首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
视频分享网站因其快速、便捷、免费等特点深受网络用户喜爱,但视频分享网站也因其传播影视作品而涉嫌版权侵权。本文结合一典型案例,就视频分享网站传播影视作品的一些法律问题进行分析,以期对此类网站的合法运行及影视作品网络版权的保护有所裨益。  相似文献   

2.
目前,位置分享已经成为移动在线社交网络中一个非常重要的功能。与此同时,人们也对位置分享过程中产生的隐私泄露问题越来越担忧。如果得不到足够的隐私保护,用户很可能不愿意分享自己的位置信息。针对移动在线社交网络中位置分享的隐私保护问题,本文进行了深入的研究,指出了已有的保护方案的缺陷,提出了一个名为BMobishare 的安全方案。该方案改进了先前方案的架构,并采用位置加密和Bloom过滤器来阻止非法攻击。最后,通过安全分析和模拟实验,证明了BMobishare 方案能有效地保护用户位置和社交网络的隐私信息。  相似文献   

3.
网络个人信息呈现出虚拟性、复杂性、权利性质双重性等特点,在网络信息保护过程中,个人信息及个人信息侵权的判断显得尤为重要。我们应当实行网络实名制,明确过错原则为一般规则原则;制定网络个人信息协商性声明,强调网络个人信息传播的自愿性。  相似文献   

4.
2008年网络著作权侵权案例探析   总被引:1,自引:0,他引:1  
通过2008年典型网络著作权侵权案例的回顾,对网络侵权案件的原因进行了分析,进一步提出了通过制定完善的网络保护法律法规、建立和完善网络著作权的管理规范、采用技术手段、构筑网络道德体系等途径构建一个功能完善的网络著作权保护体系。  相似文献   

5.
随着互联网的日益发展,人们慢慢习惯并喜欢上在社交网络上分享自己摄影作品.但是,由于网民版权意识不强和网络空间广阔,及时获取其作品遭侵权和保护图像版权的问题在社交网络上变得日益尖锐.针对以上问题,本文在现有的图像版权保护的基础上进行了重新设计,从中加入了RSA公钥算法进行系统用户身份验证、加入了图像认证中心对有效用户的申请办法版权证书以及加入了同态加密算法加密图像信息传递到图像认证中心.使其克服水印信息被窃取和原作者无法及时得知的弊端,并且图像对第三方保密.进而实现一个安全可靠的认证系统.  相似文献   

6.
网络经济下的知识产权保护问题的探讨   总被引:1,自引:0,他引:1  
随着互联网应用的日益广泛与网络经济的不断发展,网络侵权问题层出不穷,这对网络知识产权保护提出了新的挑战。无论是从法律角度还是从经济角度,面对网络侵权,大家都希望能够找到即保护和鼓励网络智力创新,又有利于智力成果顺利地进行网络传播的双赢处理办法,而妥善调整权利人、网络服务提供商(ISP)和终端用户之间的关系则是处理网络侵权的关键。  相似文献   

7.
电力信息安全探讨   总被引:3,自引:0,他引:3  
叙述了我国电力信息安全的现状,阐述了信息安全问题的表现形式,包括黑客攻击,信息侵权、病毒危害等,提出相应的防范技术措施,如信息加密、信息隐藏、信息过滤、信息抗抵赖、网络控制技术,VPN技术、防病毒技术等,并在此基础上提出了保护电力信息安全的几点对策.  相似文献   

8.
计算机网络的迅猛发展为人们的信息交流提供了一个广阔的天地,在这个天地中有大量信息的存在,有公共信息,还有私人信息。而不知何时起当你在其中得到更多的信息同时却发现自己的私密信息也被别人"共享"了。特别是近几年发生的网络隐私侵权事件,使得个人网络隐私权受到前所未有的严峻挑战,如何强化对个人网络隐私权的保护,已经成为信息网络健康发展面临的重大课题。  相似文献   

9.
阐述了网络环境下加强网络知识产权保护的重要性和必要性,并针对网络侵权的各种行为表现和问题,提出了网络知识产权保护的若干对策。  相似文献   

10.
在线社会网络中信息的传播路径包含着用户对内容、来源等的偏好信息,研究运用信息的传播路径来预测用户信息分享行为的方法。基于传播路径的信息过滤能力研究了信息在网络中的传播过程和信息传播路径的转换方法。运用基于关联规则的分类算法对在线社会网络中的信息分享行为进行预测。以新浪微博为例对微博用户的转发行为进行了预测,结果表明该方法对在线社会网络中的活跃用户的信息分享行为的预测具有较好的效果。  相似文献   

11.
针对无人机协同作业信息安全和数据通信问题,提出一种基于区块链的分布式无人机数据安全模型。首先,利用轻量化加密技术重构无人机区块链结构,设计适用于物联网边缘计算场景的分布式区块链网络模型;然后,调用智能合约实现区块链数据的安全共享,并结合信誉评估方案和代理权益证明思想,提出融合共识协议的的工作量证明方法完成数据交易。实验结果表明:作为数据安全共享实例,所提方法可使受攻击的无人机信誉值降至不可信任状态,并在不同攻击模式下的能够有效抑制恶意攻击,执行自适应工作量证明的共识算法的正常节点交易率可提升3-4倍,为无人机数据共享提供了安全保障。  相似文献   

12.
《Micro, IEEE》1999,19(4)
How should a standardization body such as the IEEE deal with patents and copyrights on technology essential to using a standard! A recent controversy within the World Wide Web Consortium over a Microsoft patent illustrates the kind of problem that can arise when intellectual property rights cloud users' right of access to a standard. As yet, the IEEE has not developed a coherent policy on this issue; nor, apparently, has any other major standardization body  相似文献   

13.
Autonomic computing and communication has become a new paradigm for dynamic service integration and resource sharing in today's ambient networks. Devices and systems need to dynamically collaborate and federate with little known or even unknown parties in order to perform everyday tasks. Those devices and systems act as independent nodes that autonomously manage and enforce their own security policies. Thus in autonomic pervasive communications clients may not know a priori what access rights they need in order to execute a service nor service providers know a priori what credentials and privacy requirements clients have so that they can take appropriate access decisions. To solve this problem we propose a negotiation scheme that protects security and privacy interests with respect to information disclosure while still providing effective access control to services. The scheme proposes a negotiation protocol that allows entities in a network to mutually establish sufficient access rights needed to grant a service.
  相似文献   

14.
移动通信技术的迅速发展使得频谱资源日益紧缺,人们对了解附近感兴趣的事物并与之通信的需求日渐增加,这些问题对现有的通信方式提出了挑战。D2D通信在系统的控制下复用小区资源,能够减小小区网络的负载,实现端到端直接通信及资源共享。研究并设计实现了以JXTA协议为基础、以WiFi为通信媒质、以AndroidOS为运行平台的无线D2D通信系统。  相似文献   

15.
In recent years the US Congress has expanded both the scope and duration of copyright law. For example, the United States now recognizes copyrights in sound recordings, computer software, and (since 1990) the moral rights of a visual artist, such as the right to be identified as the author and the right against destruction of a work. Four years ago, the Sonny Bono Act (more formally known as the Copyright Term Extension Act) added 20 years to the duration of both new and existing copyrights. For those building information systems, the expansion of the material protected by intellectual property laws adds significant difficulty in obtaining permissions to use material for online delivery. Despite the flurry of activity during the dot-com era, we have not reached a consensus on a model for selling protected information.  相似文献   

16.
Even as data and analytics-driven applications are becoming increasingly popular, retrieving data from shared databases poses a threat to the privacy of their users. For example, investors/patients retrieve records about stocks/diseases they are interested in from a stock/medical database. Knowledge of such interest is sensitive information that the database server would have access to, unless some mitigating measures are deployed. Private information retrieval (PIR) is a promising security primitive to protect the privacy of users’ interests. PIR allows the retrieval of a data record from a database without letting the database server know which record is being retrieved. The privacy guarantees could either be information theoretic or computational. Alternatively, anonymizers, which hide the identities of data users, may be used to protect the privacy of users’ interests for some situations. In this paper, we study rPIR, a new family of information-theoretic PIR schemes using ramp secret sharing. We have designed four rPIR schemes, using three ramp secret sharing approaches, achieving answer communication costs close to the cost of non-private information retrieval. Evaluation shows that, for many practical settings, rPIR schemes can achieve lower communication costs and the same level of privacy compared with traditional information-theoretic PIR schemes and anonymizers. Efficacy of the proposed schemes is demonstrated for two very different scenarios (outsourced data sharing and P2P content delivery) with realistic analysis and experiments. In many situations of these two scenarios, rPIR’s advantage of low communication cost outweighs its disadvantages, which results in less expenditure and/or better quality of service compared with what may be achieved if traditional information-theoretic PIR and anonymizers are used.  相似文献   

17.
万亚平  阳小华  刘志明  李治  张娟 《计算机科学》2015,42(Z11):268-272, 288
社交网络是基于用户之间共同的兴趣、爱好等构建的一种社会关系网络服务。社交网络中包含了大量的用户行为,研究这些行为对增强用户体验,增加用户使用粘性,提高资源的分享率以及其它一些服务的有效性都具有十分重要的意义。体裁互文性是语言学的基本概念,它与用户行为具有一些共性特征。实验表明,社交网络用户行为和体裁互文性具有相似性,利用体裁互文性研究用户的行为将更有利于信息共享、传播以及知识通信。  相似文献   

18.
媒体版权管理技术(DRM)是网络环境下流媒体内容交易和传播的重要技术,用于保护流媒体内容的版权,控制流媒体的使用和传播.结合现阶段网络应用中流媒体认证技术的实际应用情况和新一代数字版权管理(DRM)技术,提出一个通用的流媒体数字版权保护架构,并最终实现了基于该方案的流媒体版权管理系统.  相似文献   

19.
20.
Barnes  B.H. 《Software, IEEE》1998,15(5):30-33
Computer security is critical to software quality. With the emphasis in applications shifting from calculation to communication, the archiving, analysis, security, and privacy of information have become increasingly important. Most computer security research has focused on cryptography and network protocols. Today's security problems, however, include authenticity, digital signatures, data integrity, access control, electronic copyrights, and digital watermarking, which prevents unauthorized duplication and distribution of images and documents. The author presents a British perspective on computer security research  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号