A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Java Virtual Machine Specification
Java Virtual Machine Specification
Privacy of medical records: IT implications of HIPAA
ACM SIGCAS Computers and Society
Advanced obfuscation techniques for Java bytecode
Journal of Systems and Software
A flexible approach for electronic medical records exchange
HIKM '06 Proceedings of the international workshop on Healthcare information and knowledge management
Bridging a gap in the proposed personal health record
HIKM '06 Proceedings of the international workshop on Healthcare information and knowledge management
Persistent access control: a formal model for drm
Proceedings of the 2007 ACM workshop on Digital Rights Management
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Hi-index | 0.00 |
Control and ownership of data is difficult in any environment and with the increase in electronic data and records, the need to maintain ownership and control redistribution of data is becoming increasingly important. We propose a first-level protection against unauthorized redistribution using a method of self-destructing, one-time-use data. Transmitted data is encrypted, encapsulated within an executable, and authenticated to a single user and machine. Once accessed, measures are taken to ensure it cannot be used outside the executable (e.g., displayed within a non-selectable, non-editable window) and that the executable cannot be easily decompiled. After a single use, data is destroyed through a method of in-memory compilation of a new executable, which overwrites the original during runtime. In addition, a time-to-live (TTL) is integrated into the executable to provide an additional layer of security so that the data is only accessible within a defined time period. The executable is self-sufficient-it requires no network connection, communication with a central authority, or communication with the sender to authenticate the data since all authentication is integrated into the executable. This provides universal, environment-neutral protection of the data within any type of transfer, whether via server-client, peer-to-peer (P2P), or through external storage devices.