Implementing Trustworthy Dissemination of Digital Contents by Using a Third Party Attestation Proxy-Enabling Remote Attestation Model

Author(s):  
Zhiyong Zhang ◽  
Qingqi Pei ◽  
Jianfeng Ma ◽  
Lin Yang
2013 ◽  
Vol 811 ◽  
pp. 525-530
Author(s):  
Li Hao Su ◽  
Wei Wei Zhang ◽  
Ru Zhang ◽  
Jian Yi Liu

Various DRM standards curb users freedom to transfer and share digital contents among rendering devices. Several interoperability schemes that accommodate devices DRM compatibility have been raised through content distribution or sharing channel, these approaches are usually implemented by domain management or third party transformation services. Most of these schemes emphasize their advantages over others on trust level, security, cost, efficiency and flexibility. Our proposal integrates previous work to maintain the basic requirement of DRM system, we stick to local third party as the foundation for interoperability, we also use proxy re-encryption scheme to protect raw content from disclosure during content translation. And we try to enhance the system by bringing in three principles: security of content encryption key, fewest participants in conversion and minimum calculation requirements for end device. Finally, Statistical demonstration is presented with comparison to other schemes in our analysis to prove performance improvements.


Symmetry ◽  
2018 ◽  
Vol 10 (10) ◽  
pp. 425 ◽  
Author(s):  
Haihe Ba ◽  
Huaizhe Zhou ◽  
Songzhu Mei ◽  
Huidong Qiao ◽  
Tie Hong ◽  
...  

Cloud computing emerges as a change in the business paradigm that offers pay-as-you-go computing capability and brings enormous benefits, but there are numerous organizations showing hesitation for the adoption of cloud computing due to security concerns. Remote attestation has been proven to boost confidence in clouds to guarantee hosted cloud applications’ integrity. However, the state-of-the-art attestation schemes do not fit that multiple requesters raise their challenges simultaneously, thereby leading to larger performance overheads on the attester side. To address that, we propose an efficient and trustworthy concurrent attestation architecture under multi-requester scenarios, Astrape, to improve efficiency in the integrity and confidentiality protection aspects to generate an unforgeable and encrypted attestation report. Specifically, we propose two key techniques in this paper. The first one—aggregated attestation signature—reliably protects the attestation content from being compromised even in the presence of adversaries who have full control of the network, therefore successfully providing attestation integrity. The second one—delegation-based controlled report—introduces a third-party service to distribute the attestation report to requesters in order to save computation and communication overload on the attested party. The report is encrypted with an access policy by using attribute-based encryption and accessed by a limited number of qualified requesters, hence supporting attestation confidentiality. The experimental results show that Astrape can take no more than 0.4 s to generate an unforgeable and encrypted report for 1000 requesters and deliver a throughput speedup of approximately 30 × in comparison to the existing attestation systems.


2020 ◽  
Vol 43 ◽  
Author(s):  
Michael Tomasello

Abstract My response to the commentaries focuses on four issues: (1) the diversity both within and between cultures of the many different faces of obligation; (2) the possible evolutionary roots of the sense of obligation, including possible sources that I did not consider; (3) the possible ontogenetic roots of the sense of obligation, including especially children's understanding of groups from a third-party perspective (rather than through participation, as in my account); and (4) the relation between philosophical accounts of normative phenomena in general – which are pitched as not totally empirical – and empirical accounts such as my own. I have tried to distinguish comments that argue for extensions of the theory from those that represent genuine disagreement.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


2008 ◽  
Vol 18 (1) ◽  
pp. 9-20 ◽  
Author(s):  
Mark Kander ◽  
Steve White

Abstract This article explains the development and use of ICD-9-CM diagnosis codes, CPT procedure codes, and HCPCS supply/device codes. Examples of appropriate coding combinations, and Coding rules adopted by most third party payers are given. Additionally, references for complete code lists on the Web and a list of voice-related CPT code edits are included. The reader is given adequate information to report an evaluation or treatment session with accurate diagnosis, procedure, and supply/device codes. Speech-language pathologists can accurately code services when given adequate resources and rules and are encouraged to insert relevant codes in the medical record rather than depend on billing personnel to accurately provide this information. Consultation is available from the Division 3 Reimbursement Committee members and from [email protected] .


2020 ◽  
Vol 51 (1) ◽  
pp. 35-49 ◽  
Author(s):  
Shoko Watanabe ◽  
Sean M. Laurent

Abstract. Previous forgiveness research has mostly focused on victims’ forgiveness of transgressors, and offenders’ post-transgression efforts intended to promote victim forgiveness have been collectively branded as apology. However, decisions concerning forgiveness frequently occur outside of dyadic contexts, and the unique roles of repentance and atonement in determining forgivability of offenders, despite their preeminence in theology and law, have received little empirical attention. Across five experiments ( N = 938), we show that repentance and atonement independently influence third-party perception of forgivability for a variety of harms, even in disinterested contexts. Our findings provide a systematic examination of decisions about forgivability disentangled from direct personal involvement, demonstrating that components of apology known to facilitate forgiveness in victims also increase perceived forgivability from unharmed observers.


Sign in / Sign up

Export Citation Format

Share Document