透過您的圖書館登入
IP:18.218.129.100
  • 期刊

Enforcing Policies in Content Manipulation Signature Schemes

並列摘要


Recently proposed content manipulation signatures schemes have a broad range of applications, such as authenticated content extraction, adaptive multimedia con- tent delivery, and XML authentication. Most of the constructions are based on Merkle trees. We show that these constructions are unable to enforce manipulation (extraction) policies, i.e. rules defining what manipulations are permitted/prohibited. We propose a generalization of Merkle trees, so called Relaxed Merkle trees. We present their ability to enforce some useful classes of policies, analyze their expressive power, and discuss few enhancements.

被引用紀錄


Astuti, Y. A. D. (2016). 分析與實現規避 Android 模擬器檢測之研究 [master's thesis, Chung Yuan Christian University]. Airiti Library. https://doi.org/10.6840/cycu201600870
楊中雄(2008)。多重代理人應用現貨市場解決供需波動問題〔碩士論文,元智大學〕。華藝線上圖書館。https://doi.org/10.6838/YZU.2008.00060
BAIN, A. (2012). 生態學與演化生物學研究所 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2012.02238
張詩郁(2008)。跨站偽造請求攻擊之客戶端方法改進〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2008.00323
Chen, S. P. (2010). 使用者服務品質滿意度、ERP系統績效改善程度與顧問選擇準則之關係 [doctoral dissertation, National Central University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0031-1903201314405976

延伸閱讀