M. Higuero, Juanjo Unzilla, Eduardo Jacob, P. Sáiz, M. Aguado, D. Luengo
{"title":"攻击树在数字内容版权保护电子商务协议安全分析中的应用","authors":"M. Higuero, Juanjo Unzilla, Eduardo Jacob, P. Sáiz, M. Aguado, D. Luengo","doi":"10.1109/CCST.2005.1594865","DOIUrl":null,"url":null,"abstract":"Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting intellectual property rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the security level and the risks of the system providing these type of services, specially in open networks like Internet. 'Attack trees' technique has proved valid as a methodology for studying and analyzing the security of these distributed systems, and as a mean to compare the security level of similar schemes.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection\",\"authors\":\"M. Higuero, Juanjo Unzilla, Eduardo Jacob, P. Sáiz, M. Aguado, D. Luengo\",\"doi\":\"10.1109/CCST.2005.1594865\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting intellectual property rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the security level and the risks of the system providing these type of services, specially in open networks like Internet. 'Attack trees' technique has proved valid as a methodology for studying and analyzing the security of these distributed systems, and as a mean to compare the security level of similar schemes.\",\"PeriodicalId\":411051,\"journal\":{\"name\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2005.1594865\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594865","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection
Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting intellectual property rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the security level and the risks of the system providing these type of services, specially in open networks like Internet. 'Attack trees' technique has proved valid as a methodology for studying and analyzing the security of these distributed systems, and as a mean to compare the security level of similar schemes.