Fair use, DRM, and trusted computing

被引:34
|
作者
Erickson, JS [1 ]
机构
[1] Hewlett Packard Labs, Digital Media Syst Program, Norwich, VT 05360 USA
关键词
D O I
10.1145/641205.641228
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:34 / 39
页数:6
相关论文
共 50 条
  • [1] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [2] Enforcing regional DRM for multimedia broadcasts with and without trusted computing
    Greveler, Ulrich
    [J]. DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 : 332 - 340
  • [3] A skeptical view of DRM and fair use
    Felten, EW
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (04) : 56 - 59
  • [4] A Fair-use DRM System based on Web Service
    Chen, Yu-Yi
    Wang, Yao-Jen
    Chen, Cheng-Jie
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 11 - +
  • [5] Trusted platforms, DRM, and beyond - Introduction
    Kuhlmann, D
    Gehring, RA
    [J]. DIGITAL RIGHTS MANAGEMENT: TECHNOLOGICAL, ECONOMIC, LEGAL AND POLITICAL ASPECTS, 2003, 2770 : 178 - 205
  • [6] An implementation of a trusted and secure DRM architecture
    Torres, Victor
    Delgado, Jaime
    Llorente, Silvia
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 312 - +
  • [7] Enriched Trusted Platform and its Application on DRM
    Wu, Yongdong
    Bao, Feng
    [J]. APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 91 - 97
  • [8] Nuovo DRM paradiso: Towards a verified fair DRM scheme
    Dashti, M. Torabi
    Nair, S. Krishnan
    Jonker, H. L.
    [J]. INTERNATIONAL SYMPOSIUM ON FUNDAMENTALS OF SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4767 : 33 - +
  • [9] Towards a Secure Fair MAC in Wireless Ad Hoc Networks Using Trusted Computing Technology
    Cheng, Andrew
    Li, Qiao
    Negi, Rohit
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1023 - 1028
  • [10] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414