Topic: Security

O'Reilly Network articles about this topic:

Emerging Technology Briefs: Identity (Web Services DevCenter)
A brief look at the state of the emerging identity, membership, and preferences fabric for the Internet.

AudioGalaxy Flubs Security (openp2p.com)
Security is a key concern for P2P systems. AudioGalaxy is not helping the cause by passing user passwords in URLs, Marc Hedlund writes.

Security Concerns Miss the P2P Point (openp2p.com)
An InfoWorld column by P.J. Connolly tars all of P2P with the security brush. O'Reilly CTO Jon Orwant responds that security depends on how P2P systems are used in your organization.

Wiki Python (Python DevCenter)
MoinMoin and ZWiki, two Python-related projects, provide collaborative environments for Web communities.


Other documents about this topic:

Below are other references available on the web for this topic. Since other sites may change their links, please if you find any that may need to be updated.

Dot-Net: Hailstorm or Firestorm?
By Andy Patrizio. "Microsoft rolled out some of its first concrete plans for Dot-Net, which seeks to replace packaged software with "services" that are continuously delivered and updated, much like cable television and the telephone system." [Source: Wired News]

Weaving a Web of Trust
This essay explains many important security and trust management issues surrounding the use of Agents in both conventional and peer-to-peer networks. Security issues specific to distributed computing and ecommerce are also discussed. [Source: Rohit Khare and Adam Rifkin]

Big Blue touts new Napster-proof music locks
By John Borland. "IBM will release a new version of its anti-piracy technology for music on Monday that it says could help block song traders who use services such as Napster or Gnutella. Big Blue is one of the oldest players in the so-called digital rights management business, in which companies create software to block or deter would-be pirates from downloading music online without permission." [Source: CNET News.com]

Intel locks up security code for P2P
By Cecily Barnes. "Demonstrating progress in its peer-to-peer efforts, Intel Wednesday unveiled security software code that other companies can use when developing peer-to-peer applications. Dubbed the Peer-to-Peer Trusted Library, the release includes full API (application programming interface) documentation and provides support for peer authentication, secure storage, encryption and digital signatures. Intel has made the API freely available to developers online." [Source: CNET News.com]

The Napster parasites
By Janelle Brown. "Online marketers are snooping around in your hard drive, taking notes on every MP3 file you download." This article reports on the increasingly-popular marketing firm trend of snooping on P2P users' hard drives and then spamming them accordingly. [Source: Salon.com]

IBM's Digital Music Catch-Up
By Jim Welte. "New security technology for digital music distribution leaves analysts and music industry execs unimpressed. In an effort to entice the major record labels to use its Electronic Media Management System (EMMS) as the security technology for future digital music distribution models, IBM (IBM, info) on Monday announced super-distribution capabilities that would work with peer-to-peer file sharing software such as Napster." [Source: Business 2.0]

Peer-To-Peer: Harnessing the Power of Disruptive Technologies: Chapter 12: Free Haven
By Roger Dingledine, Reputation Technologies, Inc., Michael J. Freedman, MIT, and David Molnar, Harvard University. This book excerpt addresses the anonymity issues of peer-to-peer systems and attempts to create a requirements document of considerations that such a system would need to satisfy in order to be successful. "In developing Free Haven, we hope to clarify some of the requirements for such systems and highlight the design choices." [Source: The Free Haven Project]

You Can Hide From Prying Eyes
By Declan McCullagh. "It's a refrain so common it's unremarkable: Privacy is dead on the Net, and being able to shield your identity online is about as likely as winning the lottery. Twice. Just don't tell that to the researchers who gathered this week for the fourth Information Hiding Workshop, an event that's on the front lines of the pitched battle over anonymity vs. traceability." [Source: Wired News]

Another Stain on Copyright Law
By Brad King. " Once again, the law intended to promote the distribution of content on the Internet has instead been used to restrict it. That was the result when the recording industry used the digital copyright law to shelve a research project that involved hacking a watermarking technology promoted by the five major record labels. On Thursday, Princeton professor Edward Felten and his team of academic researchers decided not to present their paper 'Reading Between the Lines: Lessons from the SDMI Challenge'." [Source: Wired News]

Cisco executives Richard Palmer and Dave King describe the evolution of network security
"In an interview with InfoWorld Editor in Chief Michael Vizard, Cisco executives Richard Palmer, vice president and general manager of Cisco's VPN and security business unit, and Dave King, the unit's director of marketing, talk about how network security will evolve as the issue becomes more intertwined with every aspect of enterprise computing." [Source: InfoWorld]

Digital Rights Gain a Foothold
By Brad King. " They know who you are. They know where you are. They know what you've done - or could do, or what you're capable of doing. And they are the future of digital media on the Internet. "They" are Reciprocal and NetPD, two companies that teamed up on Tuesday to create a secure online delivery system for businesses that comes complete with its own tracking service. The joint venture allows Reciprocal to pad its secure delivery systems, while opening up new sales paths for the NetPD software." [Source: Wired News]

Loopy Ideas Secure Music Rights
By Brad King. "Consumers are one step closer to losing alternatives when it comes to using digital media, as InterTrust unveils a new rights management service that allows developers to create secure players for the PC. On Tuesday, InterTrust (ITRU) made its Extensible Media (XM) developers kit commercially available. The product allows designers to quickly integrate InterTrust-approved codecs and digital rights management security systems into any media player." [Source: Wired News]

Windows XP Can Secure Music
By Brad King. "A new digital media security solution developed by Microsoft provides protection for content owners while excluding other digital rights management systems. The Secure Audio Path (SAP) adds "static" interference to media files that require video and audio cards to authenticate themselves with Windows software before they can be played. The company would be able to verify that a media player isn't playing an "unsecured" file, which according to Microsoft would eliminate much of the threat of piracy." [Source: Wired News]

Uncheatable Distributed Computations
By Philippe Golle and Ilya Mironov. "Computationally expensive tasks that can be parallelized are most efficiently completed by distributing the computation among a large number of processors. The growth of the Internet has made it possible to invite the participation of just about any computer in such distributed computations. This introduces the potential for cheating by untrusted participants. In a commercial setting where participants get paid for their contribution, there is incentive for dishonest participants to claim credit for work they have not done. In this paper, we propose security schemes that defend against this threat with very little overhead. Our weaker scheme discourages cheating by ensuring that it does not pay off, while our stronger schemes let participants prove that they have done (almost) all the work they were assigned with high probability." [Source: Stanford University's Applied Crypto Group]

Rethinking Music Security
By Brad King. "The major media companies are racing to get their content online, despite the faltering of the organization designed to solve the inherent problems with digital distribution. A consortium of more than 100 content and technology companies called the Secure Digital Music Initiative (SDMI) (has) failed to reach a consensus on a screening application that would enable media players to distinguish between secure and unsecure files. The lack of agreement means that for yet another year, portable and PC media players will continue to play both secure and unsecure music files and MP3 files." [Source: Wired News]

Real Progress in Secure Music
By Brad King. "RealNetworks appears on the verge of controlling the digital music security platform after the company brokered a deal between three major labels and Napster. The MusicNet deal now offers not only a potential distribution network that would rival any offline retail store, but also sets up RealNetworks to develop the standard for music delivery on the Internet." [Source: Wired News]

Code-Breakers Go to Court
By Declan McCullagh. "After a team of academics who broke a music-watermarking scheme bowed to legal threats from the recording industry and chose not to publish their research in April, they vowed to "fight another day, in another way." On Wednesday, Ed Felten of Princeton University and seven other researchers took their fight to a New Jersey federal court in a lawsuit asking that they be permitted to disclose their work at a security conference this summer."

"Joining them is the Usenix Association, a 26-year-old professional organization that has accepted Felten's paper for its 10th security symposium in Washington during the week of Aug. 13. The Electronic Frontier Foundation of San Francisco is representing the researchers and Usenix. In the first legal challenge to the Digital Millennium Copyright Act's criminal sections, Usenix is asking the court to block the Justice Department from prosecuting the conference organizers for allowing the paper to be presented. For certain "commercial" activities, the law promises fines of up to $500,000 and a prison term of five years." [Source: Wired News]