2010
DOI: 10.1007/s10660-010-9069-6
|View full text |Cite
|
Sign up to set email alerts
|

Service and P2P based secure media sharing in mobile commerce environments

Abstract: Service technology is slowly evolving to be a promising technology for developing applications in open, loosely coupled and distributed computing environments, e.g., in mobile commerce (m-commerce). Services technology can shield the heterogeneous platforms and is suitable for m-commerce applications. Peer-to-Peer (P2P) technology becomes more and more popular for mobile commerce applications. For secure media distribution in m-commerce applications, the security and P2P rights management become more and more … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…As long as mobile technology facility is equipped, commerce service will be available for any person at any time (Xi & Shiguo, 2011). Computing is expanding from stationary desktop PC environments to locations like cars, shopping malls and entertainment areas.…”
Section: Introductionmentioning
confidence: 99%
“…As long as mobile technology facility is equipped, commerce service will be available for any person at any time (Xi & Shiguo, 2011). Computing is expanding from stationary desktop PC environments to locations like cars, shopping malls and entertainment areas.…”
Section: Introductionmentioning
confidence: 99%
“…This paper proposes a complete solution that copes with the functional requirements for including a trusted network-operated resource function in a secured media path. As possible future media protection research areas, advanced digital rights management techniques shall be considered to protect unauthorized media distribution even from those users allowed to access the media flows [14].…”
Section: Discussionmentioning
confidence: 99%
“…This paper proposes a complete solution that copes with the functional requirements for including a trusted network-operated resource function in a secured media path. As possible future media protection research areas, advanced digital rights management techniques shall be considered to protect unauthorized media distribution even from those users allowed to access the media flows [14]. As well, advanced key agreement mechanisms for multiparty communications shall be taken into account [30].…”
Section: Discussionmentioning
confidence: 99%