Software protection

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chemical Engineering Software and Legal Protection Thereof

In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the                market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy.  This paper explores the ...

متن کامل

Advanced Software Protection Now

We introduce a novel software-protection method, which can be fully implemented with today’s technologies, that provides traitor tracing and license-enforcement functionalities, and requires no additional hardware nor inter-connectivity other than those needed to execute the respective protected software. In [1] authors introduce the secure triggers and show that it is secure, modulo the existe...

متن کامل

Revisiting Software Protection

We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography. We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions.

متن کامل

Gradual Software-Based Memory Protection

Software-based memory protection (MP) provides not only spatial isolation of different applications, but also additional means to detect programming errors within an application. However, this luxury comes at the cost of extra runtime checks that add overhead to the application. In this paper, we present the idea of gradual software-based MP, where we only add a subset of runtime checks to a pr...

متن کامل

Protection Reconfiguration for Reusable Software

Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clients and servers). This code is often specific to the application and to the context in which the application is used. Embedding protection definitions in the application code makes it difficult to reuse because differe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1991

ISSN: 0028-0836,1476-4687

DOI: 10.1038/353199e0