Skip to main content

CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme

  • Conference paper
Advances in Information Security and Assurance (ISA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5576))

Included in the following conference series:

  • 1801 Accesses

Abstract

Software source code management needs it to improve the functioning of the information society. And there are management and security of software source code equivalent to assembly lines of important infrastructure in the early stage of information society directly. Thus, support technologies to protect and trade software source code are so poor state. In this paper, we propose management framework to support access control and new authentication system for E-commercial contract of software source code using CRYPTEX model of secure container and Secrete Sharing Scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ISO/IEC 19770-1: Information technology — Software asset management — Part 1: Processes

    Google Scholar 

  2. Web site from the working group that developed the 19770-1 standard

    Google Scholar 

  3. ISO/IEC WD 19770-2: Information technology — Software asset management — Part 2: Software Tag

    Google Scholar 

  4. Web site from the working group developing the 19770-2 standard

    Google Scholar 

  5. Kang, H.: Opposition strategy and Trend analysis of Domestic DRM Standardization. Communications of The Korea Information Science Society 23(8), 15–24 (2005)

    Google Scholar 

  6. Tittel, E., Chapple, M., Michael Stewart, J.: CISSP:Certified Information Systems Security Professional Study Guide, Sybex (2003)

    Google Scholar 

  7. Cha, B.-R.: Business model and comparasion of S/W source code vs. Digital license for iPRs. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol. 4496, pp. 825–832. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Cha, B.R., Kim, K., Lee, D.: Study of Digital License Search for Intellectual Property Rights of S/W Source Code. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 201–212. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Sibert, O., Bernstein, D., Van Wie, D.: DigiBox: A Self-Protecting Container for Information Commerce. In: Proceedings of the First USENIX Workshop on Electronic Commerce, New York (July 1995)

    Google Scholar 

  10. http://en.wikipedia.org/wiki/Iso_19770

  11. Cox, B.J.: Superdistribution: Objects as Property on the Electronic Frontier. Addison-Wesley, Reading (1996)

    Google Scholar 

  12. Shamir’s Secret Sharing Scheme, http://point-at-infinity.org/ssss/

  13. Brown, D.: The Da Vinci Code. Anchor Books (2004)

    Google Scholar 

  14. Cha, B.R.: Patent Registration of Korea: 10-0740222, CopyRights Management Method for Software Source Code, July 7 (2007)

    Google Scholar 

  15. Cha, B.R., Jung, Y.: Discrimination and Comparison of Digital License for Copyright Management of Software Source Code and CRYPTEX model. Journal of the Korea Contents Association 8(1), 246–258 (2008)

    Article  Google Scholar 

  16. Cha, B.R.: CRYPTEX Model for Software Source Code. In: ISA 2008 (April 2008)

    Google Scholar 

  17. Cha, B.R., Park, S.: Copyrights Expression and Secure Container of Software Source Code. In: NCM 2008 (September 2008)

    Google Scholar 

  18. Cha, B.R., Kim, Y., Oh, S., Kim, H.: Management Framework of Software Source Code and Copyrights: CPTEX Model of Secure Container. In: SecTech 2008 (December 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cha, B., Kim, Y. (2009). CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02617-1_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02616-4

  • Online ISBN: 978-3-642-02617-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics