License Protection with a Tamper-Resistant Token
暂无分享,去创建一个
[1] J. W. Lloyd,et al. Foundations of logic programming; (2nd extended ed.) , 1987 .
[2] Charles A. Shoniregun,et al. Securing XML Documents , 2004, Australas. J. Inf. Syst..
[3] Z. Chen. Java Card Technology for Smart Cards: Architecture and Programmer''s Guide. The Java Series. Addis , 2000 .
[4] Richard E. Ladner,et al. Algorithms for dynamic multicast key distribution trees , 2003, PODC '03.
[5] Dieter Gollmann,et al. Software License Management with Smart Cards , 1999, Smartcard.
[6] Jaehong Park,et al. Towards usage control models: beyond traditional access control , 2002, SACMAT '02.
[7] Siani Pearson,et al. Trusted Computing Platforms: TCPA Technology in Context , 2002 .
[8] John Wylie Lloyd,et al. Foundations of Logic Programming , 1987, Symbolic Computation.
[9] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[10] Sandro Etalle,et al. An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.
[11] Pieter H. Hartel,et al. Security Attributes Based Digital Rights Management , 2002, IDMS/PROMS.
[12] Pascal Fradet,et al. Gamma and the Chemical Reaction Model: Fifteen Years After , 2000, WMP.
[13] Elisa Bertino,et al. Controlled access and dissemination of XML documents , 1999, WIDM '99.
[14] Bruce Schneier,et al. Cryptographic Support for Secure Logs on Untrusted Machines , 1998, USENIX Security Symposium.
[15] Pieter H. Hartel,et al. Secure Audit Logging with Tamper-Resistant Hardware , 2003, SEC.
[16] Mikhail J. Atallah,et al. Enhanced smart-card based license management , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[17] Pieter H. Hartel,et al. Service Brokerage in Prolog , 2005, ICEIS.
[18] Yee Wei Law,et al. LicenseScript: a novel digital rights language and its semantics , 2003, Proceedings Third International Conference on WEB Delivering of Music.