The Present and Future of DRM - Musings on Emerging Legal Problems
暂无分享,去创建一个
[1] John S. Erickson. Fair use, DRM, and trusted computing , 2003, CACM.
[2] Randall Davis,et al. The digital dilemma , 2001, CACM.
[3] Larry Korba,et al. Applying digital rights management systems to privacy rights management , 2002, Comput. Secur..
[4] Wendy E. Mackay,et al. Triggers and barriers to customizing software , 1991, CHI.
[5] Stefan Bechtold. Governance in Namespaces , 2003 .
[6] Deirdre K. Mulligan,et al. Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.
[7] Lunney,et al. The Death of Copyright: Digital Technology, Private Copying, and the Digital Millennium Copyright Act , 2001 .
[8] Stefan Bechtold. Vom Urheber- zum Informationsrecht : Implikationen des Digital Rights Management , 2002 .
[9] Paul England,et al. Authenticated Operation of Open Computing Devices , 2002, ACISP.
[10] Scott Stern,et al. Innovation Policy and the Economy, Volume 2 , 2002 .
[11] Dale A. Stirling,et al. Information rules , 2003, SGMD.
[12] Ralph Katz,et al. Shifting Innovation to Users via Toolkits , 2002, Manag. Sci..
[13] Lorrie Faith Cranor,et al. Web Privacy with P3p , 2002 .
[14] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[15] Andrew Huang,et al. Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.
[16] P Samuelson,et al. Anticircumvention Rules: Threat to Science , 2001, Science.
[17] H. Varian,et al. A STRATEGIC GUIDE TO THE NETWORK ECONOMY , 2002 .
[18] M. Heller,et al. Can Patents Deter Innovation , 1998 .
[19] Ethan M. Preston,et al. Computer Security Publications: Information Economics, Shifting Liability and the First Amendment , 2002 .
[20] Barbara Fox,et al. Encouraging recognition of fair uses in DRM systems , 2003, CACM.
[21] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[22] Eugene Volokh,et al. The Mechanisms of the Slippery Slope , 2003 .
[23] Phil Weiser. Networks Unplugged: Towards A Model of Compatibility Regulation Between Information Platforms , 2001, ArXiv.
[24] Masayuki Kumazawa,et al. Relationship among copyright holders for use and reuse of digital contents , 2000, DL '00.
[25] G. Calabresi,et al. Property Rules, Liability Rules, and Inalienability: One View of the Cathedral , 1972 .
[26] Chris DiBona,et al. Open Sources: Voices from the Open Source Revolution , 1999 .
[27] Herbert J. Hovenkamp. Market Power in Aftermarkets: Antitrust Policy and the Kodak Case , 1993 .
[28] Andrew Huang. The Trusted PC: Skin-Deep Security , 2002, Computer.
[29] Julie E. Cohen. A Right to Read Anonymously: A Closer Look at , 1997 .
[30] Eric R. Emch. Does Opportunism Explain Markups in Laser Printer Toner and Memory? - No and Yes. Evidence on Pricing in Laser Printer Aftermarkets , 2002 .
[31] Mark A. Lemley. Intellectual Property Rights and Standard-Setting Organizations , 2002 .
[32] William A. Arbaugh,et al. Improving the TCPA Specification , 2002, Computer.
[33] Stefan Bechtold. The Problems of Perfection , 2002 .
[34] J. Zittrain. What the publisher can teach the patient: intellectual property and privacy in an era of trusted privication. , 2000, Stanford law review.
[35] Pamela Samuelson,et al. Why the Anti-Circumvention Regulations Need to be Revised , 1999 .
[36] D. Lichtman. Property Rights in Emerging Platform Technologies , 1999, The Journal of Legal Studies.
[37] Steven J. Vaughan-Nichols. How trustworthy is trusted computing? , 2003, Computer.
[38] Benjamin Klein,et al. Market Power in Antitrust: Economic Analysis after Kodak , 1993, Supreme Court Economic Review.
[39] Cassandra Imfeld,et al. Playing Fair With Fair Use? The Digital Millennium Copyright Act's Impact on Encryption Researchers and Academicians , 2003 .
[40] Wendy J. Gordon,et al. Excuse and Justification in the Law of Fair Use: Commodification and Market Perspectives , 2002 .
[41] Lawrence Lessig,et al. The future of ideas - the fate of the commons in a connected world , 2002 .
[42] Stefan Bechtold. Digital Rights Management in the United States and Europe , 2004 .
[43] Vincent Chiappetta,et al. The Desirability of Agreeing to Disagree: The WTO, Trips, International IPR Exhaustion and a Few Other Things , 2000 .
[44] Yochai Benkler,et al. Intellectual Property and the Organization of Information Production , 2002 .
[45] Dawn Xiaodong Song,et al. A Cryptanalysis of the High-Bandwidth Digital Content Protection System , 2001, Digital Rights Management Workshop.
[46] Lee A. Bygrave,et al. Privacy, Data Protection and Copyright: Their Interaction in the Context of Electronic Copyright Management Systems , 1998 .
[47] Peter Lyman,et al. Intellectual Property: In the Information Age , 1989 .
[48] Stan Karas,et al. Sony Computer Entertainment, Inc. v. Connectix Corp. , 2001 .
[49] Lee A. Bygrave,et al. Copyright and Electronic Commerce: Legal Aspects of Electronic Copyright Management , 2000 .
[50] Julie E. Cohen. Lochner in Cyberspace: The New Economic Orthodoxy of 'Rights Management' , 1998 .
[51] B. Schneier,et al. Electronic commerce and the street performer protocol , 1998 .
[52] Michiko Yasukawa. A Dynamic License Agreement System for Reuse of Web Contents , 2001, DS-9.
[53] Hal R. Varian,et al. Information rules - a strategic guide to the network economy , 1999 .
[54] Margaret Jane Radin,et al. Online Standardization and the Integration of Text and Machine , 2002 .
[55] Wendy J. Gordon,et al. Intellectual Property as Price Discrimination: Implications for Contract , 1999 .
[56] C. Shapiro,et al. Network Externalities, Competition, and Compatibility , 1985 .
[57] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[58] Johann Bizer. Datenschutzgerechte Gestaltung des technischen Urheberschutzes , 2001, Datenschutz und Datensicherheit.
[59] Stephen E. Margolis,et al. Network externality : an uncommon tragedy , 1994 .
[60] Joan Feigenbaum,et al. Privacy Engineering for Digital Rights Management Systems , 2001, Digital Rights Management Workshop.
[61] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[62] Christian Neubauer,et al. Technical Aspects of Digital Rights Management Systems , 2002 .
[63] Neil Weinstock Netanel,et al. The Commodification of Information , 2002 .
[64] Stephen Mooney,et al. Digital Rights Management: Business and Technology , 2001 .
[65] Molly Shaffer Van Houweling. Cultivating Open Information Platforms: A Land Trust Model , 2002, J. Telecommun. High Technol. Law.
[66] Pm Schwartz,et al. Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices , 2001 .
[67] Philip J. Weiser. Law and Information Platforms , 2002, J. Telecommun. High Technol. Law.
[68] Aggelos Kiayias,et al. On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.
[69] Yahiko Kambayashi,et al. Representation of reuse mechanisms for digital work with multiple right-holders , 2001, Proceedings 2001 Symposium on Applications and the Internet Workshops (Cat. No.01PR0945).
[70] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[71] Oz Shy. The Economics of Network Industries , 2001 .
[72] Simson L. Garfinkel. The Web's Unelected Government. , 1998 .
[73] Barbara Gengler. Reports: Trusted Computing Platform Alliance , 2001 .
[74] Richard Stallman. Can you trust your computer , 2002 .
[75] P. Weiser. Internet Governance, Standard Setting, and Self-Regulation , 2001 .
[76] Martin Kretschmer,et al. The failure of property rules in collective administration: rethinking copyright societies as regulatory instruments , 2002 .
[77] R. Nelson,et al. On the Complex Economics of Patent Scope , 1990 .
[78] E. Kitch,et al. The Nature and Function of the Patent System , 1977, The Journal of Law and Economics.
[79] J. Boyle. Cruel, Mean, or Lavish? Economic Analysis, Price Discrimination and Digital Intellectual Property , 2000 .
[80] Jonathan Weinberg. Digital TV, Copy Control, and Public Policy , 2002 .
[81] Ross J. Anderson. Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.
[82] Jeffrey K. MacKie-Mason,et al. Exercising Market Power in Proprietary Aftermarkets , 2000 .
[83] Mark Gimbel. Some Thoughts on the Implications of Trusted Systems for Intellectual Property Law , 1998 .
[84] Joseph P. Liu. The DMCA and the Regulation of Scientific Research , 2003 .
[85] Janet Hope,et al. Open Source Licensing , 2004 .
[86] C. Shapiro,et al. Systems Competition and Network Effects , 1994 .
[87] E. Kitch,et al. Elementary and Persistent Errors in the Economic Analysis of Intellectual Property , 2000 .
[88] L. Guibault. Copyright Limitations and Contracts: An Analysis of the Contractual Overridability of Limitations on Copyright , 2002 .
[89] A. Kroon. Protection of Copyright Management Information , 1998 .
[90] Suzanne Scotchmer,et al. Intellectual Property: When Is It the Best Incentive System? , 2002, Innovation Policy and the Economy.
[91] Siani Pearson,et al. Trusted Computing Platforms: TCPA Technology in Context , 2002 .
[92] Julie E. Cohen. Copyright and the Perfect Curve , 2000 .
[93] Edward W. Felten,et al. A skeptical view of DRM and fair use , 2003, CACM.
[94] Eric R. Emch. Price Discrimination Via Proprietary Aftermarkets , 2000 .
[95] P. Samuelson,et al. The Law and Economics of Reverse Engineering , 2002 .
[96] Robert P. Merges,et al. Contracting into Liability Rules: Intellectual Property Rights and Collective Rights Organizations , 1996 .
[97] C. Dennis Allen,et al. User customization of a word processor , 1996, CHI.
[98] Wendy J. Gordon,et al. Market failure and intellectual property: a response to Professor Lunney , 2002 .
[99] Lucie Guibault. Computer und Recht International , 2000 .