-
1
-
-
0003338057
-
How Watermarking Add Value to Digital content
-
July
-
Acken, J. M., How Watermarking Add Value to Digital content, Communications of the ACM, Vol. 41, Issue 7, July, 1998.
-
(1998)
Communications of the ACM
, vol.41
, Issue.7
-
-
Acken, J.M.1
-
5
-
-
0003429331
-
-
tech. report TR2000-381, Dept. of Computer Science, Dartmouth College, Hanover, N.H.
-
Chen, G., Kotz, D., A Survey of Context-Aware Mobile Computing Research, tech. report TR2000-381, Dept. of Computer Science, Dartmouth College, Hanover, N.H., 2000.
-
(2000)
A Survey of Context-Aware Mobile Computing Research
-
-
Chen, G.1
Kotz, D.2
-
6
-
-
84900830868
-
Understanding and Using Context
-
February
-
Dey, A. K., Understanding and Using Context, Journal of Personal and Ubiquitous Computing, Vol. 5, No.1, pp. 4-7, February, 2001.
-
(2001)
Journal of Personal and Ubiquitous Computing
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.K.1
-
7
-
-
84957621961
-
Towards a Better Understanding of Context and Context-awareness
-
Dey, A. K., Abowd, G. D., Towards A Better Understanding of Context and Context-awareness, GVU Technical Report GITGVU- 99-22, pp. 304-307, 1999.
-
(1999)
GVU Technical Report GITGVU- 99-22
, pp. 304-307
-
-
Dey, A.K.1
Abowd, G.D.2
-
8
-
-
78649548376
-
A Four-Layer Model for Security of Digital Rights Management
-
Alexandria, Virginia, USA, October 27
-
Diehl Eric, A Four-Layer Model for Security of Digital Rights Management, DRM'08, Alexandria, Virginia, USA, October 27, 2008.
-
(2008)
DRM'08
-
-
Eric, D.1
-
10
-
-
0002422823
-
A Role Based Access Control Model and Reference Implementation within a Corporate Intranet
-
Ferraiolo, D. F., Barkley, J. F., Kuhn, D. R., A Role Based Access Control Model and Reference Implementation within a Corporate Intranet, ACM Transactions on Information and System Security, Vol. 1, Number 2, pp. 34-64, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.1
, Issue.2
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
15
-
-
38649120843
-
A Context, Rule and Role-Based Access Control Model in Enterprise Pervasive Computing Environment
-
August
-
Huang, X., Wang, H., Chen, Z., Lin, J., A Context, Rule and Role-Based Access Control Model in Enterprise Pervasive Computing Environment, Pervasive Computing and Applications, pp.497-502, August, 2006.
-
(2006)
Pervasive Computing and Applications
, pp. 497-502
-
-
Huang, X.1
Wang, H.2
Chen, Z.3
Lin, J.4
-
17
-
-
26044436573
-
A License Management Protocol for Protecting User Privacy and Digital Contents in Digital Rights Management System
-
August
-
Park, B. N., Kim, J. W., Lee, W., A License Management Protocol for Protecting User Privacy and Digital Contents in Digital Rights Management System, IEICE Transactions on Info and System, Vol. E88-D, No.8 pp. 1958-1965, August, 2005.
-
(2005)
IEICE Transactions on Info and System
, vol.E88-D
, Issue.8
, pp. 1958-1965
-
-
Park, B.N.1
Kim, J.W.2
Lee, W.3
-
18
-
-
77954344689
-
Integrating Content Management with Digital Rights Management - Imperatives and Opportunities for Digital Content Lifecycles
-
May
-
Rosenblatt, B., Dykstra, G., Integrating Content Management with Digital Rights Management - Imperatives and Opportunities for Digital Content Lifecycles, GiantSteps Media Technology Strategies and Dykstra Research, May, 2003.
-
(2003)
GiantSteps Media Technology Strategies and Dykstra Research
-
-
Rosenblatt, B.1
Dykstra, G.2
-
20
-
-
0030086382
-
Role-Based Access Control Models
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E., Role-Based Access Control Models, IEEE Computer, 29(2), pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
22
-
-
0028496909
-
Disseminating Active Map Information to Mobile Hosts
-
Schilit Bill, Theimer Marvin, Disseminating Active Map Information to Mobile Hosts, IEEE Network, Vol.8(5), pp. 22-32, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.5
, pp. 22-32
-
-
Bill, S.1
Marvin, T.2
|