Application of 'Attack Trees' in security analysis of digital contents e-commerce protocols with copyrigth protection
|Series:||CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY||Book title:||-|
|Chapter:||-||Edition:||IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA|
|Volume:||-||Journal:||39th IEEE International Carnahan Conference on Security Technology (ICCST'05)|
|ISBN/ISSN:||0-7803-9245-0 / 0737-1160||Publication city:||Las Palmas SPAIN|
Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting Intellectual Property Rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the security level and the risks of die system providing these type of services, specially in open networks like Internet. 'Attack trees' technique has proved valid as a methodology for studying and analyzing the security of these distributed systems, and as a mean to compare the security level of similar schemes.