Abstract | ||
---|---|---|
It is not immediately obvious why a book on Digital Rights Management should include a chapter about Trusted Computing, although
a number of publications have investigated the suitability of trusted systems as rights management platform. Until recently,
however, they have been of little more than remote interest for DRM as well as for typical business or consumer environments,
as they were considered to be inflexible and cumbersome to manage.
|
Year | DOI | Venue |
---|---|---|
2003 | 10.1007/10941270_13 | Digital Rights Management |
Keywords | Field | DocType |
trusted computing | Trusted client,Trusted Network Connect,Internet privacy,Trusted Computing,Computer science,Computer security,Trusted Platform Module,Direct Anonymous Attestation,Trusted service manager,Security policy,Digital rights management | Conference |
Citations | PageRank | References |
2 | 0.51 | 1 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Dirk Kuhlmann | 1 | 61 | 4.84 |
Robert A. Gehring | 2 | 2 | 1.18 |