{"title":"离线环境下软件版本请求监控系统","authors":"Shin-Yan Chiou, Chia-Chun Lin","doi":"10.14257/IJSIA.2017.11.9.03","DOIUrl":null,"url":null,"abstract":"While the Internet allows licensees to easily disseminate digital content, it also facilitates misappropriation of such content along with violations of personal privacy. Digital rights management (DRM) measures were developed to address such problems. However, DRM can only be used to verify data correctness from software, but cannot be used to verify software soundness from data. In addition, although trusted platform modules (TPM) can be used to achieve system security, such measures to not provide DRM protection. We thus propose a version request system not only achieves DRM functions, but can also conduct version requests for software from data. In this system’s version checking restrictions, only a secure operation system and application can store the cryptography component’s secret key, which is then used to protect and manage the right object (RO).","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Monitor System for Software Version Request in Offline Environments\",\"authors\":\"Shin-Yan Chiou, Chia-Chun Lin\",\"doi\":\"10.14257/IJSIA.2017.11.9.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While the Internet allows licensees to easily disseminate digital content, it also facilitates misappropriation of such content along with violations of personal privacy. Digital rights management (DRM) measures were developed to address such problems. However, DRM can only be used to verify data correctness from software, but cannot be used to verify software soundness from data. In addition, although trusted platform modules (TPM) can be used to achieve system security, such measures to not provide DRM protection. We thus propose a version request system not only achieves DRM functions, but can also conduct version requests for software from data. In this system’s version checking restrictions, only a secure operation system and application can store the cryptography component’s secret key, which is then used to protect and manage the right object (RO).\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2017.11.9.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.9.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Monitor System for Software Version Request in Offline Environments
While the Internet allows licensees to easily disseminate digital content, it also facilitates misappropriation of such content along with violations of personal privacy. Digital rights management (DRM) measures were developed to address such problems. However, DRM can only be used to verify data correctness from software, but cannot be used to verify software soundness from data. In addition, although trusted platform modules (TPM) can be used to achieve system security, such measures to not provide DRM protection. We thus propose a version request system not only achieves DRM functions, but can also conduct version requests for software from data. In this system’s version checking restrictions, only a secure operation system and application can store the cryptography component’s secret key, which is then used to protect and manage the right object (RO).
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security