Publications

Application of 'Attack Trees' in security analysis of digital contents e-commerce protocols with copyrigth protection

Publication date:11/1999

Authors:Marivi Higuero, Juanjo Unzilla, Eduardo Jacob, Puri Saiz, Marina Aguado, David Luengo.
Series:Conference proceedings book
Publication details
Series: CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY Book title: -
Chapter: - Edition: IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA
Volume: - Journal: 39th IEEE International Carnahan Conference on Security Technology (ICCST'05)
Number: - Pages: 57-60
ISBN/ISSN: 0-7803-9245-0 / 0737-1160 Publication city: Las Palmas SPAIN
Abstract:

Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting Intellectual Property Rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the security level and the risks of die system providing these type of services, specially in open networks like Internet. 'Attack trees' technique has proved valid as a methodology for studying and analyzing the security of these distributed systems, and as a mean to compare the security level of similar schemes.