Citation: | “A Personal DRM Scheme Based on Social Trust,” Chinese Journal of Electronics, vol. 21, no. 4, pp. 719-724, 2012, |
J.S. Erickson, “Fair use, DRM, and trusted computing”, Communicationsof the ACM, Vol.46, No.4, pp.34-39, 2003.
|
S. Bhatt, R. Sion, B. Carbunar, “A personal mobile DRM managerfor smartphones”, Computers & Security, Vol.28, No.6,pp.327-340, 2009.
|
Z. Zhang, Q. Pei, J. Ma et al., “Security and trust in digitalrights management: A survey”, International Journal of NetworkSecurity, Vol.9, No.3, pp.247-263, 2009.
|
Z. Zhang, Q. Pei, J. Ma et al., “Establishing multi-party trustarchitecture for DRM by using game-theoretic analysis of securitypolicies”, Chinese Journal of Electronics, Vol.18, No.3,pp.519-524, 2009.
|
Microsoft Information Rights Management, http://office.microsoft.com/en-in/excel-help/information-rights-management-inthe-2007-microsoft-office-system-HA010102918.aspx
|
Voltage SecureFile, http://www.voltage.com/products/sfclient.htm
|
C.C. Marshall, S. Bly, “Sharing encountered information: Digitallibraries get a social life”, Proc. of Joint ACM/IEEE Conferenceon Digital Libraries (JCDL), Tucson, Arizona, USA,pp.218-227, 2004.
|
S.P. Marsh, “Formalizing trust as a computational concept”,Ph.D. Thesis, University of Stirling, UK, 1994.
|
C.R. McInerney, S. Mohr, “Trust and knowledge sharing in organizations:Theory and practice”, Information Science andKnowledge Management, Vol.12, No.5, pp.65-86, 2007.
|
C. Collberg, J. Nagra, Surreptitious Software: Obfuscation,Watermarking, and Tamperproofing for Software Protection,Pearson Education, Massachusetts, USA, pp.401-464, 2010.
|
A. Abdul-Rahman, S. Halles, “A distributed trust model”, Proc.of the 1997 Workshop on New Security Paradigms, Langdale,Cumbria, UK, pp.48-60, 1998.
|
Y. Sun, W. Yu, Z. Han, K.J.R. Liu, “Information theoreticframework of trust modeling and evaluation for ad hoc networks”,IEEE Journal on Selected Areas in Communications(J-SAC), Special Issue on Security in Wireless Ad Hoc Networks,Vol.24, No.2, pp.305-317, 2006.
|
A. Josang, “An algebra for assessing trust in certificationchains”, Proc. of Network and Distributed Systems SecuritySymposium (NDSS), San Diego, California, USA, pp.1-10,1999.
|
A. Josang, M. Daniel, “Strategies for combining conflicting dogmaticbeliefs”, Proc. of 6th International Conference on InformationFusion, Cairns, Australia, pp.1133-1140, 2003.
|
M.J. Atallah, M. Blanton, N. Fazio, K.B. Frikken, “Dynamicand efficient key management for access hierarchies”, ACMTransactions on Information and System Security (TISSEC),Vol.12, No.3, Article 18, pp.1-43, 2009.
|
Y. Zhu, Z. Hu, H. Wang, H. Hu, G.J. Ahn, “A collaborativeframework for privacy protection in Online Social Networks”,Proc. of 6th International Conference on Collaborative Computing:Networking, Applications and Worksharing (CollaborateCom),Chicago, Illinois, USA, pp.1-15, 2010.
|