1 resultado para Software Security
em Bulgarian Digital Mathematics Library at IMI-BAS
Filtro por publicador
- JISC Information Environment Repository (2)
- Repository Napier (4)
- University of Cagliari UniCA Eprints (1)
- Aberystwyth University Repository - Reino Unido (14)
- Adam Mickiewicz University Repository (3)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (6)
- Aquatic Commons (43)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (31)
- Aston University Research Archive (2)
- B-Digital - Universidade Fernando Pessoa - Portugal (2)
- Biblioteca Digital da Câmara dos Deputados (3)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (2)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (15)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (2)
- Boston University Digital Common (10)
- Bulgarian Digital Mathematics Library at IMI-BAS (1)
- CaltechTHESIS (1)
- Cambridge University Engineering Department Publications Database (74)
- Carolina Law Scholarship Repository (1)
- Center for Jewish History Digital Collections (3)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (82)
- Coffee Science - Universidade Federal de Lavras (2)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (1)
- CORA - Cork Open Research Archive - University College Cork - Ireland (7)
- Cornell: DigitalCommons@ILR (5)
- CUNY Academic Works (1)
- Digital Commons at Florida International University (1)
- Digital Peer Publishing (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (1)
- DRUM (Digital Repository at the University of Maryland) (4)
- Duke University (4)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (8)
- Funes: Repositorio digital de documentos en Educación Matemática - Colombia (8)
- Greenwich Academic Literature Archive - UK (25)
- Helda - Digital Repository of University of Helsinki (16)
- Indian Institute of Science - Bangalore - Índia (49)
- Infoteca EMBRAPA (11)
- Instituto Politécnico do Porto, Portugal (1)
- Massachusetts Institute of Technology (5)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (5)
- Portal de Revistas Científicas Complutenses - Espanha (1)
- QSpace: Queen's University - Canada (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (80)
- Queensland University of Technology - ePrints Archive (384)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (1)
- Repositório do ISCTE - Instituto Universitário de Lisboa (2)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (4)
- Research Open Access Repository of the University of East London. (4)
- Universidad de Alicante (1)
- Universidad del Rosario, Colombia (1)
- Universidad Politécnica de Madrid (2)
- Universidade Federal do Pará (1)
- Universidade Federal do Rio Grande do Norte (UFRN) (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (2)
- University of Michigan (2)
- University of Queensland eSpace - Australia (13)
Resumo:
The main requirements to DRM platforms implementing effective user experience and strong security measures to prevent unauthorized use of content are discussed. Comparison of hardware-based and software- based platforms is made showing the general inherent advantages of hardware DRM solutions. Analysis and evaluation of the main flaws of hardware platforms are conducted, pointing out the possibilities to overcome them. The overview of the existing concepts for practical realization of hardware DRM protection reveals their advantages and disadvantages and the increasing demand for creation of multi-core architecture, which could assure an effective DRM protection without decreasing the user’s freedom and importing risks for end system security.