Digital Rights Management: Business and Technology
Digital Rights Management: Business and Technology
Authenticated Operation of Open Computing Devices
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Security architectures for controlled digital information dissemination
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
How DRM-based content delivery systems disrupt expectations of "personal use"
Proceedings of the 3rd ACM workshop on Digital rights management
OREL: an ontology-based rights expression language
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
Fairer usage contracts for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
A trustworthy end-to-end key management scheme for digital rights management
MULTIMEDIA '06 Proceedings of the 14th annual ACM international conference on Multimedia
Enforcing DRM policies across applications
Proceedings of the 8th ACM workshop on Digital rights management
Sindice.com: a document-oriented lookup index for open linked data
International Journal of Metadata, Semantics and Ontologies
Problem Analyses and Recommendations in DRM Security Policies
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Wake up or fall asleep-value implication of trusted computing
Information Technology and Management
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
A method of fair use in digital rights management
ICADL'07 Proceedings of the 10th international conference on Asian digital libraries: looking back 10 years and forging new frontiers
FORM: a federated rights expression model for open DRM frameworks
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
A PKI based digital rights management system for safe playback
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Towards multilateral-secure DRM platforms
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A model for flexible service use and secure resource management
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
A privacy-friendly architecture for future cloud computing
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
How can DRM architectures protect historical copyright limitations like fair use while ensuring the security and property interests of copyright owners?