Development of a methodology for piracy protection of software installations

被引:0
|
作者
Mumtaz, Saadia [1 ]
Iqbal, Sameen [1 ]
Hameed, Irfan [1 ]
机构
[1] Pakistan Inst Engn & Appl Sci, Dept Comp & Informat Sci, Islamabad, Pakistan
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the advent of illegal copying of software and pervasive access to the Internet, software protection has gained increasing importance. Therefore, a complete solution, that provides the software piracy protection capability, is required. It should allow one to protect his/her software applications against piracy, illegal use, or illegitimate copy. The authors surveyed current and promising techniques designed to reliably preserve and protect software installations vital to privacy and security. In this paper, the lines of attack have been chalked out under the light of research carried out to explore the known piracy problems and the case studies regarding the work-done in the context Of anti-piracy. Finally, a refined methodology, for secure electronic software distribution and installation has been clearly defined so that software companies do not go on forever, pouring money into development without fully realizing their legitimate profits to justify that expense.
引用
收藏
页码:596 / 602
页数:7
相关论文
共 50 条
  • [1] Software protection and software piracy
    Jha, Amit Kumar
    Rajan, Priyanka
    [J]. JOURNAL OF WORLD INTELLECTUAL PROPERTY, 2022, 25 (02): : 251 - 270
  • [2] PIRACY AND SOFTWARE PROTECTION
    KAPOR, M
    [J]. CREATIVE COMPUTING, 1984, 10 (11): : 236 - &
  • [3] SOFTWARE PIRACY AND PROTECTION
    WOLLMAN, J
    [J]. POPULAR COMPUTING, 1982, 1 (06): : 98 - &
  • [4] Development and software piracy
    Martinez-Sanchez, Francisco
    Romeu, Andres
    [J]. ECONOMICS-THE OPEN ACCESS OPEN-ASSESSMENT E-JOURNAL, 2018, 12
  • [5] HARDWARE PROTECTION AGAINST SOFTWARE PIRACY
    MAUDE, T
    MAUDE, D
    [J]. COMMUNICATIONS OF THE ACM, 1984, 27 (09) : 950 - 959
  • [6] SOFTWARE PIRACY - AN ANALYSIS OF PROTECTION STRATEGIES
    CONNER, KR
    RUMELT, RP
    [J]. MANAGEMENT SCIENCE, 1991, 37 (02) : 125 - 139
  • [7] Virtual leashing: Internet-based software piracy protection
    Dvir, O
    Herlihy, M
    Shavit, NN
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, : 283 - 292
  • [8] SOFTWARE PIRACY
    MCGREGORY, F
    [J]. PERSONAL COMPUTING, 1987, 11 (07): : 11 - 12
  • [9] SOFTWARE PIRACY
    KLEINFELD, AJ
    [J]. MICROCOMPUTING, 1982, 6 (06): : 22 - 22
  • [10] Software piracy
    Hoyle, Joe
    [J]. JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2007, 138 (07): : 948 - 948