메뉴 건너뛰기




Volumn 42, Issue 4, 2012, Pages 409-430

A novel watermarking method for software protection in the cloud

Author keywords

cloud computing; software protection; watermarking

Indexed keywords

INSIDER THREAT; LOCAL NETWORKS; RAPID DEVELOPMENT; SECURITY BREACHES; SOFTWARE APPLICATIONS; SOFTWARE DISTRIBUTIONS; SOFTWARE PROTECTION; SOFTWARE WATERMARKING;

EID: 84858080984     PISSN: 00380644     EISSN: 1097024X     Source Type: Journal    
DOI: 10.1002/spe.1088     Document Type: Article
Times cited : (14)

References (28)
  • 5
    • 77956356055 scopus 로고    scopus 로고
    • Trusted cloud computing with secure resources and data coloring
    • DOI: 10.1109/MIC.2010.86
    • Hwang K, Li D, Trusted cloud computing with secure resources and data coloring. IEEE Internet Computing 2010; 14 (5): 14-22. DOI: 10.1109/MIC.2010.86.
    • (2010) IEEE Internet Computing , vol.14 , Issue.5 , pp. 14-22
    • Hwang, K.1    Li, D.2
  • 7
    • 68249129760 scopus 로고    scopus 로고
    • Above the clouds: A Berkeley view of cloud computing
    • EECS Department, University of California, Berkeley, February
    • Armbrust M, Above the clouds: A Berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, February 2009.
    • (2009) Technical Report UCB/EECS-2009-28
    • Armbrust, M.1
  • 10
    • 64249107623 scopus 로고    scopus 로고
    • Recent advances in multimedia information system security
    • Lian S, Kanellopoulos D, Ruffo G, Recent advances in multimedia information system security. Informatica (Slovenia) 2009; 33 (1): 3-24.
    • (2009) Informatica (Slovenia) , vol.33 , Issue.1 , pp. 3-24
    • Lian, S.1    Kanellopoulos, D.2    Ruffo, G.3
  • 12
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, Information Technology, and Health Care
    • Rindfleisch TC, Privacy, information technology, and health care. Communications of the ACM 1997; 40 (8): 93-100. (Pubitemid 127440144)
    • (1997) Communications of the ACM , vol.40 , Issue.8 , pp. 93-100
    • Rindfleisch, T.C.1
  • 13
    • 84858080748 scopus 로고    scopus 로고
    • Identity Theft Resource Center
    • Identity Theft Resource Center. Data breaches, 2007-2009.
    • (2007) Data Breaches
  • 15
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation-Tools for software protection
    • Collberg C, Thomborson C, Watermarking, tamper-proofing, and obfuscation-Tools for software protection. IEEE Transactions on Software Engineering 2002; 28 (8): 735-746.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 16
    • 34547374329 scopus 로고    scopus 로고
    • Recognition in software watermarking
    • DOI 10.1145/1178766.1178776, Proceedings of the ACM International Workshop on Multimedia Contents Protection and Security, MCPS 2006
    • Zhu W, Thomborson C, Recognition in software watermarking. First ACM International Workshop on Content Protection and Security (MCPS 06). ACM: New York, NY, U.S.A., 2006; 29-36. DOI:. (Pubitemid 47154930)
    • (2006) Proceedings of the ACM International Multimedia Conference and Exhibition , pp. 29-36
    • Zhu, W.1    Thomborson, C.2
  • 20
  • 21
    • 77954700247 scopus 로고    scopus 로고
    • A framework for system security
    • In, Stamp M. Stavroulakis P. (eds). Springer: Berlin, DOI: 10.1007/978-3-642-04117-4-1
    • Thomborson C, A framework for system security. In Handbook of Information and Communication Security, Stamp M, Stavroulakis P, (eds). Springer: Berlin, 2010; 3-20. DOI: 10.1007/978-3-642-04117-4-1.
    • (2010) Handbook of Information and Communication Security , pp. 3-20
    • Thomborson, C.1
  • 26
    • 33645758539 scopus 로고    scopus 로고
    • Software watermarking via opaque predicates: Implementation, analysis, and attacks
    • DOI 10.1007/s10660-006-6955-z
    • Myles G, Collberg C, Software watermarking via opaque predicates: Implementation, analysis, and attacks. Electronic Commerce Research 2006; 6 (2): 155-171. (Pubitemid 43560168)
    • (2006) Electronic Commerce Research , vol.6 , Issue.2 , pp. 155-171
    • Myles, G.1    Collberg, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.