Abstract
Software source code management needs it to improve the functioning of the information society. And there are management and security of software source code equivalent to assembly lines of important infrastructure in the early stage of information society directly. Thus, support technologies to protect and trade software source code are so poor state. In this paper, we propose management framework to support access control and new authentication system for E-commercial contract of software source code using CRYPTEX model of secure container and Secrete Sharing Scheme.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ISO/IEC 19770-1: Information technology — Software asset management — Part 1: Processes
Web site from the working group that developed the 19770-1 standard
ISO/IEC WD 19770-2: Information technology — Software asset management — Part 2: Software Tag
Web site from the working group developing the 19770-2 standard
Kang, H.: Opposition strategy and Trend analysis of Domestic DRM Standardization. Communications of The Korea Information Science Society 23(8), 15–24 (2005)
Tittel, E., Chapple, M., Michael Stewart, J.: CISSP:Certified Information Systems Security Professional Study Guide, Sybex (2003)
Cha, B.-R.: Business model and comparasion of S/W source code vs. Digital license for iPRs. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol. 4496, pp. 825–832. Springer, Heidelberg (2007)
Cha, B.R., Kim, K., Lee, D.: Study of Digital License Search for Intellectual Property Rights of S/W Source Code. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 201–212. Springer, Heidelberg (2007)
Sibert, O., Bernstein, D., Van Wie, D.: DigiBox: A Self-Protecting Container for Information Commerce. In: Proceedings of the First USENIX Workshop on Electronic Commerce, New York (July 1995)
Cox, B.J.: Superdistribution: Objects as Property on the Electronic Frontier. Addison-Wesley, Reading (1996)
Shamir’s Secret Sharing Scheme, http://point-at-infinity.org/ssss/
Brown, D.: The Da Vinci Code. Anchor Books (2004)
Cha, B.R.: Patent Registration of Korea: 10-0740222, CopyRights Management Method for Software Source Code, July 7 (2007)
Cha, B.R., Jung, Y.: Discrimination and Comparison of Digital License for Copyright Management of Software Source Code and CRYPTEX model. Journal of the Korea Contents Association 8(1), 246–258 (2008)
Cha, B.R.: CRYPTEX Model for Software Source Code. In: ISA 2008 (April 2008)
Cha, B.R., Park, S.: Copyrights Expression and Secure Container of Software Source Code. In: NCM 2008 (September 2008)
Cha, B.R., Kim, Y., Oh, S., Kim, H.: Management Framework of Software Source Code and Copyrights: CPTEX Model of Secure Container. In: SecTech 2008 (December 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cha, B., Kim, Y. (2009). CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_67
Download citation
DOI: https://doi.org/10.1007/978-3-642-02617-1_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02616-4
Online ISBN: 978-3-642-02617-1
eBook Packages: Computer ScienceComputer Science (R0)