|Total results: 418||
|Digital Rights Management: Concepts, Methodologies, Tools, and Applications
Information Resources Management Association.
With the continuing growth of the digital media, digital rights management is essential to control the unauthorized distribution or use of digital files typically used by hardware manufacturers, publishers, and copyright holders.Digital Rights Management: Concepts, Methodologies, Tools, and...
Legal Protection of the Web Page
Davide Mula, Mirko Luca Lobina.
We start to analyze each component of database’s definition and to find them in a web page so that we can compare those juridical goods. After that we analyze present legislation concern database and in particular World Intellectual Property Organization Copyright Treatments and European Directive...
Intellectual Property Systems in Software
Ricardo Rejas-Muslera, Elena Davara, Alain Abran, Luigi Buglione.
Support for research and development in information technology is considered today as critical by most governments in the industrially advanced countries. Traditionally the way of stimulating research has been to ensure to the investor the appropriability of the returns generated. Such appropriability...
Legal Ontologies in ICT and Law
Witold Abramowicz, Piotr Stolarski, Tadeusz Tomaszewski.
Re-usability is frequently declared as sine qua non feature of modern ontology engineering. Although thoroughly examined in general theory of knowledge management models the re-usability issue is still barely a declaration in the domain of legal ontologies. The similar situation also applies to...
Security in Service Oriented Architectures: Standards and Challenges
Anne V.D.M. Kayem.
Service Oriented Architectures (SOAs) have become the defacto standard for defining interoperable architectures on the web with the most common implementation of this concept being in the form of web services. Information exchange is an integral part of SOAs, so designing effective security...
Digital Preservation Challenges, Infrastructures and Evaluations
To preserve digitally encoded information over a long term following the OAIS Reference Model requires that the information remains accessible, understandable and usable by a specified Designated Community. These are significant challenges for repositories. It will be argued that infrastructure which...
DRM Protection Technologies
Digital Rights Management (DRM) is concerned with the ownership of digital information and access to that information. Organizations and individuals increasingly seek to prevent unauthorized or inadvertent release of owned, proprietary, or sensitive information. A variety of technologies are available...
Copyright and Digital Libraries: Securing Access to Information in the Digital Age1
Challenged by new technology, copyright is currently in turmoil. Increasingly regarded by the general public as a curb to the universal dissemination of knowledge, it seems to have no alternative but to include access to information in order to meet the challenges posed by the knowledge society.3 It...
Law, Architecture, Gameplay, and Marketing
Peter J. Wasilko.
This chapter introduces readers to a broad range of legal issues relevant to game designers and developers touching such topics as intellectual property protection, player disputes, employment, licensing, and taxation. It provides an overview of relevant law, but primarily focuses on how to bring legal...
EduPMO: A Framework for Multimedia Production Management
Joni A. Amorim, Rosana G. S. Miskulin, Mauro S. Miskulin.
Engineering is seen today as a synonym of innovation, especially for providing technological solutions that affect not only daily work and entertainment, but education as well. Project portfolio management of multimedia production and use emerges today as a challenge both for the enrichment of...
Hardware Implementations of Image/Video Watermarking Algorithms
Fayez M. Idris.
Digital watermarking is a process in which a secondary pattern or signature, called a watermark, is hidden into a digital media (e.g., image and video) such that it can be detected or extracted later for different intentions. Digital watermarking has many applications including copyright protection...
Management, Monitoring and QoS in Multi-cell Centralized WLANs
Filippo Cacace, Giulio Iannello, Luca Vollero.
Large deployments of access points in wireless local area networks (WLANs) based on the IEEE 802.11 standard require management, configuration and control mechanisms. Centralized WLANs are defined as multi-cell wireless access networks that implement some of these functions in a centralized manner. In...
Ontology-Based Authorization Model for XML Data in Distributed Systems
Amit Jain, Csilla Farkas.
This research work proposes a Semantic-Aware Authorization Framework, called SAAF, for applying syntax independent authorization on eXtensible Markup Language (XML) documents. Our model supports secure data sharing in an open environment without the need for a centralized authority and supports...
An Access Control Framework for WS-BPEL Processes
Federica Paci, Elisa Bertino, Jason Crampton.
Business processes –the next generation workflows- have attracted considerable research interest in the last fifteen years. More recently, several XML-based languages have been proposed for specifying and orchestrating business processes, resulting in the WS-BPEL language. Even if WS-BPEL has been...
Unravelling Intellectual Property in a Specialist Social Networking Site
This chapter examines how the complexity of motivations and practices found in a specialist social networking site intersect with the institutions of intellectual property. The popular niche or specialist social networking site (SNS) called Ravelry, which caters to knitters, crocheters and spinners, is...
Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks
Md. Imrul Hassan, Hai L. Vu, Taka Sakurai.
It is envisaged that supporting vehicle-to-vehicle and vehicle-to-infrastructure communications with a Vehicular Ad-Hoc Network (VANET) can improve road safety and increase transportation efficiency. Among the candidate applications of VANETs, cooperative collision avoidance (CCA) has attracted...
A Unified Approach towards Multimedia Watermarking
Ali Al-Haj, Ahmad Mohammad, Samir Abou El-Seoud, Tuqa Manasrah, Lama Rajab, Tahani Al-Khatib.
The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms...
Data Hiding Schemes Based on Singular Value Decomposition
Victor Pomponiu, Davide Cavagnino, Alessandro Basso, Annamaria Vernone.
Information hiding techniques are acquiring an always increasing importance, due to the widespread diffusion of multimedia contents. Several schemes have been devised in the fields of steganography and digital watermarking, exploiting the properties of different domains. In this chapter, the authors...
Improving the Information Security of Collaborative Web Portals via Fine-Grained Role-Based Access Control
S. Demurjian, H. Ren, S. Berhe, M. Devineni, Sushil Vegad, K. Polineni.
Collaborative portals are emerging as a viable technology to allow groups of individuals to easily author, create, update, and share content via easy-to-use Web-based interfaces, for example, MediaWiki, Microsoft’s Sharepoint, and so forth. From a security perspective, these products are often limited...
Exploiting P2P in New Media Distribution
Marcus Mansukhani, He Ye, Ma Zhaoran.
P2P is currently the most contentious area of Interactive Digital Media on the Internet. It continues to grow in popularity at a phenomenal rate while media producers are seemingly stuck in a cycle of who needs to be prosecuted to prevent this form of piracy, and the majority feel that content should...
Massively Threaded Digital Forensics Tools
Lodovico Marziale, Santhi Movva, Golden G. Richard, Vassil Roussev, Loren Schwiebert.
Digital forensics comprises the set of techniques to recover, preserve, and examine digital evidence, and has applications in a number of important areas, including investigation of child exploitation, identity theft, counter-terrorism, and intellectual property disputes. Digital forensics tools must...
Codec Adaptation for Wireless Multimedia Streaming
Ping-Cheng Yeh, Hung-Yun Hsieh, Zhung-Han Wu, Yen-Chi Lee, Chun-Cheng Chiang, Antonio Ou.
Due to the time-varying nature of wireless channels and the Internet backbone traffic, it is a challenging task to maintain the quality of wireless multimedia streaming throughout the transmission. An effective solution is to adapt the codec setting based on the wireless channel condition or the...