Open Access System for Information Sharing

Login Library

 

Article
Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorPark, H-
dc.contributor.authorKim, J-
dc.date.accessioned2016-03-31T12:12:39Z-
dc.date.available2016-03-31T12:12:39Z-
dc.date.created2009-02-28-
dc.date.issued2004-01-
dc.identifier.issn0302-9743-
dc.identifier.other2004-OAK-0000004601-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/17670-
dc.description.abstractToday, the Internet and digital technologies lead to illegal reproduction and spread of digital content. Since a copy of digital content is identical with the original, it is difficult to protect the copyright of its creator. In addition, P2P applications like Napster, Gnutella, KaZaA, and so on have accelerated the illegal sharing of digital content. Moreover, a user in P2P can not only be the reader of content, but also the creator and the writer of content. But current technologies like digital watermarking and digital right management does not meet these characteristics, because of their weaknesses such as the allowance of unauthorized viewing in digital watermarking and targeting only the unmodifiable content in digital right management. In this paper, we propose a framework for copyright protection of digital content in a P2P environment. We present a framework where anyone can create and modify a digital content and has the copyright of his contribution with maintaining the copyrights of previously participated contributors. The proposed framework is compared with previous related works such as digital watermarking, XML security, and digital right management.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.subjectWATERMARKING-
dc.titleModifiable digital content protection in P2P-
dc.typeArticle-
dc.contributor.college컴퓨터공학과-
dc.identifier.doi10.1007/978-3-540-30144-8_32-
dc.author.googlePark, H-
dc.author.googleKim, J-
dc.relation.volume3225-
dc.relation.startpage379-
dc.relation.lastpage390-
dc.contributor.id10074421-
dc.relation.journalLECTURE NOTES IN COMPUTER SCIENCE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.3225, pp.379 - 390-
dc.identifier.wosid000224324000032-
dc.date.tcdate2018-03-23-
dc.citation.endPage390-
dc.citation.startPage379-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume3225-
dc.contributor.affiliatedAuthorKim, J-
dc.identifier.scopusid2-s2.0-35048828981-
dc.description.journalClass1-
dc.description.journalClass1-
dc.type.docTypeArticle; Proceedings Paper-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse