WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. International Journal of Information Security
  2. International Journal of Information Security : Volume 3
  3. International Journal of Information Security : Volume 3, Issue 2, November 2004
  4. A framework for secure execution of software
Loading...

Please wait, while we are loading the content...

International Journal of Information Security : Volume 16
International Journal of Information Security : Volume 15
International Journal of Information Security : Volume 14
International Journal of Information Security : Volume 13
International Journal of Information Security : Volume 12
International Journal of Information Security : Volume 11
International Journal of Information Security : Volume 10
International Journal of Information Security : Volume 9
International Journal of Information Security : Volume 8
International Journal of Information Security : Volume 7
International Journal of Information Security : Volume 6
International Journal of Information Security : Volume 5
International Journal of Information Security : Volume 4
International Journal of Information Security : Volume 3
International Journal of Information Security : Volume 3, Issue 2, November 2004
Protocols useful on the Internet from distributed signature schemes
A graph-theoretical model of computer security : From file sharing to social engineering
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves
A framework for secure execution of software
A distributed digital rights management model for secure information-distribution systems
International Journal of Information Security : Volume 3, Issue 1, October 2004
International Journal of Information Security : Volume 2
International Journal of Information Security : Volume 1

Similar Documents

...
Toward a secure Kerberos key exchange with smart cards

Article

...
Analyzing SLE 88 memory management security using Interacting State Machines

Article

...
Reactively secure signature schemes

Article

...
Computer security

Article

...
Security in cloud computing

Article

...
Link-time smart card code hardening

Article

...
Broadcast encryption with dealership

Article

...
Short collusion-secure fingerprint codes against three pirates

Article

...
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption

Article

A framework for secure execution of software

Content Provider Springer Nature Link
Author MaƱa, Antonio Lopez, Javier Ortega, Juan J. Pimentel, Ernesto Troya, Jose M.
Copyright Year 2004
Abstract The protection of software applications is one of the most important problems to solve in information security because it has a crucial effect on other security issues. We can find in the literature many research initiatives that have tried to solve this problem, many of them based on the use of tamperproof hardware tokens. This type of solution depends on two basic premises: (i) increasing the physical security by using tamperproof devices and (ii) increasing the complexity of the analysis of the software. The first premise is reasonable. The second one is certainly related to the first one. In fact, its main goal is that the pirate user not be able to modify the software to bypass an operation that is crucial: checking the presence of the token. However, experience shows that the second premise is not realistic because analysis of the executable code is always possible. Moreover, the techniques used to obstruct the analysis process are not enough to discourage an attacker with average resources.In this paper, we review the most relevant works related to software protection, present a taxonomy of those works, and, most important, introduce a new and robust software protection scheme. This solution, called SmartProt, is based on the use of smart cards and cryptographic techniques, and its security relies only on the first of the premises given above; that is, SmartProt has been designed to avoid attacks based on code analysis and software modification. The entire system is described following a lifecycle approach, explaining in detail the card setup, production, authorization, and execution phases. We also present some interesting applications of SmartProt as well as the protocols developed to manage licences. Finally, we provide an analysis of its implementation details.
Starting Page 99
Ending Page 112
Page Count 14
File Format PDF
ISSN 16155262
Journal International Journal of Information Security
Volume Number 3
Issue Number 2
e-ISSN 16155270
Language English
Publisher Springer Berlin Heidelberg
Publisher Date 2004-11-01
Publisher Place Berlin, Heidelberg
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword Software protection Smart cards Information security Data Encryption Computer Communication Networks Operating Systems Coding and Information Theory Management of Computing and Information Systems Communications Engineering, Networks
Content Type Text
Resource Type Article
Subject Computer Networks and Communications Information Systems Safety, Risk, Reliability and Quality Software
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...