Educational guide School of Engineering |
english |
Computer security and intelligent systems (2010) |
Subjects |
PROTECTING COPYRIGHT AND PRIVACY |
Contents |
IDENTIFYING DATA | 2012_13 |
Subject | PROTECTING COPYRIGHT AND PRIVACY | Code | 17615122 | |||||
Study programme |
|
Cycle | 2nd | |||||
Descriptors | Credits | Type | Year | Period | ||||
6 | Compulsory | Second | Only annual |
Competences | Learning aims | Contents |
Planning | Methodologies | Personalized attention |
Assessment | Sources of information | Recommendations |
Topic | Sub-topic |
Introduction to the Copyright protection | Copyright denition Brief history of Copyright Protected works Exclusive rights Measures of protection |
Digital Rights Management | -DRM -Multimedia encryption -Key Management for Multimedia Access and Distribution -Broadcast Encryption |
Tracing illegal distribution | -Steganography --Introduction --Steganographic methods --References -Watermarking --Introduction --Properties of a watermarking scheme --Classication of watermarking schemes --Watermarking applications --Methods --References -Fingerprinting --Introduction --Properties --Fingerprinting Schemes --References |
Introduction to the privacy | - |
Privacy in Statistical Databases | The SDC Problem: utility vs disclosure risk Microdata (individual records) - Perturbative Methods - Non-perturbative methods - Synthetic Microdata - Measures of information loss - Measures of disclosure risk - K-anonymity Tabular data - Sensitivity rules - Removal of cells - Controlled rounding |
Privacy in Information and Communication Technologies | -Anonymous channels -Electronic voting schemes -Anonymous payment systems -Mobile Devices --Location Based Services --RFID |