{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:23Z","timestamp":1725558683227},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_28","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"326-337","source":"Crossref","is-referenced-by-count":6,"title":["Towards Multilateral-Secure DRM Platforms"],"prefix":"10.1007","author":[{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"first","affiliation":[]},{"given":"Christian","family":"St\u00fcble","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Alkassar, A., Sadeghi, A.-R., St\u00fcble, C.: Secure object identification - or: Solving the chess grandmaster problem. In: Proceedings of the New Security Paradigm Workshow (NSPW), pp. 77\u201386 (2003)","DOI":"10.1145\/986655.986668"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Altmeyer, O., Sadeghi, A.-R., Selhorst, M., St\u00fcble, C.: Enhancing security of computing platforms with TC-technology. In: Information Security Solutions Europe (ISSE 2004), pp. 346\u2013361. Vieweg Verlag (2004)","DOI":"10.1007\/978-3-322-84984-7_34"},{"key":"28_CR3","unstructured":"Anderson, R.J.: Security in open versus closed systems \u2014 the dance of Boltzmann, Coase and Moore. Technical report, Cambridge University, England (2002)"},{"key":"28_CR4","first-page":"65","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"W.A. Arbaugh","year":"1997","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1997, pp. 65\u201371. IEEE Computer Society, Los Alamitos (1997), Technical Committee on Security and Privacy"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Buhse, W.: Implication of digital rights management for online music \u2013 a business perspective. In: ACM DRM Workshop, pp. 201\u2013212 (2001)","DOI":"10.1007\/3-540-47870-1_13"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Burk, D.L., Cohen, J.E.: Fair use infrastructure for rights management systems. Harward Journal of Law and Technology\u00a015(1) (2001)","DOI":"10.2139\/ssrn.239731"},{"key":"28_CR7","unstructured":"ElcomSoft. ebook security: theory and practice (July 2001), http:\/\/www.download.ru\/defcon.ppt"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Erickson, J.S.: Fair use, DRM, and trusted computing. Communications of ACM\u00a046(4) (2003)","DOI":"10.1145\/641205.641228"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Fox, B.L., LaMacchia, B.: Encouraging recognition of fair uses in DRM systems. Communications of ACM\u00a046(4) (2003)","DOI":"10.1145\/641205.641233"},{"issue":"7","key":"28_CR10","first-page":"64","volume":"37","author":"N.M. Gleb Nauvomich","year":"2003","unstructured":"Gleb Nauvomich, N.M.: Preventing piracy, reverse engineering, and tampering. Computer\u00a037(7), 64\u201371 (2003)","journal-title":"Computer"},{"key":"28_CR11","unstructured":"Group, T.C.: TPM main specification. Version 1.2 (November 2003), http:\/\/www.trustedcomputinggroup.org"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Guth, S.: A sample DRM system. In: Digital Rights Management, Technological, Economics, Legal and Political Aspects, pp. 150\u2013161 (2003)","DOI":"10.1007\/10941270_11"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/3-540-47719-5_12","volume-title":"Information Security and Privacy","author":"N. Itoi","year":"2001","unstructured":"Itoi, N., Arbaugh, W.A., Pollack, S.J., Reeves, D.M.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 130\u2013144. Springer, Heidelberg (2001)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Liedke, J.: On u-kernel construction. In: Proceedings of the 15th ACM Symposium on Operating Systems Principles (SOSP 1995), Copper Mountain Resort, Colorado (December 1995), Appeared as ACM Operating Systems Review 29.5.","DOI":"10.1145\/224056.224075"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Liedke, J.: Towards real micro-kernels. Communications of the ACM\u00a039(9) (1996)","DOI":"10.1145\/234215.234473"},{"issue":"3","key":"28_CR16","first-page":"219","volume":"2","author":"N.A. Lynch","year":"1989","unstructured":"Lynch, N.A., Tuttle, M.R.: An introduction to Input\/Output automata. CWI-Quarterly\u00a02(3), 219\u2013246 (1989)","journal-title":"CWI-Quarterly"},{"issue":"4","key":"28_CR17","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/641205.641227","volume":"46","author":"D.K. Mulligan","year":"2003","unstructured":"Mulligan, D.K.: Digital rights management and fair use by design. Communications of the ACM\u00a046(4), 31\u201333 (2003)","journal-title":"Communications of the ACM"},{"key":"28_CR18","unstructured":"National Research Council. The Digital Dilemma, Intellectual Property in the Information Age. National Academy Press, Washington DC (2000)"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Riordan, J., St\u00fcble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory (April 2001)","DOI":"10.1007\/978-3-663-05918-9_1"},{"key":"28_CR20","unstructured":"Pfitzmann, B., Schunter, M., Waidner, M.: Cryptographic security of reactive systems. In: Electronic Notes in Theoretical Computer Science (ENTCS). Workshop on Secure Architectures and Information Flow, Royal Holloway, University of London, December 1 - 3 (1999)"},{"key":"28_CR21","unstructured":"Pfitzmann, B., Schunter, M., Waidner, M.: Provably secure certified mail. Research Report RZ 3207 (#93253), IBM Research (August 2000)"},{"key":"28_CR22","unstructured":"Poritz, J., Schunter, M., Herreweghen, E.V., Waidner, M.: Property attestation\u2014scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research (May 2004)"},{"key":"28_CR23","volume-title":"Digital Rights Management: Business and Technology","author":"W. Rosenblatt","year":"2001","unstructured":"Rosenblatt, W., Trippe, W., Mooney, S.: Digital Rights Management: Business and Technology. John Wiley & Sons, Chichester (2001)"},{"key":"28_CR24","unstructured":"Sadeghi, A.-R., St\u00fcble, C.: Bridging the gap between TCPA\/Palladium and personal security. Technical report, Saarland University, Germany (2003)"},{"key":"28_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-540-24591-9_22","volume-title":"Information Security Applications","author":"A.-R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.-R., St\u00fcble, C.: Taming \u201ctrusted computing\u201d by operating system design. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 286\u2013302. Springer, Heidelberg (2004)"},{"key":"28_CR26","volume-title":"The 2004 New Security Paradigms Workshop","author":"A.-R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.-R., St\u00fcble, C.: Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: The 2004 New Security Paradigms Workshop. ACM SIGSAC, Virginia Beach, VA, USA, September 2004. ACM Press, New York (2004)"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., St\u00fcble, C.: Towards multilateral-secure drm platforms. Technical report, Horst G\u00f6rtz Institute, Ruhr-University Bochum (January 2005)","DOI":"10.1007\/978-3-540-31979-5_28"},{"issue":"4","key":"28_CR28","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/641205.641229","volume":"46","author":"P. Samuelson","year":"2003","unstructured":"Samuelson, P.: DRM, AND, OR, VS, The Law. Communications of ACM\u00a046(4), 41\u201345 (2003)","journal-title":"Communications of ACM"},{"key":"28_CR29","unstructured":"Trusted Computing Platform Alliance (TCPA). Main specification, Version 1.1b (February 2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:32:39Z","timestamp":1605760359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}