Making Content Protection Elemental
- Meter Data Management: Important but too Expensive? Bonnett, David // Electric Light & Power;May/Jun2008, Vol. 86 Issue 3, p48
The article discusses the effectiveness of meter data management (MDM). It stresses that MDM systems are significantly less expensive to implement as compared to enterprise solutions. It notes that MDM can minimize the need for in-house information technology staff. Moreover, it emphasizes that...
- Proactive Approach: Proactive security is based on threshold and key refreshment is performed By different cryptography function. Singh, Rashmi; Choudahry, Minu // International Journal of Computer Science Engineering & Technolo;Jan2012, Vol. 2 Issue 1, p801
The security of public key cryptosystems relies heavily on the secrecy of the private key. Thus such cryptosystems should be augmented with methods for protecting the secret key while providing continuous availability of the system. A naive solution may be to share the private key using a...
- Threat of information theft grows for employees who work remotely. Esola, Louise // Business Insurance;5/21/2007, Vol. 41 Issue 21, p18
The article addresses the growing threat of information theft. According to experts, it is all too easy for information thieves seeking to exploit personal data. Therefore, companies are looking for ways to protect sensitive data. Threats to other devices-BlackBerries, personal digital...
- Untitled. Ashford, Warwick // Computer Weekly;6/22/2010, p69
The article presents the findings of a report by PricewaterhouseCoopers LLP (PwC) on data protection. The report says that employees in an organization should be the first line of defense against data thefts. According to it, many organization remain complacent that no breach on information...
- Backward Secrecy. // Network Dictionary;2007, p58
A definition of the term "backward secrecy" is presented. A security-related term, backward secrecy means that a compromise should not compromise any earlier key. Meanwhile, forward secrecy implies that a compromise of the current key should not compromise any future key.
- Integrity. // Network Dictionary;2007, p248
A definition of the term "Integrity" is presented. It refers to the need to ensure that information is accurate and complete.
- At the coalface. Ahlberg, Magnus // Computer Bulletin;Nov2003, Vol. 45 Issue 6, p34
Growing use of PDAs is creating security risks for companies and opening up breaches of the Data Protection Act, says Magnus Ahlberg
- A Novel Plausible Deniability Scheme in Secure Steganography. Amin, Farshad; Soleimanipour, Majid; Karimi, Alireza // Proceedings of World Academy of Science: Engineering & Technolog;Sep2008, Vol. 45, p217
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the...
- In Clouds We Trust. Damoulakis, Jim // ITNOW;Mar2010, Vol. 52 Issue 2, p11
If you are thinking about storing data online you need to ask yourself several questions as to where the data is stored, how it is protected and more, says Jim Damoulakis, CTO of GlassHouse Technologies.