首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
A general model for hiding control flow 隐藏控制流的通用模型
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866877
J. Cappaert, B. Preneel
This paper proposes a general model for hiding control flow graph flattening in C programs. We explain what control flow graph flattening is and illustrate why it is successful as protection against static control flow analysis. Furthermore, we propose a scheme, complementary to control flow graph flattening, which does not leak any control flow graph information statically. Instead of relying on ad hoc security by using variable aliasing and global pointers to complicate data flow analysis of the switch variable, we try to base our security claims more on information theory, data flow, and cryptography. Our formal model is structured and extendable. Moreover, it can specify which minimum of information to hide from the program (e.g. a secret value or function) such that no control flow information is leaked. To express the robustness of our scheme we present some attacks and their feasibility. Finally, we sketch a few scenarios in which our solution could be deployed.
本文提出了C程序中隐藏控制流图平面化的通用模型。我们解释了什么是控制流图扁平化,并说明了为什么它可以成功地防止静态控制流分析。此外,我们还提出了一种与控制流图平坦化相补充的方案,该方案不会静态地泄漏任何控制流图信息。我们没有通过使用变量混叠和全局指针来使switch变量的数据流分析复杂化,而是试图将我们的安全性声明更多地建立在信息论、数据流和密码学之上。我们的正式模型是结构化和可扩展的。此外,它可以指定向程序隐藏的最小信息(例如秘密值或函数),这样就不会泄露控制流信息。为了说明该方案的鲁棒性,我们给出了一些攻击方法及其可行性。最后,我们概述了可以部署我们的解决方案的几个场景。
{"title":"A general model for hiding control flow","authors":"J. Cappaert, B. Preneel","doi":"10.1145/1866870.1866877","DOIUrl":"https://doi.org/10.1145/1866870.1866877","url":null,"abstract":"This paper proposes a general model for hiding control flow graph flattening in C programs. We explain what control flow graph flattening is and illustrate why it is successful as protection against static control flow analysis. Furthermore, we propose a scheme, complementary to control flow graph flattening, which does not leak any control flow graph information statically. Instead of relying on ad hoc security by using variable aliasing and global pointers to complicate data flow analysis of the switch variable, we try to base our security claims more on information theory, data flow, and cryptography. Our formal model is structured and extendable. Moreover, it can specify which minimum of information to hide from the program (e.g. a secret value or function) such that no control flow information is leaked. To express the robustness of our scheme we present some attacks and their feasibility. Finally, we sketch a few scenarios in which our solution could be deployed.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
The privacy of tracing traitors 追查叛徒的私密性
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866871
M. Naor
In this talk I will explore a connection between traitor tracing schemes and the problem of sanitizing data to remove personal information while allowing statistically meaningful information to be released. It is based on joint work with Cynthia Dwork, Omer Reingold, Guy N. Rothblum and Salil Vadhan [5].
在这次演讲中,我将探讨叛徒追踪方案与数据净化问题之间的联系,以便在允许发布统计上有意义的信息的同时删除个人信息。它是基于与Cynthia Dwork, Omer Reingold, Guy N. Rothblum和Salil Vadhan的联合工作[5]。
{"title":"The privacy of tracing traitors","authors":"M. Naor","doi":"10.1145/1866870.1866871","DOIUrl":"https://doi.org/10.1145/1866870.1866871","url":null,"abstract":"In this talk I will explore a connection between traitor tracing schemes and the problem of sanitizing data to remove personal information while allowing statistically meaningful information to be released. It is based on joint work with Cynthia Dwork, Omer Reingold, Guy N. Rothblum and Salil Vadhan [5].","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126995385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of interoperability between licenses 许可证之间互操作性的分析
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866884
K. Fujita, Yasuyuki Tsukada
The emergence of different licenses has led to problems with the smooth flow of digital content across them. To activate digital content distribution, license interoperability must be revealed. In this paper, we present a framework for formally examining license interoperability by using many-sorted first-order logic. We show how the framework can be used to formalize three actual licenses and examine the interoperability between them. The results show that the framework reveals the relationship between licenses.
不同许可证的出现导致了数字内容在它们之间顺畅流动的问题。为了激活数字内容分发,必须揭示许可证的互操作性。在本文中,我们提出了一个框架,通过使用多排序一阶逻辑来正式检查许可证互操作性。我们将展示如何使用该框架形式化三种实际许可,并检查它们之间的互操作性。结果表明,该框架揭示了许可证之间的关系。
{"title":"An analysis of interoperability between licenses","authors":"K. Fujita, Yasuyuki Tsukada","doi":"10.1145/1866870.1866884","DOIUrl":"https://doi.org/10.1145/1866870.1866884","url":null,"abstract":"The emergence of different licenses has led to problems with the smooth flow of digital content across them. To activate digital content distribution, license interoperability must be revealed. In this paper, we present a framework for formally examining license interoperability by using many-sorted first-order logic. We show how the framework can be used to formalize three actual licenses and examine the interoperability between them. The results show that the framework reveals the relationship between licenses.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure cross-domain data sharing architecture for crisis management 用于危机管理的安全跨域数据共享架构
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866879
V. Gowadia, E. Scalavino, Emil C. Lupu, Dmitry Starostin, Alexey Orlov
Crisis management requires rapid sharing of data among organizations responders. Existing crisis management practices rely on ad hoc or centralized data sharing based on agreements written in natural language. The ambiguity of natural language specifications often leads to errors and can hinder data availability. Therefore, it is desirable to develop automatic data sharing systems. This also presents additional challenges, such as evaluation of security constraints in different administrative domains and in situations with intermittent network connectivity. We compare two different architectural approaches to develop secure data sharing solutions. The first approach assumes reliable network connectivity, while the second approach works in ad hoc networks. We then suggest a unified architecture that caters for both scenarios.
危机管理需要在组织响应者之间快速共享数据。现有的危机管理实践依赖于基于用自然语言编写的协议的临时或集中的数据共享。自然语言规范的模糊性通常会导致错误,并可能阻碍数据的可用性。因此,开发自动数据共享系统是很有必要的。这也带来了额外的挑战,例如评估不同管理域中的安全约束以及间歇性网络连接的情况。我们比较了两种不同的架构方法来开发安全的数据共享解决方案。第一种方法假定网络连接可靠,而第二种方法适用于自组织网络。然后,我们建议一个统一的体系结构,以满足这两种情况。
{"title":"Secure cross-domain data sharing architecture for crisis management","authors":"V. Gowadia, E. Scalavino, Emil C. Lupu, Dmitry Starostin, Alexey Orlov","doi":"10.1145/1866870.1866879","DOIUrl":"https://doi.org/10.1145/1866870.1866879","url":null,"abstract":"Crisis management requires rapid sharing of data among organizations responders. Existing crisis management practices rely on ad hoc or centralized data sharing based on agreements written in natural language. The ambiguity of natural language specifications often leads to errors and can hinder data availability. Therefore, it is desirable to develop automatic data sharing systems. This also presents additional challenges, such as evaluation of security constraints in different administrative domains and in situations with intermittent network connectivity. We compare two different architectural approaches to develop secure data sharing solutions. The first approach assumes reliable network connectivity, while the second approach works in ad hoc networks. We then suggest a unified architecture that caters for both scenarios.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133409724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using digital rights management for securing data in a medical research environment 使用数字版权管理来保护医学研究环境中的数据
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866883
Mohammad Jafari, R. Safavi-Naini, Chad Saunders, N. Sheppard
We propose a digital rights management approach for sharing electronic health records in a health research facility and argue advantages of the approach. We also give an outline of the system under development and our implementation of the security features and discuss challenges that we faced and future directions.
我们提出了一种在健康研究机构中共享电子健康记录的数字版权管理方法,并论证了该方法的优点。我们还概述了正在开发的系统和我们的安全功能的实现,并讨论了我们面临的挑战和未来的方向。
{"title":"Using digital rights management for securing data in a medical research environment","authors":"Mohammad Jafari, R. Safavi-Naini, Chad Saunders, N. Sheppard","doi":"10.1145/1866870.1866883","DOIUrl":"https://doi.org/10.1145/1866870.1866883","url":null,"abstract":"We propose a digital rights management approach for sharing electronic health records in a health research facility and argue advantages of the approach. We also give an outline of the system under development and our implementation of the security features and discuss challenges that we faced and future directions.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114170587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies 一种有效的基于公钥属性的广播加密方案,允许任意访问策略
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866875
P. Junod, A. Karlov
We describe a new public-key and provably secure attribute-based broadcast encryption scheme which supports complex access policies with AND, OR and NOT gates. Our scheme, especially targetting the implemention of efficient Pay-TV systems, can handle conjunctions of disjunctions by construction and disjunctions of conjunctions by concatenation, which are the most general forms of Boolean expressions. It is based on a modification of the Boneh-Gentry-Waters broadcast encryption scheme in order to achieve attribute collusion resistance and to support complex Boolean access policies. The security of our scheme is proven in the generic model of groups with pairings. Finally, we compare our scheme to several other Attribute-based Broadcast Encryption designs, both in terms of bandwidth requirements and implementation costs.
我们描述了一种新的公钥和可证明安全的基于属性的广播加密方案,该方案支持具有and, OR和NOT门的复杂访问策略。我们的方案,特别是针对高效付费电视系统的实现,可以通过构造来处理析取的连词,通过连接来处理析取的连词,这是布尔表达式的最一般形式。它基于bonh - gentry - waters广播加密方案的修改,以实现抗属性共谋和支持复杂的布尔访问策略。在具有配对的群的一般模型中证明了该方案的安全性。最后,我们将我们的方案与其他几种基于属性的广播加密设计在带宽需求和实现成本方面进行了比较。
{"title":"An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies","authors":"P. Junod, A. Karlov","doi":"10.1145/1866870.1866875","DOIUrl":"https://doi.org/10.1145/1866870.1866875","url":null,"abstract":"We describe a new public-key and provably secure attribute-based broadcast encryption scheme which supports complex access policies with AND, OR and NOT gates. Our scheme, especially targetting the implemention of efficient Pay-TV systems, can handle conjunctions of disjunctions by construction and disjunctions of conjunctions by concatenation, which are the most general forms of Boolean expressions. It is based on a modification of the Boneh-Gentry-Waters broadcast encryption scheme in order to achieve attribute collusion resistance and to support complex Boolean access policies. The security of our scheme is proven in the generic model of groups with pairings. Finally, we compare our scheme to several other Attribute-based Broadcast Encryption designs, both in terms of bandwidth requirements and implementation costs.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126924596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
An interoperable usage management framework 可互操作的使用管理框架
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866885
Pramod A. Jamkhedkar, G. Heileman, Christopher C. Lamb
In this paper, we describe a formal framework for usage management that provides a scaffolding upon which interoperable usage management systems can be built. We apply the principles of system design to standardize certain features of the framework, such as the operational semantics, and leave free of standards areas that necessitate choice and innovation. We demonstrate that such an approach enables us to achieve a balance of flexibility and usability for the purpose of interoperability in usage management systems. We provide a formal model that allows us to define formal semantics for interoperability.
在本文中,我们描述了一个用于使用管理的正式框架,该框架提供了一个脚手架,可在其上构建可互操作的使用管理系统。我们应用系统设计的原则来标准化框架的某些特性,例如操作语义,并留下需要选择和创新的标准领域。我们演示了这种方法使我们能够实现灵活性和可用性的平衡,以实现使用管理系统中的互操作性。我们提供了一个允许我们定义互操作性的形式化语义的形式化模型。
{"title":"An interoperable usage management framework","authors":"Pramod A. Jamkhedkar, G. Heileman, Christopher C. Lamb","doi":"10.1145/1866870.1866885","DOIUrl":"https://doi.org/10.1145/1866870.1866885","url":null,"abstract":"In this paper, we describe a formal framework for usage management that provides a scaffolding upon which interoperable usage management systems can be built. We apply the principles of system design to standardize certain features of the framework, such as the operational semantics, and leave free of standards areas that necessitate choice and innovation. We demonstrate that such an approach enables us to achieve a balance of flexibility and usability for the purpose of interoperability in usage management systems. We provide a formal model that allows us to define formal semantics for interoperability.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A semi-dynamic multiple watermarking schemefor java applications 用于java应用程序的半动态多重水印方案
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655058
Changjiang Zhang, Jianmin Wang, C. Thomborson, Chaokun Wang, C. Collberg
Software protection and security has been a more and more important issue. In order to prevent software from unauthorized use and modification, a great many techniques have been proposed and developed. In this paper, we address this issue through a prevention technique called software watermarking, and we propose a novel software watermarking scheme, which can embed multiple non-interfering watermarks into the same program. Unlike published schemes, this scheme encodes the watermark into mapping functions and then embeds the mapping codes, which are generated from these functions, into the program at the articulation points of its control flow graph. The extraction in this scheme, which is based on dynamically loading a reconstructed program to recover the watermark, is also a novel approach to the software watermarking field. Experimental results indicate that the size and performance overheads caused by this scheme can keep steady.
软件的保护和安全已经成为越来越重要的问题。为了防止软件被未经授权的使用和修改,已经提出和开发了许多技术。本文通过一种称为软件水印的预防技术来解决这一问题,并提出了一种新的软件水印方案,该方案可以在同一程序中嵌入多个互不干扰的水印。与已发表的方案不同,该方案将水印编码为映射函数,然后将由这些函数生成的映射码嵌入到程序的控制流图结合点处。该方案通过动态加载重构程序来提取水印,是软件水印领域的一种新方法。实验结果表明,该方案可以保持系统的大小和性能开销稳定。
{"title":"A semi-dynamic multiple watermarking schemefor java applications","authors":"Changjiang Zhang, Jianmin Wang, C. Thomborson, Chaokun Wang, C. Collberg","doi":"10.1145/1655048.1655058","DOIUrl":"https://doi.org/10.1145/1655048.1655058","url":null,"abstract":"Software protection and security has been a more and more important issue. In order to prevent software from unauthorized use and modification, a great many techniques have been proposed and developed. In this paper, we address this issue through a prevention technique called software watermarking, and we propose a novel software watermarking scheme, which can embed multiple non-interfering watermarks into the same program. Unlike published schemes, this scheme encodes the watermark into mapping functions and then embeds the mapping codes, which are generated from these functions, into the program at the articulation points of its control flow graph. The extraction in this scheme, which is based on dynamically loading a reconstructed program to recover the watermark, is also a novel approach to the software watermarking field. Experimental results indicate that the size and performance overheads caused by this scheme can keep steady.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114534753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the operational semantics of rights expression languages 论权利表达语言的操作语义
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655052
N. Sheppard, R. Safavi-Naini
We propose an operational model for formalising and enforcing rights expression languages based on the concept of a rights expression compiler. Our compiler transforms an XML-based rights expression into a programme for a virtual machine. This approach provides a formal way of defining semantics for rights expression languages that can be directly used in practice to enforce the expressions while ensuring their consistency and correctness. We further argue that our model eliminates a number of limitations in previous attempts to associate rights expression languages with formal semantics. We demonstrate the power and practicality of our model by using it to develop operational semantics for the OMA Rights Expression Language, from which a real interpreter can be derived with relatively little effort.
我们提出了一种基于权利表达编译器概念的操作模型,用于形式化和执行权利表达语言。我们的编译器将基于xml的权限表达式转换为虚拟机的程序。这种方法提供了一种为权利表达语言定义语义的形式化方法,可以在实践中直接使用这种方法来强制执行表达式,同时确保它们的一致性和正确性。我们进一步认为,我们的模型消除了先前将权利表达语言与形式语义相关联的尝试中的许多限制。通过使用该模型为OMA权利表达语言开发操作语义,我们展示了该模型的强大功能和实用性,可以相对轻松地从中派生出真正的解释器。
{"title":"On the operational semantics of rights expression languages","authors":"N. Sheppard, R. Safavi-Naini","doi":"10.1145/1655048.1655052","DOIUrl":"https://doi.org/10.1145/1655048.1655052","url":null,"abstract":"We propose an operational model for formalising and enforcing rights expression languages based on the concept of a rights expression compiler. Our compiler transforms an XML-based rights expression into a programme for a virtual machine. This approach provides a formal way of defining semantics for rights expression languages that can be directly used in practice to enforce the expressions while ensuring their consistency and correctness. We further argue that our model eliminates a number of limitations in previous attempts to associate rights expression languages with formal semantics. We demonstrate the power and practicality of our model by using it to develop operational semantics for the OMA Rights Expression Language, from which a real interpreter can be derived with relatively little effort.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128681098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Videosurveillance and privacy: covering the two sides of the mirror with DRM 视频监控和隐私:镜面两面覆盖DRM
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655061
J. Troncoso-Pastoriza, Pedro Comesaña Alfaro, L. Pérez-Freire, F. Pérez-González
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacrifice a part of their privacy by accepting to be surveilled by others. The tradeoff between both is usually reasonable and commonly accepted; however, the case of videosurveillance systems has been particularly controversial since their inception, as their benefits are not perceived to compensate for the privacy loss in many cases. The situation has become even worse during the last years with the massive deployment of these systems, which often do not provide satisfactory guarantees for the citizens. This paper proposes a DRM-based framework for videosurveillance to achieve a better balance between both concepts: it protects privacy of the surveilled individuals, whilst giving support to efficient automated surveillance.
隐私和安全一直是个人最关心的问题。它们也是密切相关的概念:为了增加安全感,人们通过接受他人的监视来牺牲一部分隐私。两者之间的权衡通常是合理和普遍接受的;然而,视频监控系统的案例从一开始就特别有争议,因为在许多情况下,它们的好处并不能弥补隐私损失。在过去几年中,由于大规模部署这些系统,情况变得更加糟糕,这些系统往往不能为公民提供令人满意的保障。本文提出了一种基于drm的视频监控框架,以实现这两个概念之间的更好平衡:它保护被监控个人的隐私,同时支持高效的自动化监控。
{"title":"Videosurveillance and privacy: covering the two sides of the mirror with DRM","authors":"J. Troncoso-Pastoriza, Pedro Comesaña Alfaro, L. Pérez-Freire, F. Pérez-González","doi":"10.1145/1655048.1655061","DOIUrl":"https://doi.org/10.1145/1655048.1655061","url":null,"abstract":"Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacrifice a part of their privacy by accepting to be surveilled by others. The tradeoff between both is usually reasonable and commonly accepted; however, the case of videosurveillance systems has been particularly controversial since their inception, as their benefits are not perceived to compensate for the privacy loss in many cases. The situation has become even worse during the last years with the massive deployment of these systems, which often do not provide satisfactory guarantees for the citizens. This paper proposes a DRM-based framework for videosurveillance to achieve a better balance between both concepts: it protects privacy of the surveilled individuals, whilst giving support to efficient automated surveillance.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132843710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1