DRM and Competition on Downstream Markets
Over the last two years, cases in which companies used DRM technology and the anti-circumvention provisions of the DMCA in order to control downstream markets a…
Over the last two years, cases in which companies used DRM technology and the anti-circumvention provisions of the DMCA in order to control downstream markets a…
Ahmad-Reza Sadeghi & Christian Stüble, Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms, New Security Paradigms…
BusinessWeek has published an interview with Linus Torvalds. First question: "What are the biggest challenges facing Linux?" Answer: "From a te…
Recently, the United States and Australia have concluded a free trade agreement. Chapter 17 of the agreement includes some rather detailed provisions relating t…
Trusted Computing Group Clarifications for the German Insurance Industry Association paper "The Threat, Trusted Computing, to the German Insurance Industry…
Apple's refusal to license its FairPlay DRM system used in iTunes to RealNetworks and RealNetworks' subsequent attempt to create interoperability by rev…
It is not only the United States where the content industry is taking an agressive approach towards its customers. In Germany, a lobbying organization of German…
After the European Union had harmonized the copyright term of its Member States' copyright laws to 70 years post mortem auctoris, the United States enacted…
Rachel Greenstadt & Jean-Francois Raymond, Applications of Trusted Computing for Medical Privacy, PORTIA workshop, Stanford, June 15, 2004.…
Catherine Flick, The Controversy over Trusted Computing, University of Sydney B.Sc. thesis, June 2004.…
Vivek Haldar, Deepak Chandra & Michael Franz, Semantic Remote Attestation - A Virtual Machine directed approach to Trusted Computing, in: Proceedings of the…
Jan Camenish, Better Privacy for Trusted Computing Platforms, in: Samarati (ed.), European Symposium on Research in Computer Security 2004, Lecture Notes in Com…