National Repository of Grey Literature 62 records found  beginprevious43 - 52next  jump to record: Search took 0.00 seconds. 
The Internet and copyrigh
Bernklauová, Lenka ; Holcová, Irena (advisor) ; Wünschová Pujmanová, Alexandra (referee)
Lenka Bernklauová Internet a autorské právo Diplomová práce, 2013 Abstract The work named Internet and Copyright focuses on issues of copyright law and its protection after genesis and huge expansion of the Internet network all over the world. The key computer network for this work is the Peer-to-Peer network that enables easy distribution of the information between individual users of the network. The original purpose of this network was to provide larger amount of users with information which had been inaccessible or hardly accessible, as time went on the Peer-to-Peer begun to be used for distribution of the works that had no approval for distribution or the license for distribution was not agreed upon. This work tries to capture this non-legal part of data distribution on the Peer-to-Peer networks and at same time tries to offer the tool for protection which could at least limit the infringements into the copyright law of individual authors and which would not restrict the right on free access to information. As the special type of the Computer networks existing on the Internet Social networks are described in this work, these networks have become more and more popular in the whole world. This work also analyses the most important legislation, national, European or international, that regulate the...
Distropine - Distributed System for Anotation of Web Pages
Kaprál, Ondrej ; Zavoral, Filip (advisor) ; Nečaský, Martin (referee)
The aim of this bachelor thesis is to design and implement peer-to-peer version of a service for commenting of internet resources. From a functional point of view it is an implementation of P2P discussion forum. We attempt to achieve the highest possible degree of decentralization while meeting these requirements: usage of distributed hash table to store data content and deployment of user identity concept while protecting this identity against theft. In the analysis we came to realize that in the environment where users do not establish any bindings and content distribution is broadcast in nature there is need for globally trusted authority. For this reason it is deployed PKI with certication authority (CA). Our pursuit of maximum decentralization is reached by multiple measures in the design of the application. We allowed simultaneous operation of multiple CA instances, we have also minimized the power of CA to monitor user activities or to censor the content of the system. User interface of the software is integrated into web browser what helps us to shield user from complexity caused by P2P design.
Infringement of intellectual property in the environment of computer networks
Jeřábek, Tomáš ; Žikovská, Petra (advisor) ; Dobřichovský, Tomáš (referee)
Title: Intellectual Property Rights Infringements in Computer Networks Environment The focal point of the presented thesis is a description of relevant legislation and case law and an analysis of various kinds of liability. The legislation has been described starting on the level of international treaties, including the TRIPS Agreement and the WIPO Internet Treaties, through European directives and finally closing with the Czech national law, the Copyright Act in particular and other selected norms of both civil and criminal law. The thesis deals with foreign regulations in France and the United States known for their consistency in copyright protection. The Czech Supreme Public Prosecutor Office guidance note has been discussed shortly followed by an analysis of civil, administrative and criminal liability. Case law spans the decisions from the Czech Constitutional Court, Supreme Court and Supreme Administrative Court, then the European Court of Justice judgement in the Scarlett case and a several foreign decisions, especially Dutch judgements in matters of the professional association BREIN and the American Betamax case.
The Evolution and the Limits of the Copyright Protection in the Global Information Society
Andruško, Alena ; Kříž, Jan (advisor) ; Dobřichovský, Tomáš (referee) ; Pítra, Vladimír (referee)
CHARLES UNIVERSITY IN PRAGUE Faculty of Law Institute of Copyright, Industrial Property Rights and Competition Law DOCTORAL DISSERTATION The Evolution and the Limits of the Copyright Protection in the Global Information Society ABSTRACT Author: Mgr. Alena Andruško Supervisor: Prof. JUDr. Dr. iur. h. c. Jan Kříž, CSc. Field of Study: Civil Law Theoretical Legal Science Year: 2015 ABSTRACT Copyright law is one of the branches of law that has become, with the development of the Internet, the center of interest for different types of stakeholders in the global information society. With the evolution of "Web 2.0", sometimes called the "Participative Web", represented by user-generated content (UGC), and also with the evolution of peer-to-peer (P2P) file sharing and recently cyberlockers, the effectiveness of copyright protection online has become a problem where solutions can be found only with difficulty. Online copyright infringement is a complex phenomenon with a multiplicity of contributing factors. To see and understand these factors one must not only know and understand the territorial and international legal rules governing copyright, but also know and understand the online ecosystem in which copyright infringement takes place, which is impossible without knowing the history, evolution and technical...
Distributed multimedia service
Jaroš, Martin ; Malina, Lukáš (referee) ; Číka, Petr (advisor)
Diplomová práce se zabývá návrhem a realizací distribuované komunikační služby v reálném čase, jejím cílem je sestavit základní strukturu pro aplikace digitálního přenosu zvuku a videa v rámci klient-klient topologie sítě. Práce definuje komunikační protokol a popisuje jeho implementaci. Důraz je také kladen na zabezpečení pomocí moderních kryptografických metod. Realizace navazuje na stávající řešení přičemž využívá především svobodného softwaru.
Cryptovirology and Future of Malware
Prchal, Josef ; Říha, Zdeněk (referee) ; Cvrček, Daniel (advisor)
Malware is connected to information technology. They influence each other. The aim of this thesis is to describe various types of this software and give a brief account of its history and development. It also discusses main trends of this area and tries to foretell the future development.
Detection of Dynamic Network Applications
Oroš, Petr ; Kaštil, Jan (referee) ; Tobola, Jiří (advisor)
This work deals with the detection of dynamic network applications. It describes a general method for detection of any application layer protocol and automatically searches for the detection rules. The practical part deals with general detection protocol to the automatically generated designs. A special section is devoted detect bittorrent protocol.
Sharing Part of the Screen
Bieliňski, Tomasz ; Sopuch, Zbyněk (referee) ; Zachariáš, Michal (advisor)
This paper deals with the analysis of the existing solutions, conceptual design and implementation of the application that will be able to transfer image to another computer screen at any time. It is divided into two parts: server and client. It uses a method of UDP hole punching.
Synchronization and Backup of Data under Android OS
Karmazín, Jaromír ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Tato práce zkoumá existující synchronizační aplikace a další nástroje vhodné pro tvorbu synchronizačního nástroje, z nichž následně vybírá vhodné metody pro tvorbu nového nástroje pro operační systém Android. Vytvořený nástroj je schopen synchronizovat uživatelské soubory v peer-to-peer sítích nad IPv4 i IPv6, přičemž spolupracuje s analogickými nástroji v operačních systémech Linux a Windows. Nástroj využívá sledování verzí založené na Gitu a zabezpečení komunikace pomocí TLS.
Detection of P2P Networks
Vrba, Jindřich ; Kaštil, Jan (referee) ; Tobola, Jiří (advisor)
This thesis deals with peer-to-peer network detection. It describes possible techniques of identification on various ISO/OSI Layers. The goal of the practical part is to examine detection on the L7 layer by means of string patterns. A presentation of the results with graphs on web pages is also included. The application is intended for the GNU/Linux operating system.

National Repository of Grey Literature : 62 records found   beginprevious43 - 52next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.