Combining DRM with Trusted Computing for Effective Information Access Management

Bibliographic Details
Main Authors: Abbadi, I, Alawneh, M
Format: Conference item
Published: IEEE 2008
_version_ 1797088334231633920
author Abbadi, I
Alawneh, M
author_facet Abbadi, I
Alawneh, M
author_sort Abbadi, I
collection OXFORD
description
first_indexed 2024-03-07T02:48:32Z
format Conference item
id oxford-uuid:acdebaf9-a845-4252-9039-73e7d24cafc1
institution University of Oxford
last_indexed 2024-03-07T02:48:32Z
publishDate 2008
publisher IEEE
record_format dspace
spelling oxford-uuid:acdebaf9-a845-4252-9039-73e7d24cafc12022-03-27T03:31:45ZCombining DRM with Trusted Computing for Effective Information Access ManagementConference itemhttp://purl.org/coar/resource_type/c_5794uuid:acdebaf9-a845-4252-9039-73e7d24cafc1Department of Computer ScienceIEEE2008Abbadi, IAlawneh, M
spellingShingle Abbadi, I
Alawneh, M
Combining DRM with Trusted Computing for Effective Information Access Management
title Combining DRM with Trusted Computing for Effective Information Access Management
title_full Combining DRM with Trusted Computing for Effective Information Access Management
title_fullStr Combining DRM with Trusted Computing for Effective Information Access Management
title_full_unstemmed Combining DRM with Trusted Computing for Effective Information Access Management
title_short Combining DRM with Trusted Computing for Effective Information Access Management
title_sort combining drm with trusted computing for effective information access management
work_keys_str_mv AT abbadii combiningdrmwithtrustedcomputingforeffectiveinformationaccessmanagement
AT alawnehm combiningdrmwithtrustedcomputingforeffectiveinformationaccessmanagement