Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : INFORMAL: Informatics Journal

Scenarios for Securing Content Delivery in the DRM Environment Prihandoko, Antonius Cahya; Ghodosi, Hossein; Litow, Bruce
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the DRM environment, content is usually distributed in an encrypted form. Typically,a secure encryption algorithm is utilized to accomplish such protection. However, executingthis algorithm in an insecure environment may allow adversaries to compromise the system andobtain information about the decryption key. Keeping such a key secret is a major challengefor content distribution systems. We consider two solutions for securing content delivery. Thefirst solution involves modifying the algorithm in such a way as to make implementation unintelligible.The second solution involves setting a buyer-seller protocol to communicate the keysecurely. In addition, the protocol can be set to achieve security for the content provider andprivacy protection for user. This paper describes a study of these scenarios for DRM applicationsw.r.t securing content delivery.
Implementasi Metode Weighted Moving Average Untuk Sistem Peramalan Penjualan Markas Coffee Muchamad Rizqi; Antonius Cahya; Nova El Maida
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v6i3.28467

Abstract

Headquarters Coffee is one of the businesses engaged in the culinary field of coffee drinks. The problem that occurs at the Coffee Headquarters is that business activities are still carried out manually. In addition, determining sales in the next period only refers to the sales data of the previous period, resulting in owners often experiencing shortages or excess stocks of coffee to be sold due to uncertain sales. Therefore we need a forecasting method (Forecasting) that is appropriate and can be applied to an Information System in the form of a Website. The purpose of making this forecasting information system is to assist companies in recording sales to make it more practical by applying the Weighted Moving Average (WMA) method. From the results of the calculation of the WMA method, the level of accuracy will then be calculated using the Mean Absolute Percentage Error (MAPE) method. The results of forecasting by applying the WMA method and MAPE calculations on weights 3, 4 and 5 show that the Robusta coffee on the Robusta menu which has the smallest MAPE is weight 3 with a calculation result of 19.2499 and the Robusta Milk menu which has the smallest MAPE is weight 4 with the calculation result is 15.21879166 and Excelsa coffee on the excelsa menu which has the smallest MAPE is weight 3 with a calculation result of 19.1538 and the Excelsa Susu menu which has the smallest MAPE is weight 5 with a calculation of 17.27650182 while for Arabica coffee on the Arabica menu which has the smallest MAPE is weight 4 with a calculation result of 18.1735 and the Arabica Susu menu which has the smallest MAPE is weight 5 with a calculation result of 16.24012072. Where the Mape value produced by each type of coffee is still below 20%, which means the forecasting results can be categorized as good.
Traitor Tracing Schemes: a Review Antonius Cahya Prihandoko
INFORMAL: Informatics Journal Vol 3 No 2 (2018): INFORMAL - Informatics Journal
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v3i2.9988

Abstract

This paper provides a review on traitor tracing schemes that are developed to counter piracy strategies. The review starts with a formal definition of the traitor tracing schemes. The paper is then outlined based on two main strategies which may taken by digital content pirates. Mostly the pirates have strategy to make use leaked decryption key or leaked decrypted content. For each piracy strategy, we presents traitor tracing schemes that can be used to counter the piracy. We also analysis strength and weakness of each group of the schemes. At the end of this paper, we propose to combine some schemes for better protection.
Scenarios for Securing Content Delivery in the DRM Environment Antonius Cahya Prihandoko; Hossein Ghodosi; Bruce Litow
INFORMAL: Informatics Journal Vol 1 No 1 (2016): INFORMAL: Informatics Journal
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the DRM environment, content is usually distributed in an encrypted form. Typically,a secure encryption algorithm is utilized to accomplish such protection. However, executingthis algorithm in an insecure environment may allow adversaries to compromise the system andobtain information about the decryption key. Keeping such a key secret is a major challengefor content distribution systems. We consider two solutions for securing content delivery. Thefirst solution involves modifying the algorithm in such a way as to make implementation unintelligible.The second solution involves setting a buyer-seller protocol to communicate the keysecurely. In addition, the protocol can be set to achieve security for the content provider andprivacy protection for user. This paper describes a study of these scenarios for DRM applicationsw.r.t securing content delivery.