M. Higuero, Juanjo Unzilla, Eduardo Jacob, P. Sáiz, M. Aguado, D. Luengo
{"title":"Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection","authors":"M. Higuero, Juanjo Unzilla, Eduardo Jacob, P. Sáiz, M. Aguado, D. Luengo","doi":"10.1109/CCST.2005.1594865","DOIUrl":null,"url":null,"abstract":"Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting intellectual property rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the security level and the risks of the system providing these type of services, specially in open networks like Internet. 'Attack trees' technique has proved valid as a methodology for studying and analyzing the security of these distributed systems, and as a mean to compare the security level of similar schemes.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594865","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting intellectual property rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the security level and the risks of the system providing these type of services, specially in open networks like Internet. 'Attack trees' technique has proved valid as a methodology for studying and analyzing the security of these distributed systems, and as a mean to compare the security level of similar schemes.