Stanford CIS
Stefan Bechtold

Stefan Bechtold

Recent articles

Blog

Alternative Compensation Systems

Over the last few months, alternative compensation systems, in particular levy systems, have become a new focus of the copyright debate. Personally, I think tho…

Blog

Article 29 Report

Article 29 Data Protection Working Party, Working Document on Trusted Computing Platforms and in particular on the work done by the Trusted Computing Group (TCG…

Blog

Article 29 Working Party Report

The Article 29 Data Protection Working Party, which is an independent European advisory body on data protection and privacy under the European Data Protection D…

Blog

Sadeghi, Taming TC

Ahmad-Reza Sadeghi & Christian Stüble, Taming "Trusted Platforms" by Operating System Design, in: Chae & Yung (eds.), 4th International Worksh…

Blog

Owner Override IV

There are also areas outside trusted computing where something like an owner override feature already exists. Some web browsers (such as Safari, Opera, and Konq…

Blog

Creating a World Economy for MMPOGs

In a fascinating article, BBC News describes services which allow players of massively multi-player online games (MMPOGs) such as Everquest to exchange currenci…

Blog

Woodford Colo. L. Rev.

Chad Woodford, Trusted Computing or Big Brother? Putting the Rights Back in Digital Rights Management, 75 University of Colorado Law Review 253 (2004).…

Blog

IBM/Sailer paper

Rainer Sailer et. al., Design and Implementation of a TCG-Based Integrity Measurement Architecture, January 16, 2004. Written by researchers at the IBM Watson R…

Blog

Roemer UCLA J. L. Tech.

Ryan Roemer, Trusted Computing, Digital Rights Management, and the Fight for Copyright Control on Your Computer, 2003 UCLA Journal of Law & Technology 8 (20…

Blog

German Government

German Government, Comments on the TCG and NGSCB in the Field of Trusted Computing, 2003.…