DRM as a layered system
暂无分享,去创建一个
[1] Riccardo Pucella,et al. A logic for reasoning about digital rights , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[2] David D. Clark,et al. The design philosophy of the DARPA internet protocols , 1988, SIGCOMM '88.
[3] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[4] J. Davenport. Editor , 1960 .
[5] Amy Carroll,et al. Microsoft Palladium: A Business Overview , 2002 .
[6] Vinton G. Cerf. On the evolution of Internet technologies , 2004, Proceedings of the IEEE.
[7] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[8] Stephen Mooney,et al. Digital Rights Management: Business and Technology , 2001 .
[9] Carleen Maitland,et al. Trust in cyberspace , 2000 .
[10] Gregory L. Heileman,et al. Protecting digital archives at the Greek Orthodox Archdiocese of America , 2003, DRM '03.
[11] Jeffrey B. Lotspiech,et al. Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels , 1997, D Lib Mag..
[12] Michael L. Nelson,et al. A Survey of Complex Object Technologies for Digital Libraries , 2001 .
[13] Andrew S. Tanenbaum,et al. A DRM security architecture for home networks , 2004, DRM '04.
[14] Harald Tveit Alvestrand. The role of the standards process in shaping the Internet , 2004, Proceedings of the IEEE.
[15] Hector Garcia-Molina,et al. Detecting Digital Copyright Violations On The Internet , 1999 .
[16] Joseph Y. Halpern,et al. A formal foundation for XrML , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..