Making Content Protection Elemental

Brown, Karen
October 2006
Multichannel News;10/9/2006, Vol. 27 Issue 40, p30
The article provides information on the silicon-based digital content protection scheme from Secure Video Processor (SVP)Alliance in the U.S. According to SVP Alliance chairman Jas Saini, the scheme provides assurance to content provider that their data are secured because the implemented distribution rules governed the operation . Saini adds that the solution is designed to work independently with any network protocols and with the existing digital rights management scheme.


Related Articles

  • Meter Data Management: Important but too Expensive? Bonnett, David // Electric Light & Power;May/Jun2008, Vol. 86 Issue 3, p48 

    The article discusses the effectiveness of meter data management (MDM). It stresses that MDM systems are significantly less expensive to implement as compared to enterprise solutions. It notes that MDM can minimize the need for in-house information technology staff. Moreover, it emphasizes that...

  • Proactive Approach: Proactive security is based on threshold and key refreshment is performed By different cryptography function. Singh, Rashmi; Choudahry, Minu // International Journal of Computer Science Engineering & Technolo;Jan2012, Vol. 2 Issue 1, p801 

    The security of public key cryptosystems relies heavily on the secrecy of the private key. Thus such cryptosystems should be augmented with methods for protecting the secret key while providing continuous availability of the system. A naive solution may be to share the private key using a...

  • Threat of information theft grows for employees who work remotely. Esola, Louise // Business Insurance;5/21/2007, Vol. 41 Issue 21, p18 

    The article addresses the growing threat of information theft. According to experts, it is all too easy for information thieves seeking to exploit personal data. Therefore, companies are looking for ways to protect sensitive data. Threats to other devices-BlackBerries, personal digital...

  • Untitled. Ashford, Warwick // Computer Weekly;6/22/2010, p69 

    The article presents the findings of a report by PricewaterhouseCoopers LLP (PwC) on data protection. The report says that employees in an organization should be the first line of defense against data thefts. According to it, many organization remain complacent that no breach on information...

  • Backward Secrecy.  // Network Dictionary;2007, p58 

    A definition of the term "backward secrecy" is presented. A security-related term, backward secrecy means that a compromise should not compromise any earlier key. Meanwhile, forward secrecy implies that a compromise of the current key should not compromise any future key.

  • Integrity.  // Network Dictionary;2007, p248 

    A definition of the term "Integrity" is presented. It refers to the need to ensure that information is accurate and complete.

  • At the coalface. Ahlberg, Magnus // Computer Bulletin;Nov2003, Vol. 45 Issue 6, p34 

    Growing use of PDAs is creating security risks for companies and opening up breaches of the Data Protection Act, says Magnus Ahlberg

  • A Novel Plausible Deniability Scheme in Secure Steganography. Amin, Farshad; Soleimanipour, Majid; Karimi, Alireza // Proceedings of World Academy of Science: Engineering & Technolog;Sep2008, Vol. 45, p217 

    The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the...

  • In Clouds We Trust. Damoulakis, Jim // ITNOW;Mar2010, Vol. 52 Issue 2, p11 

    If you are thinking about storing data online you need to ask yourself several questions as to where the data is stored, how it is protected and more, says Jim Damoulakis, CTO of GlassHouse Technologies.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics