1 / 5

Objectives for Securing Next-Generation Optical Discs

Objectives for Securing Next-Generation Optical Discs. Cryptography Research, Inc. carter@cryptography.com. Free market economics Technical systems should enable market-based solutions to security problems. Risk management

odin
Télécharger la présentation

Objectives for Securing Next-Generation Optical Discs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Objectives for Securing Next-Generation Optical Discs Cryptography Research, Inc. carter@cryptography.com

  2. Free market economics Technical systems should enable market-based solutions to security problems. Risk management Piracy is a problem like credit card fraud, and is neither feasible nor necessary to eliminate completely. Best practices Systems need to provide the best range of security features with the best possible assurances of security. Guiding Principles

  3. Studios and CE/IT companies should maximize their profits by meeting customer demand while working to control piracy. Vendors that provide tools should compete to offer studios the best systems and security features. Security decisions should be based on cost/benefit analysis. Principle: Free Market Economics

  4. Content owners should gain as much knowledge as possible about piracy events when they occur. For every attack, including unexpected attacks, content owners should have the broadest possible range of responses. Parties that incur risk should have the ability and responsibility for controlling it. Principle: Risk Management

  5. Security should be based on strong cryptography and other well-understood primitives and techniques. Designs should be produced by experienced experts whose objective is to mitigate piracy. Parties that rely on the security should be able to evaluate and understand it. Principle: Best Practices

More Related