13.07.2015 Views

WWW/Internet - Portal do Software Público Brasileiro

WWW/Internet - Portal do Software Público Brasileiro

WWW/Internet - Portal do Software Público Brasileiro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ISBN: 978-972-8939-25-0 © 2010 IADISREFERENCES[AVISPA-Manual] 2006. Automated Validation of <strong>Internet</strong> Security Protocols and Applications-AVISPA v1.1 UserManual Document Version: 1.1. http://www.avispa-project.org/package/user-manual.pdf.[Bar-El] Hagai Bar-El, 2005. Challenges of Standardizing Renewable Broadcast Security, White paper,www.hbarel.com/publications/Challenges_of_Standardizing_Renewable_Broadcast_Security.pdf[Grimen-DRM1] Gisle Grimen et al., 2006. Building Secure <strong>Software</strong>-based DRM systems, NIK-2006 conference,http://www.nik.no/.[Grimen-DRM2] Gisle Grimen et al., 2005, <strong>Software</strong>-based copy protection for temporal media during dissemination andplayback. In the 8 th international conference on Information Security and Cryptology - ICISC 2005. Springer-Verlag,Berlin Heidelberg, volume 3935 of LCNS, pp 62-377.[Jonker-CoreSec] H.L. Jonker and S. Mauw, 2007. Core Security Requirements of DRM Systems, Digital RightsManagement -- An Introduction. ICFAI University Press, pp 73-90.[Maña-Framework] Antonio Maña et al., 2004. A framework for secure execution of software. In International Journalof Information Security, Springer Berlin / Heidelberg. pp 99-112.[MPEG-4_IPMP] Ming Ji, SM Shen and Wenjun Zeng, 2004. MPEG-4 IPMP Extension- For Interoperable Protection ofMultimedia Content, EURASIP Journal on Applied Signal Processing, Special Issue on Multimedia Security andRights Management, pp. 2201-2213.[MPEG-4_IPMP-2] MPEG-4 IPMP Extension, Frequently Asked question, http://mpeg.chiariglione.org/faq/mp4-sys/sysfaq-ipmp-x.htm.[MPEG_Eval] HweeHwa Pang and Yong<strong>do</strong>ng Wu, 2005. Evaluation of MPEG-4 IPMP extension, Acoustics, Speech,and Signal Processing,. Proceedings. (ICASSP '05). IEEE International Conference, vol.2, no., pp. 18-23.[Nützel-DRM] Jürgen Nützel and Anja Beyer, 2006. How to Increase the Security of Digital Rights ManagementSystems Without Affecting Consumer's Security, ETRICS 2006, Springer-Verlag Berlin Heidelberg, LNCS 3995, pp.368 - 380.[OMA-DRM2.1] OMA, 2008. DRM Architecture Approved Version 2.1 – 14 Oct 2008, pp 1-28.http://www.openmobilealliance.org/technical/release_program/<strong>do</strong>cs/DRM/V2_1-20081106-A/OMA-AD-DRM-V2_1-20081014-A.pdf[Req-DRM] Barhoush, Malek and Atwood, J, 2010. Requirements for enforcing digital rights management in multicastcontent distribution, Telecommunication Systems, Springer Netherlands, volume 45, pp 3-20.[Stamp_digital] Mark Stamp, 2003, “Stamp: Digital Rights Management: The Technology Behind The Hype”, Journal ofElectronic Commerce Research, VOL. 4, NO. 3, pp 102-112.[<strong>WWW</strong>-FairPlay] sdebswrbh, FairPlay, In Art & Entertainment, http://articleleader.info/fairplay/, Accessed Sep 24,2010.72

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!