Skip to main content

Combining DRM with Trusted Computing for Effective Information Access Management

Imad M. Abbadi and Muntaha Alawneh

Book Title
Proceedings of the 2nd Workshop on Practice and Theory of IT Security‚ Montreal−Canada
Month
Jan
Publisher
IEEE
Year
2008