Electronic information in any enterprise is an asset, and may be stored in a database or as electronic documents (word, PDF, and spreadsheet). This research focuses on the information leakage caused by documents going astray. Current document security statistics suggest that 63% of information was leaked as documents in 2012. Half of this was due to employee unawareness, and it has cost billions in terms of Intellectual Property IP, effort and money. The problem is that individual documents are almost defenceless outside the enterprise. Encryption and password protection are not impenetrable; it is only a question of time before the information is extracted using intense computing processing power. This research contributes a new conceptual...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...
Sharing e-documents are important components of any enterprise workflow. Keeping these e-documents s...
In this paper, we describe a thread of research which we have followed off and on at Cambridge for a...
As the business world turns from using paper to electronic documents, the security aspects of electr...
As the business world turns from using paper to electronic documents, the security aspects of electr...
This article provides an overview of current document security issues and technologies, and presents...
A common demand today is that software and systems must be secure but security mechanisms are often ...
Modern office work is impossible without the use of electronic document management programs. EDMS ha...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...
Sharing e-documents are important components of any enterprise workflow. Keeping these e-documents s...
In this paper, we describe a thread of research which we have followed off and on at Cambridge for a...
As the business world turns from using paper to electronic documents, the security aspects of electr...
As the business world turns from using paper to electronic documents, the security aspects of electr...
This article provides an overview of current document security issues and technologies, and presents...
A common demand today is that software and systems must be secure but security mechanisms are often ...
Modern office work is impossible without the use of electronic document management programs. EDMS ha...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...