LicenseScript: a logical language for digital rights management
暂无分享,去创建一个
Yee Wei Law | Pieter H. Hartel | Sandro Etalle | Andrew Tokmakoff | Jeroen Doumen | Ricardo Corin | Cheun Ngen Chong | S. Etalle | P. Hartel | R. Corin | J. Doumen | A. Tokmakoff
[1] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[2] Krzysztof R. Apt,et al. Introduction to Logic Programming , 1988 .
[3] Leon Sterling,et al. The Art of Prolog , 1987, IEEE Expert.
[4] John Wylie Lloyd,et al. Foundations of Logic Programming , 1987, Symbolic Computation.
[5] Krzysztof R. Apt,et al. Logic Programming , 1990, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.
[6] Daniel Le Métayer,et al. The GAMMA Model and Its Discipline of Programming , 1990, Sci. Comput. Program..
[7] Wolfgang Thomas,et al. Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics , 1990 .
[8] Annalisa Bossi,et al. Proving Termination of Logic Programs by Exploiting Term Properties , 1991, TAPSOFT, Vol.2.
[9] Carl A. Gunter. Semantics of programming languages: structures and techniques , 1993, Choice Reviews Online.
[10] Dino Pedreschi,et al. Reasoning about Termination of Pure Prolog Programs , 1993, Inf. Comput..
[11] Danny De Schreye,et al. Termination of Logic Programs: The Never-Ending Story , 1994, J. Log. Program..
[12] Paul J. Krause,et al. The art of Prolog - second edition by Leon Sterling and Ehud Shapiro, MIT Press, Cambridge, MA 1994, pp 509, £19.95 (paperback), £44.94 (hardback), ISBN 0-262-19338-8 , 1995, The Knowledge Engineering Review.
[13] Sandro Etalle,et al. Layered Modes , 1996, J. Log. Program..
[14] Pascal Fradet,et al. Gamma and the Chemical Reaction Model: Fifteen Years After , 2000, WMP.
[15] Harold Boley,et al. Relationships between Logic Programming and RDF , 2000, PRICAI Workshops.
[16] Frank Hartung,et al. Watermarking of multimedia content for m-commerce applications , 2000 .
[17] Stephen Mooney,et al. Digital Rights Management: Business and Technology , 2001 .
[18] Carl A. Gunter,et al. Models and languages for digital rights , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[19] Riccardo Pucella,et al. A logic for reasoning about digital rights , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[20] David M. Eyers,et al. PoX: Merging Prolog and XML databases , 2002, Australasian Document Computing Symposium.
[21] Deirdre K. Mulligan,et al. Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.
[22] L. Jean Camp,et al. DRM: doesn't really mean digital copyright management , 2002, CCS '02.
[23] John DeTreville,et al. Binder, a logic-based security language , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[24] Siani Pearson,et al. Trusted Computing Platforms: TCPA Technology in Context , 2002 .
[25] S.A.F.A. van den Heuvel,et al. Secure content management in authorised domains , 2002 .
[26] Pieter H. Hartel,et al. Security Attributes Based Digital Rights Management , 2002, IDMS/PROMS.
[27] Yee Wei Law,et al. LicenseScript: a novel digital rights language and its semantics , 2003, Proceedings Third International Conference on WEB Delivering of Music.
[28] Pieter H. Hartel,et al. Secure Audit Logging with Tamper-Resistant Hardware , 2003, SEC.
[29] Pamela Samuelson,et al. DRM {and, or, vs.} the law , 2003, CACM.
[30] Pamela Samuelson. Digital Rights Management {and, or, vs.} the Law , 2003 .
[31] Susanne Guth. Rights Expression Languages , 2003, Digital Rights Management.
[32] Pieter H. Hartel,et al. Comparing Logic-Based and XML-Based Rights Expression Languages , 2003, OTM Workshops.
[33] Tricia Gill,et al. Microsoft Windows Media Resource Kit , 2003 .
[34] Jeffrey B. Lotspiech,et al. Anonymous trust: digital rights management using broadcast encryption , 2004, Proceedings of the IEEE.
[35] Andrew S. Tanenbaum,et al. A DRM security architecture for home networks , 2004, DRM '04.
[36] Steve Mitchell,et al. The long march to interoperable digital rights management , 2004, Proceedings of the IEEE.
[37] Pieter H. Hartel,et al. License Protection with a Tamper-Resistant Token , 2004, WISA.
[38] Jerry den Hartog,et al. An audit logic for accountability , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[39] Max Bramer. Logic Programming with Prolog , 2005, Springer London.
[40] Ninghui Li,et al. Beyond proof-of-compliance: security analysis in trust management , 2005, JACM.
[41] Pieter H. Hartel,et al. Service Brokerage in Prolog , 2005, ICEIS.
[42] Pieter H. Hartel,et al. StreamTo: Streaming Content using a Tamper-Resistant Token , 2005, SEC.
[43] Ahmed Obied,et al. Broadcast Encryption , 2008, Encyclopedia of Multimedia.