Digital rights management: Model, technology and application
暂无分享,去创建一个
[1] Sanjay Kadam,et al. A network based document management model to prevent data extrusion , 2016, Comput. Secur..
[2] Barbara Fox,et al. Encouraging recognition of fair uses in DRM systems , 2003, CACM.
[3] Abbas Foroughi,et al. Digital rights management: a delicate balance between protection and accessibility , 2002, J. Inf. Sci..
[4] Eberhard Becker,et al. Digital rights management : technological, economic, legal and political aspects , 2003 .
[5] Wang Lina,et al. A distribution model for data leakage prevention , 2013, Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC).
[6] Woei Lin,et al. Enhanced digital rights management authentication scheme based on smart card , 2013, IET Inf. Secur..
[7] David Forbes Lindsay,et al. Copyright, privacy and digital rights management (DRM) , 2006 .
[8] Marc Lemercier,et al. The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[9] Edward W. Felten. DRM and public policy , 2005, CACM.
[10] Hyung-Min Lim,et al. A License Audit Model for Secure DRM Systems in IP-based Environments , 2010, J. Inf. Process. Syst..
[11] Jinjun Chen,et al. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.
[12] Vallipuram Muthukkumarasamy,et al. A survey on data leakage prevention systems , 2016, J. Netw. Comput. Appl..
[13] Willem Jonker,et al. Privacy in an identity-based DRM system , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[14] John S. Erickson. Fair use, DRM, and trusted computing , 2003, CACM.
[15] Qin Bo,et al. Improving image copy-move forgery detection with particle swarm optimization techniques , 2016, China Communications.
[16] Bill Rosenblatt. DRM, law and technology: an American perspective , 2007, Online Inf. Rev..
[17] Ta Minh Thanh,et al. A proposal of digital rights management based on incomplete cryptography using invariant Huffman code length feature , 2013, Multimedia Systems.
[18] E. Diehl,et al. Copy protection system for digital home networks , 2004, IEEE Signal Processing Magazine.
[19] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[20] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[21] Dritan Kaleshi,et al. Securing the delivery of digital content over the Internet , 2002 .
[22] Yuval Elovici,et al. CoBAn: A context based model for data leakage prevention , 2014, Inf. Sci..
[23] Thomas S. Messerges,et al. Digital rights management in a 3G mobile phone and beyond , 2003, DRM '03.