System for Intellectual Property Protection
暂无分享,去创建一个
Christoph Busch | Stephen Wolthusen | C. Busch | S. Wolthusen | F. Graf | A. Zeidler | Frank Graf | Armin Zeidler
[1] John McLean,et al. A Comment on the 'Basic Security Theorem' of Bell and LaPadula , 1985, Inf. Process. Lett..
[2] Henning Schulzrinne,et al. Copyright protection for electronic publishing over computer networks , 1995 .
[3] F.-P. Heider,et al. The secure distribution of digital contents , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[4] Luke C. Dion. A Complete Protection Model , 1981, 1981 IEEE Symposium on Security and Privacy.
[5] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[6] Steven B. Lipner,et al. Trusted Computer System Evaluation Criteria ( Orange Book ) December , 2001 .
[7] Ross Anderson,et al. Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings , 1996 .
[8] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[9] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[10] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[11] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[12] Herbert Burkert,et al. Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .