TITLE

CRACKING THE Content SÄ—curity CONUNDRUM

AUTHOR(S)
Robuck, Mike
PUB. DATE
March 2009
SOURCE
CED;Mar2009, Vol. 35 Issue 3, p18
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on content security. It discusses the significance of content security on Internet-based applications and digital media. It examines several content security schemes, the development in content security, and future applications. It also mentions several ways on how to move content from one application to another. It analyzes the relationship existing among content providers, customers, studios and various industries.
ACCESSION #
36674056

 

Related Articles

  • Your data, your rules. Adee, Sally // New Scientist;8/29/2015, Vol. 227 Issue 3036, p10 

    The article discusses online privacy and a cyber attack on the dating website Ashley Madison during which data was leaked regarding its users. Topics include the influence of the Ashley Madison hack on the ways people protect their identity and private information online, the responsibility of...

  • Security in a Web 2.0-Based Educational Environment. Willard, Nancy // MultiMedia & Internet@Schools;Jul/Aug2010, Vol. 17 Issue 4, p21 

    The article focuses on digital media safety, literacy education, and prevention of risk online for the youth. It states that the youth must be knowledgeable on the standards of responsible behavior and must be equipped with protection techniques against risks. The article highlights the need for...

  • A Pseudonymous Peer-2-Peer Review System for Child Protection On-line. Martin, T.; Durbin, C.; Pawlewski, M.; Parish, D. // Journal of International Commercial Law & Technology;Apr2010, Vol. 5 Issue 2, p82 

    Children are using the internet more and more, and from a younger age. This is despite the commonly known dangers of predators. There is no policing of the internet, nor would it be possible to instigate. Parents are in the difficult position of trying to monitor and control their children's...

  • A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords. Kulkarni, Dhananjay // International Journal of Network Security & Its Applications;Jul2010, Vol. 2 Issue 3, p1 

    Many Internet applications, for example e-commerce or email services require that users create a username and password which serves as an authentication mechanism. Though text passwords have been around for a while, not much has been done in helping naive Internet users in creating strong...

  • Your Data May Be Unsafe: In-dealership backup tapes are vulnerable in many ways. Fortier, Wayne A. // Ward's Dealer Business;Mar2007, Vol. 41 Issue 3, p34 

    The article offers tips on how to ensure the security of dealership back-up tapes in the event of a natural disaster. Application service provider (ASP) solution, in which the dealer-management system server is hosted offsite by a vendor, has ensured that the data are safe. In addition, the...

  • A Reputation-Based Identity Management Model for Cloud Computing. Wu, Lifa; Zhou, Shengli; Zhou, Zhenji; Hong, Zheng; Huang, Kangyu // Mathematical Problems in Engineering;10/11/2015, Vol. 2015, p1 

    In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information....

  • USER PROFILE BASED SMART INFORMATION FILTERING IN SMARTCARD. Lahlou, Abdelkrim; Urien, Pascal // Proceedings of the IADIS International Conference on WWW/Interne;Jan2003, p1259 

    Finding effectively relevant information is becoming challenging task. In this paper, we propose a smart information filtering system SIM-Filter that integrates user's identity and preferences data modeled in his profile. User profile is embarked in a smartcard in order to guarantee its privacy,...

  • How Hackable Are You? PUREWAL, SARAH JACOBSSON // PCWorld;Nov2012, Vol. 30 Issue 11, p41 

    The article considers computer security measures for microcomputer and Internet users. The ease with which computer hackers can access accounts of Internet users through publicly available information is noted. Internet users are advised to conduct Internet searches on themselves, to use phrases...

  • eBay to be investigated over slow hack response.  // Web User;6/4/2014, Issue 346, p8 

    The article focuses on online marketplace eBay which is under investigation after being hacked in February and March 2014, and mentions reason of investigation. It presents the views of the Christopher Graham, executive at Great Britain's Information commissioner Office, on eBay which not warn...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics