based on the Information Dispersal Algorithm (IDA). We achieved an improvement in the overall storage requirements, and the computations complexity at each server in the system, as well as preserving the security of information and system robustness. � 2015 IEEE. | en_US |
dc.description.sponsorship | University of North Texas | en_US |
dc.identifier.doi | https://doi.org/10.1109/ICCCNT.2015.7395177 | |
dc.identifier.isbn | 9.78E+12 | |
dc.identifier.other | https://doi.org/10.1109/ICCCNT.2015.7395177 | |
dc.identifier.uri | https://ieeexplore.ieee.org/document/7395177 | |
dc.language.iso | English | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartofseries | 6th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2015 | |
dc.subject | جامعة أكتوبر للعلوم الحديثة والآداب | |
dc.subject | MSA University | |
dc.subject | University for Modern Sciences and Arts | |
dc.subject | October University for Modern Sciences and Arts | |
dc.subject | efficient reliable storage | en_US |
dc.subject | enterprise digital rights management | en_US |
dc.subject | information dispersal | en_US |
dc.subject | secure storage | en_US |
dc.subject | threshold decryption | en_US |
dc.subject | Access control | en_US |
dc.subject | Information management | en_US |
dc.subject | Network security | en_US |
dc.subject | Security of data | en_US |
dc.subject | Digital Rights Management | en_US |
dc.subject | Information dispersal | en_US |
dc.subject | Information dispersal algorithms | en_US |
dc.subject | Monitor and control | en_US |
dc.subject | Secure storage | en_US |
dc.subject | Sensitive informations | en_US |
dc.subject | Storage requirements | en_US |
dc.subject | Threshold decryption | en_US |
dc.subject | Copyrights | en_US |
dc.title | Improving security and efficiency of enterprise digital rights management | en_US |
dc.type | Conference Paper | en_US |
dcterms.isReferencedBy | Kumari, S., Khan, M.K., Li, X., A more secure digital rights management authentication scheme based on smart card (2014) Multimed. Tools Appl., , Dec; Thanh, T.M., Iwakiri, M., A proposal of digital rights management based on incomplete cryptography using invariant Huffman code length feature (2014) Multimed. Syst., 20 (2), pp. 127-142. , Jun; Win, L.L., Thomas, T., Emmanuel, S., Privacy enabled digital rights management without trusted third party assumption (2012) IEEE Trans. Multimed., 14 (3), pp. 546-554. , Jun; Yen, C.-T., Liaw, H.-T., Lo, N.-W., Digital rights management system with user privacy, usage transparency, and superdistribution support (2014) Int. J Commun. Syst., 27 (10), pp. 1714-1730. , Oct; Chang, E.-C., Huang, K.-H., Lu, A.-B., Lai, F., Enterprise dIgItal nghts management system based on smart card 2011 (2011) IEEE 15th International Symposium on Consumer Electronics (ISCE), pp. 363-368; Chang, C.-C., Yang, J.-H., A group-oriented digital right management scheme with reliable and flexible access policies (2013) I. J Netw. Secur., 15 (6), pp. 471-477; Chen, C.L., Chen, Y.Y., Chen, Y.H., Group-based authentication to protect digital content for business applications (2009) Int. J Innov. Comput. Inf. Control, 5 (5), pp. 1243-1251; Lin, C.-C.L.C.-C., Wu, S.-C.W.S.-C., Chiang, P.-H.C.P.-H., Chen, C.-C.C.C.-C., Enterprise-oriented digital rights management mechanism: EDRM (2009) 2009 International Conference on Availability, Reliability and Security, pp. 923-928; Ubaidillah, I., Badarsyah, B., Rosmansyah, Y., Digital nghts management with ABAC implementation to improve enterprise document protection (2014) 2014 48th International Conference on Telecommunication Systems Services and Applications (TSSA), pp. 1-6; Rabin, M.O., Efficient dispersal of information for security, load balancing, and fault tolerance (1989) JACM, 36 (2), pp. 335-348. , Apr; Garay, J.A., Gennaro, R., Jutla, C., Rabin, T., Secure distributed storage and retrieval (2000) Theor. Comput. Sci., 243 (1-2), pp. 363-389. , Jul; Ibrahim, M.H., Secure and robust enterprise digital rights management protocol with efficient storage (2015) International Journal of Information, 18 (2), pp. 625-640; Shamir, A., How to share a secret (1979) Commun. ACM, 22 (2), pp. 612-613. , Nov; Krawczyk, H., Secret sharing made short (1994) Adv. Cryptol.-CRYPTO' 93, 773, pp. 136-146; Green, M., Secure blind decryption (2011) Proc. 14th Int. Conf. Pract. Theory Public Key Cryptogr. Conf. Public Key Cryptogr., pp. 265-282; Chaum, D., Blind signatures for untraceable payments (1983) Advances in Cryptology, pp. 199-203. , Springer US; Zhou, L.Z.L., Schneider, F.B., Marsh, M.A., Redz, A., Distributed blinding for distributed Eigamal re-encryption (2005) 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), p. 824; Dodis, Y., Halevi, S., Rabin, T., A cryptographic solution to a game theoretic problem (2000) Advances in CryptologyCRYPTO 2000, pp. 112-130; Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms (1985) IEEE Trans. Inf. Theory, 31 (4), pp. 469-472. , Jul; Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems (1978) Commun. ACM, 21 (2), pp. 120-126. , Feb; Desmedt, Y., Frankel, Y., Threshold cryptosystems (1990) Advances in Cryptology-CRYPTO' 89 Proceedings, pp. 307-315; Cramer, R., Gennaro, R., Schoenmakers, B., A secure and optimally efficient multi-authority election scheme (1997) Advances in Cryptology EUROCRYPT 97, 1233 (5), pp. 103-118; Pedersen, T., A threshold cryptosystem without a trusted party (1991) Advances in Cryptology-EUROCRYPT'91, pp. 522-526; Dossogne, J., Lafitte, F., Van Heule, D., Secure and practical threshold RSA (2013) Proceedings of the 6th International Conference on Security of Information and Networks-SIN '13, pp. 79-85; Maged, A.H.E.-S., Ibrahim, H., Ibrahim, I.I., Fast fully distributed and threshold RSA function sharing (2004) Proceedings of the Information Systems: New Generations (ISNG'04), pp. 13-18; Xu, Q.-L., Chen, T.-S., An efficient threshold RSA digital signature scheme (2005) Appl. Math. Comput., 166 (1), pp. 25-34. , Jul; Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T., Secure distributed key generation for discrete-log based cryptosystems (1999) Advances in Cryptology-EUROCRYPT '99, 1592, pp. 295-310; Wolf, P., Steinebach, M., Diener, K., Complementing DRM with digital watermarking: Mark, search, retrieve (2007) Online Inf. Rev., 31 (1), pp. 10-21. , Feb; Tardos, G., Optimal probabilistic fingerprint codes (2003) Proceedings of the Thirty-fifth ACM Symposium on Theory of Computing-STOC '03, p. 116; Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T., Robust threshold DSS signatures (2001) Inf. Comput., 164 (1), pp. 54-84. , Jan | |
dcterms.source | Scopus |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- avatar_scholar_256.png
- Size:
- 6.31 KB
- Format:
- Portable Network Graphics
- Description: