Combining DRM with Trusted Computing for Effective Information Access Management
Imad M. Abbadi and Muntaha Alawneh
Book Title
Proceedings of the 2nd Workshop on Practice and Theory of IT Security‚ Montreal−Canada
Month
Jan
Publisher
IEEE
Year
2008
Imad M. Abbadi and Muntaha Alawneh