( 23 of 23 ) |
United States Patent | 6,938,021 |
Shear , et al. | August 30, 2005 |
Rights management information is used at least in part in a matching, narrowcasting, classifying and/or selecting process. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting. The matching and classification utility system may match, narrowcast, classify and/or select people and/or things, non-limiting examples of which include software objects. The Matching and Classification Utility system may use any pre-existing classification schemes, including at least some rights management information and/or other qualitative and/or parameter data indicating and/or defining classes, classification systems, class hierarchies, category schemes, class assignments, category assignments, and/or class membership. The Matching and Classification Utility may also use at least some rights management information together with any artificial intelligence, expert system, statistical, computational, manual, or any other means to define new classes, class hierarchies, classification systems, category schemes, and/or assign persons, things, and/or groups of persons and/or things to at least one class.
Inventors: | Shear; Victor H. (Bethesda, MD), Van Wie; David M. (Sunnyvale, CA), Weber; Robert P. (Menlo Park, CA) |
Assignee: |
Intertrust Technologies Corporation
(Sunnyvale,
CA)
|
Appl. No.: | 10/272,903 |
Filed: | October 18, 2002 |
Application Number | Filing Date | Patent Number | Issue Date | ||
498369 | Feb., 2000 | ||||
965185 | Nov., 1997 | 6112181 | |||
Current U.S. Class: | 705/67 |
Current International Class: | G08B 5/36 (20060101); G08B 5/22 (20060101); G06F 017/00 () |
Field of Search: | 705/67,1,50,51,52,53,54,26 |
3573747 | April 1971 | Adams et al. |
3609697 | September 1971 | Blevins |
3790700 | February 1974 | Callais et al. |
3796830 | March 1974 | Smith |
3798359 | March 1974 | Feistel |
3798360 | March 1974 | Feistel |
3798605 | March 1974 | Feistel |
3806874 | April 1974 | Ehrat |
3806882 | April 1974 | Clarke |
3829833 | August 1974 | Freeny |
3845391 | October 1974 | Crosby |
3906448 | September 1975 | Henriques |
3911397 | October 1975 | Freeny |
3924065 | December 1975 | Freeny |
3931504 | January 1976 | Jacoby |
3946200 | March 1976 | Juodikis |
3946220 | March 1976 | Brobeck et al. |
3956615 | May 1976 | Anderson et al. |
3958081 | May 1976 | Ehrsam et al. |
3970992 | July 1976 | Boothroyd et al. |
3996449 | December 1976 | Attanasio et al. |
4020326 | April 1977 | Coulthurst |
4048619 | September 1977 | Forman et al. |
4071911 | January 1978 | Mazur |
4104721 | August 1978 | Markstein et al. |
4112421 | September 1978 | Freeny |
4120030 | October 1978 | Johnstone |
4162483 | July 1979 | Entenman |
4163280 | July 1979 | Mori et al. |
4168396 | September 1979 | Best |
4183085 | January 1980 | Roberts et al. |
4196310 | April 1980 | Forman et al. |
4200913 | April 1980 | Kuhar et al. |
4209787 | June 1980 | Freeny |
4217588 | August 1980 | Freeny |
4220991 | September 1980 | Hamano et al. |
4232193 | November 1980 | Gerard |
4232317 | November 1980 | Freeny |
4236217 | November 1980 | Kennedy |
4246638 | January 1981 | Thomas |
4253157 | February 1981 | Kirschner et al. |
4259720 | March 1981 | Campbell |
4262329 | April 1981 | Bright et al. |
4265371 | May 1981 | Desai et al. |
4270182 | May 1981 | Asija |
4278837 | July 1981 | Best |
4305131 | December 1981 | Best |
4306289 | December 1981 | Lumley |
4309569 | January 1982 | Merkle |
4319079 | March 1982 | Best |
4321672 | March 1982 | Braun et al. |
4323921 | April 1982 | Guillou |
4328544 | May 1982 | Baldwin et al. |
4337483 | June 1982 | Guillou |
4361877 | November 1982 | Dyer et al. |
4375579 | March 1983 | Davida et al. |
4405829 | September 1983 | Rivest et al. |
4433207 | February 1984 | Best |
4434464 | February 1984 | Suzuki et al. |
4442484 | April 1984 | Childs, Jr. et al. |
4442486 | April 1984 | Mayer |
4446519 | May 1984 | Thomas |
4454594 | June 1984 | Heffron et al. |
4458315 | July 1984 | Uchenick |
4462076 | July 1984 | Smith |
4462078 | July 1984 | Ross |
4465901 | August 1984 | Best |
4471163 | September 1984 | Donald et al. |
4471216 | September 1984 | Herve |
4484217 | November 1984 | Block et al. |
4494156 | January 1985 | Kadison et al. |
4513174 | April 1985 | Herman |
4523271 | June 1985 | Levien |
4525599 | June 1985 | Curran et al. |
4528588 | July 1985 | Lofberg |
4528643 | July 1985 | Freeny |
4529870 | July 1985 | Chaum |
4553252 | November 1985 | Egendorf |
4558176 | December 1985 | Arnold et al. |
4558413 | December 1985 | Schmidt et al. |
4562305 | December 1985 | Gaffney, Jr. |
4562306 | December 1985 | Chou et al. |
4562495 | December 1985 | Bond et al. |
4573119 | February 1986 | Westheimer et al. |
4577289 | March 1986 | Comerford et al. |
4578530 | March 1986 | Zeidler |
4584639 | April 1986 | Hardy |
4584641 | April 1986 | Guglielmino |
4588991 | May 1986 | Atalla |
4589064 | May 1986 | Chiba et al. |
4590552 | May 1986 | Guttag et al. |
4593183 | June 1986 | Fukatsu |
4593353 | June 1986 | Pickholtz |
4593376 | June 1986 | Volk |
4595950 | June 1986 | Lofberg |
4597058 | June 1986 | Izumi et al. |
4598288 | July 1986 | Yarbrough et al. |
4599489 | July 1986 | Cargile |
4609777 | September 1986 | Cargile |
4609985 | September 1986 | Dozier |
4621321 | November 1986 | Boebert et al. |
4621334 | November 1986 | Garcia |
4622222 | November 1986 | Horvath et al. |
4634807 | January 1987 | Chorley et al. |
4644493 | February 1987 | Chandra et al. |
4646234 | February 1987 | Tolman et al. |
4652990 | March 1987 | Pailen et al. |
4658093 | April 1987 | Hellman |
4670857 | June 1987 | Rackman |
4672572 | June 1987 | Alsberg |
4672605 | June 1987 | Hustig et al. |
4677434 | June 1987 | Fascenda |
4677552 | June 1987 | Sibley, Jr. |
4680731 | July 1987 | Izumi et al. |
4683553 | July 1987 | Mollier |
4683968 | August 1987 | Appelbaum et al. |
4685056 | August 1987 | Barnsdale et al. |
4688169 | August 1987 | Joshi |
4691350 | September 1987 | Kleijne et al. |
4696034 | September 1987 | Wiedemer |
4700296 | October 1987 | Palmer, Jr. et al. |
4701846 | October 1987 | Ikeda et al. |
4712238 | December 1987 | Gilhousen et al. |
4713753 | December 1987 | Boebert et al. |
4727550 | February 1988 | Chang et al. |
4740890 | April 1988 | William |
4747139 | May 1988 | Taaffe |
4748561 | May 1988 | Brown |
4757533 | July 1988 | Allen et al. |
4757534 | July 1988 | Matyas et al. |
4757914 | July 1988 | Roth et al. |
4768087 | August 1988 | Taub et al. |
4780821 | October 1988 | Crossley |
4791565 | December 1988 | Dunham et al. |
4796181 | January 1989 | Wiedemer |
4796220 | January 1989 | Wolfe |
4798209 | January 1989 | Klingenbeck et al. |
4799156 | January 1989 | Shavit |
4807288 | February 1989 | Ugon et al. |
4816655 | March 1989 | Musyck et al. |
4817140 | March 1989 | Chandra et al. |
4823264 | April 1989 | Deming |
4827508 | May 1989 | Shear |
4858121 | August 1989 | Barber et al. |
4864494 | September 1989 | Kobus |
4864616 | September 1989 | Pond et al. |
4866769 | September 1989 | Karp |
4868736 | September 1989 | Walker |
4868877 | September 1989 | Fischer |
4888798 | December 1989 | Earnest |
4893248 | January 1990 | Pitts et al. |
4893332 | January 1990 | Brown |
4903296 | February 1990 | Chandra et al. |
4919545 | April 1990 | Yu |
4924378 | May 1990 | Hershey et al. |
4926480 | May 1990 | Chaum |
4930073 | May 1990 | Cina, Jr. |
4937863 | June 1990 | Robert et al. |
4941175 | July 1990 | Enescu et al. |
4949187 | August 1990 | Cohen |
4953209 | August 1990 | Ryder, Sr. et al. |
4962533 | October 1990 | Krueger et al. |
4975647 | December 1990 | Downer et al. |
4975878 | December 1990 | Boddu et al. |
4977594 | December 1990 | Shear |
4995082 | February 1991 | Schnorr |
4999806 | March 1991 | Chernow et al. |
5001752 | March 1991 | Fischer |
5005122 | April 1991 | Griffin et al. |
5005200 | April 1991 | Fischer |
5010571 | April 1991 | Katznelson |
5014234 | May 1991 | Edwards, Jr. |
5022080 | June 1991 | Durst et al. |
5023907 | June 1991 | Johnson et al. |
5027397 | June 1991 | Double et al. |
5032979 | July 1991 | Hecht et al. |
5047928 | September 1991 | Wiedemer |
5048085 | September 1991 | Abraham et al. |
5050213 | September 1991 | Shear |
5058162 | October 1991 | Santon et al. |
5065429 | November 1991 | Lang |
5079648 | January 1992 | Maufe |
5091966 | February 1992 | Bloomberg et al. |
5103392 | April 1992 | Mori |
5103459 | April 1992 | Gilhousen et al. |
5103476 | April 1992 | Waite et al. |
5109413 | April 1992 | Comerford et al. |
5111390 | May 1992 | Ketcham |
5113518 | May 1992 | Durst, Jr. et al. |
5119493 | June 1992 | Janis et al. |
5126936 | June 1992 | Champion et al. |
5128525 | July 1992 | Stearns et al. |
5129084 | July 1992 | Kelly, Jr. et al. |
5136643 | August 1992 | Fischer |
5136646 | August 1992 | Haber et al. |
5136647 | August 1992 | Haber et al. |
5136716 | August 1992 | Harvey et al. |
5138712 | August 1992 | Corbin |
5146575 | September 1992 | Nolan |
5148481 | September 1992 | Abraham et al. |
5150407 | September 1992 | Chan |
5155680 | October 1992 | Wiedemer |
5163091 | November 1992 | Graziano |
5164988 | November 1992 | Matyas et al. |
5168147 | December 1992 | Bloomberg |
5185717 | February 1993 | Mori |
5187787 | February 1993 | Skeen et al. |
5191573 | March 1993 | Hair |
5199066 | March 1993 | Logan |
5199074 | March 1993 | Thor |
5201046 | April 1993 | Goldberg et al. |
5201047 | April 1993 | Maki et al. |
5204897 | April 1993 | Wyman |
5206951 | April 1993 | Khoyi et al. |
5208748 | May 1993 | Flores et al. |
5214702 | May 1993 | Fischer |
5216603 | June 1993 | Flores et al. |
5218605 | June 1993 | Low et al. |
5221833 | June 1993 | Hecht |
5222134 | June 1993 | Waite et al. |
5224160 | June 1993 | Paulini et al. |
5224163 | June 1993 | Gasser et al. |
5227797 | July 1993 | Murphy |
5235642 | August 1993 | Wobber et al. |
5241671 | August 1993 | Reed et al. |
5245165 | September 1993 | Zhang |
5247575 | September 1993 | Sprague et al. |
5251294 | October 1993 | Abelow |
5257369 | October 1993 | Skeen et al. |
5260999 | November 1993 | Wyman |
5263157 | November 1993 | Janis |
5263158 | November 1993 | Janis |
5263165 | November 1993 | Janis |
5265164 | November 1993 | Matyas et al. |
5276735 | January 1994 | Boebert et al. |
5276901 | January 1994 | Howell et al. |
5280479 | January 1994 | Mary |
5283830 | February 1994 | Hinsley et al. |
5285494 | February 1994 | Sprecher et al. |
5287407 | February 1994 | Holmes |
5291598 | March 1994 | Grundy |
5301231 | April 1994 | Abraham et al. |
5301326 | April 1994 | Linnett et al. |
5311591 | May 1994 | Fischer |
5319705 | June 1994 | Halter et al. |
5319735 | June 1994 | Preuss et al. |
5319785 | June 1994 | Thaller |
5325524 | June 1994 | Black et al. |
5335169 | August 1994 | Chong |
5335346 | August 1994 | Fabbio |
5337357 | August 1994 | Chou et al. |
5337360 | August 1994 | Fischer |
5341429 | August 1994 | Stringer et al. |
5343526 | August 1994 | Lassers |
5343527 | August 1994 | Moore et al. |
5347579 | September 1994 | Blandford |
5349642 | September 1994 | Kingdon |
5351293 | September 1994 | Michener et al. |
5355474 | October 1994 | Thuraisngham et al. |
5359721 | October 1994 | Kempf et al. |
5361359 | November 1994 | Tajalli et al. |
5365587 | November 1994 | Campbell et al. |
5367621 | November 1994 | Cohen et al. |
5369702 | November 1994 | Shanton |
5369707 | November 1994 | Follendore, III |
5371792 | December 1994 | Asai et al. |
5373440 | December 1994 | Cohen et al. |
5373561 | December 1994 | Haber et al. |
5383113 | January 1995 | Kight et al. |
5388211 | February 1995 | Hornbuckle |
5390247 | February 1995 | Fischer |
5390297 | February 1995 | Barber et al. |
5390330 | February 1995 | Talati |
5392220 | February 1995 | Van den Hamer et al. |
5392390 | February 1995 | Crozier |
5394469 | February 1995 | Nagel et al. |
5410598 | April 1995 | Shear |
5412717 | May 1995 | Fischer |
5418713 | May 1995 | Allen |
5420927 | May 1995 | Michali |
5421006 | May 1995 | Jablon |
5422953 | June 1995 | Fischer |
5428606 | June 1995 | Moskowitz |
5432851 | July 1995 | Scheidt et al. |
5432928 | July 1995 | Sherman |
5432950 | July 1995 | Sibigtroth |
5438508 | August 1995 | Wyman |
5440634 | August 1995 | Jones et al. |
5442645 | August 1995 | Ugon |
5444779 | August 1995 | Daniele |
5449895 | September 1995 | Hecht et al. |
5449896 | September 1995 | Hecht et al. |
5450490 | September 1995 | Jensen et al. |
5450493 | September 1995 | Maher |
5453601 | September 1995 | Rosen |
5453605 | September 1995 | Hecht et al. |
5455407 | October 1995 | Rosen |
5455861 | October 1995 | Faucher et al. |
5455953 | October 1995 | Russell |
5457746 | October 1995 | Dolphin |
5457747 | October 1995 | Drexler et al. |
5458494 | October 1995 | Krohn et al. |
5463565 | October 1995 | Cookson et al. |
5473687 | December 1995 | Lipscomb et al. |
5473692 | December 1995 | Davis |
5479509 | December 1995 | Ugon |
5485622 | January 1996 | Yamaki |
5490216 | February 1996 | Richardson, III |
5491800 | February 1996 | Goldsmith et al. |
5497479 | March 1996 | Hornbuckle |
5497491 | March 1996 | Mitchell et al. |
5499298 | March 1996 | Narasimhalu et al. |
5504757 | April 1996 | Cook et al. |
5504818 | April 1996 | Okano |
5504837 | April 1996 | Griffeth et al. |
5508913 | April 1996 | Yamamoto et al. |
5509070 | April 1996 | Schull |
5513261 | April 1996 | Maher |
5524933 | June 1996 | Kunt et al. |
5530235 | June 1996 | Stefik et al. |
5530752 | June 1996 | Rubin |
5533123 | July 1996 | Force et al. |
5534855 | July 1996 | Shockley et al. |
5534975 | July 1996 | Stefik et al. |
5535322 | July 1996 | Hecht |
5537526 | July 1996 | Anderson et al. |
5539735 | July 1996 | Moskowitz |
5539828 | July 1996 | Davis |
5550971 | August 1996 | Brunner et al. |
5553282 | September 1996 | Parrish et al. |
5557518 | September 1996 | Rosen |
5557798 | September 1996 | Skeen et al. |
5563946 | October 1996 | Cooper et al. |
5568552 | October 1996 | Davis |
5572673 | November 1996 | Shurts |
5574962 | November 1996 | Fardeau et al. |
5577209 | November 1996 | Boyle et al. |
5581800 | December 1996 | Fardeau et al. |
5592549 | January 1997 | Nagel et al. |
5603031 | February 1997 | White et al. |
5606609 | February 1997 | Houser et al. |
5613004 | March 1997 | Cooperman et al. |
5621797 | April 1997 | Rosen |
5625693 | April 1997 | Rohatgi et al. |
5629770 | May 1997 | Brassil et al. |
5629980 | May 1997 | Stefik et al. |
5633932 | May 1997 | Davis et al. |
5634012 | May 1997 | Stefik et al. |
5636276 | June 1997 | Brugger et al. |
5636292 | June 1997 | Rhoads |
5638443 | June 1997 | Stefik |
5638504 | June 1997 | Scott et al. |
5640546 | June 1997 | Gopinath et al. |
5649099 | July 1997 | Theimer et al. |
5655077 | August 1997 | Jones et al. |
5671279 | September 1997 | Elgamal |
5678170 | October 1997 | Grube et al. |
5687236 | November 1997 | Moskowitz et al. |
5689565 | November 1997 | Spies et al. |
5689566 | November 1997 | Nguyen |
5689587 | November 1997 | Bender et al. |
5692047 | November 1997 | McManis |
5692180 | November 1997 | Lee |
5699427 | December 1997 | Chow et al. |
5710834 | January 1998 | Rhoads |
5715314 | February 1998 | Payne et al. |
5715403 | February 1998 | Stefik |
5717923 | February 1998 | Dedrick |
5721788 | February 1998 | Powell et al. |
5724424 | March 1998 | Gifford |
5724425 | March 1998 | Chang |
5732398 | March 1998 | Tagawa |
5740549 | April 1998 | Reilly et al. |
5745569 | April 1998 | Moskowitz et al. |
5745604 | April 1998 | Rhoads |
5745678 | April 1998 | Herzberg et al. |
5748763 | May 1998 | Rhoads |
5748783 | May 1998 | Rhoads |
5748960 | May 1998 | Fischer |
5754849 | May 1998 | Dyer et al. |
5757914 | May 1998 | McManis |
5758152 | May 1998 | LeTourneau |
5765152 | June 1998 | Erickson |
5768426 | June 1998 | Rhoads |
5774872 | June 1998 | Golden et al. |
5787334 | July 1998 | Fardeau et al. |
5802590 | September 1998 | Draves |
5819263 | October 1998 | Bromley et al. |
5842173 | November 1998 | Strum et al. |
5845281 | December 1998 | Benson et al. |
5892899 | April 1999 | Aucsmith et al. |
5892900 | April 1999 | Ginter et al. |
5896454 | April 1999 | Cookson et al. |
5910987 | June 1999 | Ginter et al. |
5915019 | June 1999 | Ginter et al. |
5917912 | June 1999 | Ginter et al. |
5920861 | July 1999 | Hall et al. |
5940504 | August 1999 | Griswold |
5940505 | August 1999 | Kanamaru |
5943422 | August 1999 | Van Wie et al. |
5949876 | September 1999 | Ginter et al. |
5956408 | September 1999 | Arnold |
5966440 | October 1999 | Hair |
5978484 | November 1999 | Apperson et al. |
5982891 | November 1999 | Ginter et al. |
5999949 | December 1999 | Crandall |
6009170 | December 1999 | Sako et al. |
6016393 | January 2000 | White et al. |
6102965 | August 2000 | Dye et al. |
6112181 | August 2000 | Shear et al. |
6135646 | October 2000 | Kahn et al. |
6138119 | October 2000 | Hall et al. |
6157721 | December 2000 | Shear et al. |
6185683 | February 2001 | Ginter et al. |
6237786 | May 2001 | Ginter et al. |
6240185 | May 2001 | Van Wie et al. |
6253193 | June 2001 | Ginter et al. |
6292569 | September 2001 | Shear et al. |
6363488 | March 2002 | Ginter et al. |
6389402 | May 2002 | Ginter et al. |
6427140 | July 2002 | Ginter et al. |
6449367 | September 2002 | Van Wie et al. |
6618484 | September 2003 | Van Wie et al. |
6640304 | October 2003 | Ginter et al. |
6658568 | December 2003 | Ginter et al. |
6668325 | December 2003 | Collberg et al. |
6807534 | October 2004 | Erickson |
A-36815/97 | Feb., 1998 | AU | |||
A-36816/97 | Feb., 1998 | AU | |||
A-36840/97 | Feb., 1998 | AU | |||
DE 29 43 436 | Oct., 1979 | BE | |||
9 004 79 | Dec., 1984 | BE | |||
3803982 | Jan., 1990 | DE | |||
0 084 441 | Jul., 1983 | EP | |||
0 128 672 | Dec., 1984 | EP | |||
0 135 422 | Mar., 1985 | EP | |||
0 180 460 | May., 1986 | EP | |||
0 367 700 | May., 1990 | EP | |||
0 370 146 | May., 1990 | EP | |||
0 398 645 | Nov., 1990 | EP | |||
0 399 822 | Nov., 1990 | EP | |||
0 421 409 | Apr., 1991 | EP | |||
0 456 386 | Nov., 1991 | EP | |||
0 469 864 A2 | Feb., 1992 | EP | |||
0 567 800 | Apr., 1993 | EP | |||
0 565 314 | Oct., 1993 | EP | |||
0 570 123 | Nov., 1993 | EP | |||
0 593 305 | Apr., 1994 | EP | |||
0 651 554 | May., 1995 | EP | |||
0 653 695 | May., 1995 | EP | |||
0 668 695 A2 | Aug., 1995 | EP | |||
0 695 985 | Feb., 1996 | EP | |||
0 696 798 | Feb., 1996 | EP | |||
0 714 204 | May., 1996 | EP | |||
0 715 243 | Jun., 1996 | EP | |||
0 715 244 | Jun., 1996 | EP | |||
0 715 245 | Jun., 1996 | EP | |||
0 715 246 | Jun., 1996 | EP | |||
0 715 247 | Jun., 1996 | EP | |||
0 725 376 | Aug., 1996 | EP | |||
0 749 081 | Dec., 1996 | EP | |||
0 763 936 | Mar., 1997 | EP | |||
0 778 513 | Jun., 1997 | EP | |||
0 795 873 | Sep., 1997 | EP | |||
0 800 312 | Oct., 1997 | EP | |||
0 913 757 | May., 1999 | EP | |||
A2136175 | Sep., 1984 | GB | |||
2264796 | Sep., 1993 | GB | |||
2294348 | Apr., 1996 | GB | |||
2295947 | Jun., 1996 | GB | |||
57-000726 | Jan., 1982 | JP | |||
62-225059 | Oct., 1987 | JP | |||
62-241061 | Oct., 1987 | JP | |||
01-068835 | Mar., 1989 | JP | |||
64-68835 | Mar., 1989 | JP | |||
02-242352 | Sep., 1990 | JP | |||
02-247763 | Oct., 1990 | JP | |||
02-294855 | Dec., 1990 | JP | |||
04-369068 | Dec., 1992 | JP | |||
05-181734 | Jul., 1993 | JP | |||
05-257783 | Oct., 1993 | JP | |||
05-268415 | Oct., 1993 | JP | |||
06-175794 | Jun., 1994 | JP | |||
06-215010 | Aug., 1994 | JP | |||
06-225059 | Aug., 1994 | JP | |||
07-056794 | Mar., 1995 | JP | |||
07-084852 | Mar., 1995 | JP | |||
07-141138 | Jun., 1995 | JP | |||
07-200317 | Aug., 1995 | JP | |||
07-200492 | Aug., 1995 | JP | |||
07-244639 | Sep., 1995 | JP | |||
08-137795 | May., 1996 | JP | |||
08-152990 | Jun., 1996 | JP | |||
08-185292 | Jul., 1996 | JP | |||
08-185298 | Jul., 1996 | JP | |||
WO 85/02310 | May., 1985 | WO | |||
WO 85/03584 | Aug., 1985 | WO | |||
WO 90/02382 | Mar., 1990 | WO | |||
WO 92/06438 | Apr., 1992 | WO | |||
WO 92/22870 | Dec., 1992 | WO | |||
WO 93/01550 | Jan., 1993 | WO | |||
WO 94/01821 | Jan., 1994 | WO | |||
WO 94/03859 | Feb., 1994 | WO | |||
WO 94/06103 | Mar., 1994 | WO | |||
WO 94/16395 | Jul., 1994 | WO | |||
WO 94/18620 | Aug., 1994 | WO | |||
WO 94/22266 | Sep., 1994 | WO | |||
WO 94/27406 | Nov., 1994 | WO | |||
WO 95/14289 | May., 1995 | WO | |||
WO 96/00963 | Jan., 1996 | WO | |||
WO 96/03835 | Feb., 1996 | WO | |||
WO 96/05698 | Feb., 1996 | WO | |||
WO 96/06503 | Feb., 1996 | WO | |||
WO 96/13013 | May., 1996 | WO | |||
WO 96/21192 | Jul., 1996 | WO | |||
WO 96/24092 | Aug., 1996 | WO | |||
WO 96/27155 | Sep., 1996 | WO | |||
WO 96/27155 | Sep., 1996 | WO | |||
WO 96/27155 | Sep., 1996 | WO | |||
WO 97/03423 | Jan., 1997 | WO | |||
WO 97/07656 | Mar., 1997 | WO | |||
WO 97/25816 | Jul., 1997 | WO | |||
WO 97/32251 | Sep., 1997 | WO | |||
WO 97/43761 | Nov., 1997 | WO | |||
WO 97/48203 | Dec., 1997 | WO | |||
WO 98/09209 | Mar., 1998 | WO | |||
WO 98/10381 | Mar., 1998 | WO | |||
WO 98/37481 | Aug., 1998 | WO | |||
WO 98/45768 | Oct., 1998 | WO | |||
WO 99/01815 | Jan., 1999 | WO | |||
WO 99/24928 | May., 1999 | WO | |||
WO 99/48296 | Sep., 1999 | WO | |||
Sibert et al; DigiBox: A Self-Protecting Container for Information Commerce; Electronic Publishing Resources Inc.; USENIX workshop on Electronic Commerce; Jul. 1995; pp. 1-14. . A2b's Recent Press Coverage, 1998. . "A Brief History of the Green Project," viewed on Mar. 12, 2002 at <http://java.sun.com/people/jag/green/index.html> pp. 1-2. . "A Publication of the Electronic Frontier Foundation," EFFector Online vol. 6 No. 6., Dec. 6, 1993, 8 pages. . "ACCOPI RACE Project M 1005 Warning of ACCOPI web pages removal," UCL Laboratoire de telecommunications et teledetection. . "Access Control and Copyright Protection for Images Security Technology for Graphics and Communication Systems--RACE M1005: ACCOPI", webpage, Security Projects at Fraunhofer 1GD, 2002. . "Achievements Archive," www.imprimatur.net/ web pages. . "American National Standard: Specification for Financial Message Exchange Between Card Acceptor and Acquirer, X9.15," American Banker's Association, 1990. . "An Introduction to Safety and Security In Telescript," (undated), 8 pages. . "Applications Requirements for Innovative Video Programming: How to Foster (or Cripple) Program Development Opportunities for Interactive Video Programs Delivered on Optical Media: A Challenge for the Introduction of DVD (Digital Video Disc)," Sheraton Universal Hotel, Universal City, CA, Oct. 19-20, 1995. . Abrams, Marshall D, "Renewed Understanding of Access Control Policies", Proceedings of the 16th Computing Natioal Security Conference, 1993. . Aharonian, G., "Software Patents--Relative Comparison of EPO/PTO/JPO Software Searching Capabilities," Source Translation & Optimization. . Anderson, R., "Why Cryptosystems Fail?" University Computer Laboratory, Cambridge, Massachusetts, (undated), pp. 1-34. . Antonelli et al, "Access Control in a Workstation-Based Distributed Computing Environment," CITI Technical Report 90-2 (Jul. 17, 1990). . Arms, W.Y., "Key Concepts in the Architecture of the Digital Library," D-Lib Magazine, Jul. 1995. . Atkins, D., et al., "The Magic Words are Squeamish Ossifrage," (undated), 15 pages. . Atkinson, R., "Security Architecture for the Internet Protocol," Network Working Group RFC 1825, Aug. 1995. . Aucsmith, D., et al., "Common Data Security Architecture," Intel Architecture Lab, Presentation Material, Jan. 22, 1996, pp. 1-16. . Avery, et al., "Recommender Systems for Evaluating Computer Messages," Communications of the ACM, pp. 88-89 (Mar. 1997). . Baker, R.H., The Computer Security Handbook Tab Books, Inc., 1985. . Balbanovic, et at., Content-based, Collaborative Recommendation, Communications of the ACM, pp. 66-72 (Mar. 1997). . Bartock, P.F., et al., "Guide to Securing Microsoft Windows NT Networks," National Security Agency, Sep. 18, 2001, pp. 1-132. . Bellare, M.,"iKP-A Family of Secure Electronic Payment Protocols," Apr. 16, 1995, pp. 1-19. . Bell-Labs Secure Technologies, "Information Vending Encryption System (IVES).TM.," Lucent Technologies, May 31, 2002, pp. 1-16. . Bellovin, S.M., "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, May 1992, 13 pages. . Bellovin, S.M., "There Be Dragons," AT&T Bell Laboratories, Aug. 15, 1992, 16 pages. . Bender et at. "Techniques for Data Hiding," IBM Systems Journal, vol. 35, Nos. 3&4, 1996. . Berghal et al., "Protecting Ownership Rights Through Digital Watermarking," IEEE Computing, vol. 29, No. 7, Jul. 1996. . Berkovitz, S. et al., "Authentication of Mobile Agents," Mobile Agents and Security, Springer-Verlag, Giovanni Vigna, Ed., 1998, pp. 114-136. . Berners-Lee, T.J., et al., "Networked Information Services: The World-Wide Web," Computer Networks and ISDN Systems, 1992, pp. 454-459. . Bernstein et a;., "Copyrights, Distribution Chains, Integrity, and Privacy: The Need for a Standards-Based Solution," Electronic Publishing Resources. . Bertino, Elisa, "Data Hiding and Security in Object-Oriented Databases," Dipartimento di Matematica, Universita di Genova, IEEE, 1992, pp. 338-347. . Bickel, R., et al., "Guide to Securing Microsoft Windows XP," National Security Agency, Oct. 30, 2002, pp. 1-129. . Birrell, Andrew, D., et at., "A Global Authentication Service Without Global Trust," Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, Apr. 1986, pp. 1-11. . Bishop, M., "Anatomy of a Proactive Password Changer," Department of Mathematics and Computer Science, Dartmouth Colleqe, (undated), 15 pages. . Bishop, M., "Privacy-Enhanced Electronic Mail," Privacy and Security research Group, IAB. . Blaze, Matt, et at., "Decentralized Trust Management" Proc. IEEE Conference on Security and Privacy, May 1996. . Blaze, Matt, et at., "The Architecture and Implementaiton of Network Layer Security Under Unix", Columbia University and AT&T Bell Laboratories, 1994. . Boisson, Jean-Francois, "1-Business Perspectives and Requirements, 2-The CITED Project: Keys and Knowledge," CITED 5469. . Boisson, Jean-Francois, "How to CITEDise Application: Guidelines and Examples," CITED 5469, . Boisson, Jean-Francois, "Software Components; Deliverable Trial Offer," CITED 5469. . Boly, J.P., et al., "The ESPIRIT Project CAFE: High Security Digital Payment Systems," ESCORICS 94, European Symposium on Research Computer Security, Springer-Verlas Berlin, 1994, pp. 217-230. . Boone, J.V., et at., "The Start of Digital Revolution: SIGSALY Secure Digital Voice Communications in World War II," Dec. 10, 2002. . Borenstein, N., "MIME Extensions for Mail-Enabled Applications: Application/Safe-Tel and Multipart/Enabled-Mail," Nov. 1993, 24 pages. . Born, E, et al., "Discretionary Access Control by Means of Usage Conditions," Computers & Security, vol. 13, No. 5, 1994, pp. 437-450. . Brands, S., "Untraceable Off-line Cash in Wallets with Observers," CWI, (undated), 17 pages. . Brassil et at., "Electronic Marking and Identification Techniques to Discourage Document Copying," AT&T Bell Laboratories, Proc. Infocom 94, 1994. . Breon, R., et al., "Microsoft Office 97 Executable Content Security Risks and Countermeasures." National Security Agency, Dec. 20, 1999, pp. 1-44. . Brickell, E.F., et al., "The SKIPJACK Algorithm," Jul. 28, 1993, pp. 1-7. . Brockschmidt, K., "A Primer on Designing Custom Controls," Microsoft Systems Journal, Mar./Apr. 1992, pp. 87-101. . Brockschmidt, K., "Implementing OLE 2.0, Part III: Uniform Data Transfer with Data Objects." Microsoft Systems Journal, Dec. 1993, pp. 47-77. . Brockschmidt, K., "Introducing OLE 2.0, Part 1: Windows Objects and the Component Object Model," Microsoft Systems Journal, Aug. 1993, pp. 15-23. . Brockschmidt, K., "OLE 2.0 Part II: Implementing a Simple Windows Object Using Either C or C++," Microsoft Systems Journal, Oct. 1993, PP. 45-62. . Brockschmidt, Kraig, Inside OLE 2, Microsoft Press Programming Series, 1994. . Brown, C.W., "Security for Minicomputers and Microcomputers," (undated), pp. 285-298. . Brown, Patrick W., "Digital Signatures: Can They Be Accepted as Legal Signatures in EDI?," 1st Conference on Computer and Communication Security, Nov. 1993, pp. 86-92. . Brumm, P., et al., 80386/80486 Assembly Language Programming, Windcrest/McGraw-Hill, 1993. . Bureau Van Dijk Management Report for Task 4.5: Feasibility Study of the Cited Agency, 1992-1993. . Byte.com, "Speaking the Same Language," May 1994, pp. 1-2. . Cabell, D., et al., "Software Protection," May 1985, pp. 35-37. . Calas, C., "Distributed File System Over a Multilevel Secure Architecture Problems and Solutions," Computer Security, ESCORICS 94, Brighton, United Kingdom, Nov. 7-9, 1994, pp. 281-297. . CardTech/SecurTech 94 Conference Proceedings, "Building Foundations for Innovation," CardTech/SecurTech, Inc., Apr. 1994, 1,031 pages. . Carnegie Mellon University, "Internet Billing Server." Prototype Scope Document, INI Tech Report, Oct. 14, 1993, pp. 1-29. . Case, J., "A Simple Network Management Protocol (SNMP)," Network Working Group, May 1990, pp. 1-21. . Chase, Chevy, M.D., DiscStore (Electronic Publishing Resources 1991). . Chaum, D., "Achieving Electronic Privacy," Scientific American, Aug. 1992, pp. 1-8. . Chaum, D.L., et al., "Implementing Capability-Based Protection Using Encryption," College of Engineering, University of California, Berkeley, Jul. 17, 1978, 12 pages. . Chaum, D., "Security Without Identification: Card Computers to Make Big Brother Obsolete," viewed on Aug. 23, 2002 at .cent.http://www.chaum.com/articles/Security.sub.13 Without _Identification.html> pp. 1-24. . Chaum, D., Smart Card 2000, Elsevier Science Publishers, 1991. . Chaum, D., "Untraceable Electronic Cash," Extended Abstract, Center for Mathematics and Computer Science, 1988, pp. 319-327. . Chess, D., "Security Issues in Mobile Code Systems," Mobile Agents and Security, Springer-Verlag, Giovanni Vigna, Ed., 1998, 14 pages. . Cina Jr. et al., "ABYSS: A Basic Yorktown Security System PC Software Asset Protection Concepts," IBM Research Report No. RC 12401, IBM Thomas J. Watson Research Center, Dec. 18,1986. . CITED: Copyright in Transmitted Electronic Documents, Special Interest Group, CITED Meeing, Heathrow, Sep. 22, 1993. . CITED: Final Report: A Guide to CITED Documentation, ESPIRIT, Project 5469, ISBN 0-7123.2115-2, The CITED Consortium, Sep. 1994. . CITED: Preparation of the CITED Model Functional Requirements Specifications; Discussion Paper (Revision 1), Bureau Van Dijk, Jan. 16,1991. . CITED: Preparation of the CITED Model Functional Requirements Specifications: Reports of the Interviews with Five CITED Partners, (Partners: Sagem, Telesystemes, NTE, Elsevier, Oxford University Press), Bureau Van Dijik, Apr. 5. 1991. . Competitive Analysis AT&T/a2b music, Jun. 16, 1998. . COPYSMART--20517: "CITED Based Multi-media IPR Management on Cost Effective Smart Device," European lnforamtion Technology for Information Science, start date Dec. 1, 1995. . "CREANET--Creative Rights European Agency NETwork--Project Profile," Information Society Technologies (Feb. 18, 2000). . "Cryptographic API Specification," Version 0.6, Microsoft, Mar. 1995. . "Cryptolope Containers Technology A White Paper", IBM InfoMarket Business Development Group. . Clark, P.C., et al., "BITS: A Smartcard Protected Operating System," Communications of the ACM, vol. 37, No. 11, Nov. 1994, pp. 66-70 & 94. . Clarke et al., "Cryptography Issues in Plain Text," Privacy Law and Policy Reporter, 1996. . Coad, Peter, "Object-Oriented Patterns," Communications of the ACM, vol. 35, No. 9, Sep. 1992, pp. 152-159. . Cohen, F.B., "Operating System Protection Through Program Evolution," Computers & Security, vol. 12, No. 6, (Oxford, Great Britain) Oct. 1993, 22 pages. . Cohen, F.B., Protection and Security on the Information Superhighway, John Wiley & Sons, Inc., 1995. . Cook, S., "Net Results," PC World, Dec. 1985, pp. 270-328. . Corbato, F.J., et al., "Introduction and Overview of the Multics System," viewed on Nov. 13, 2001 at <http://www.multicians.org/fjcc1.html> pp. 1-18. . Cousins, Steve B. et al., "InterPay:Managing Multiple Payment Mechanisms in Digital Libraries." . Coutrot, Francois, et al., "A Single FConditional Access System for Satellite-Cable and Terrestrial TV" , IEEE Transactions on Consumer Electronics, vol. 35, No. 3, Aug. 1989. . Cox, B., "Superdistribution," Wired, Sep. 1994, 2 pages. . Crocker et al., "MIME Object Security Services," Network Working Group RFC 1848, Oct. 1995. . Curry, D.A., UNIX System Security: A Guide for Users and System Administrators, Addison-Wesley Publishing Company, Inc., 1992. . Curry, David A., "Improving the Security of Your Unix System," Final Report Apr. 1990, pp. 1-74. . Custer, H., Inside the Windows NT File System, Microsoft Press, 1994. . Cybenko, G, et al., "Cognitive Hacking: A Battle for the Mind," Computer, Aug. 2002, 0018-9162/02a2002 IEEE, pp. 50-56. . Data Network and Open System Communications, Directory: Information Technology--Open Systems Interconnection--The Directory: Overview of Concepts, Models, and Services, ITU-T Recommendation X.500, International Telecommunication Union, Nov. 1993. . Date, C.J., "An Introduction to Database Systems," 4th. Ed., vol. 1, Addison-Wesley Publishing Company, 1987. . Davies, D.W., et al., Security for Computer Networks, John Wiley & Sons, Inc., 1984. . Davin, J., et al., "SNMP Administrative Model," Network Working Group, Jul. 1992, pp. 1-22. . Davis, D., et al., "Network Security via Private-Key Certificates," MIT Project Athena, (undated), pp. 1-4. . "DCE Technology at Work," Distributed Computing Environment, http://www.opengroup.org/tech/dce/ tech/tech.htm, Nov. 7, 2000, pp. 1-3. . Deering, S.E., "Host Extensions for IP Multicasting," Network Working Group, RFC 1112, Aug. 1989. . "Deliverable D3: Specification of the Infrastructure and Explanation of Trust and Confidence Building Solutions," Ver. 0.1, Telenet (Jul. 18, 2000). . Denning, A., OLE Controls Inside Out, Microsoft Press, 1995. . Denning, D., Crytography and Data Security, Addison-Wesley Publishing Company, Inc., 1982. . Denning, P.J., Computer Under Attack: Intruders, Worms, and Viruses, ACM Press, 1990. . Department of Defense, "Trusted Computer System Evaluation Criteria," Dec. 1985, 72 pages. . Deutsch, P., "GZIP File Format Specifiation Version 4.3," Network Working Group, May 1996, pp. 12. . Diffie, Whitfield, "The First Ten Years of Public-Key Cryptography", Proceedings of the IEEE, vol. 76, No. 5, May 1988. . Diffie, et al., Privacy on the Line: The Politics of Wiretapping and Encryption, Massachusetts Institute of Technology, 1998. . "Digital Broadband Delivery System, Phase 1.0, System Overview," Revision 1.0, Scientific Atlanta, 1997. . "Digital Rights Enforcement and Management: SuperDistribution of Cryptolopes", IBM. . DiLascia, Paul, "OLE Made Almost Easy: Creating Containers and Servers Using MFC 2.5," Microsoft Systems Journal, Apr. 1994, pp. 13-33. . Doster et al., "Third-Party Authentication in the Institutional File System," Center for Information Technology Integration. . Dougherty, D., et al., The Mosaic Handbook for the X Window System, 0'Reilly & Associates, 1994. . Downs, D.D., et al., "Issues in Discretionary Access Control," Proceedings of the 1985 Symposium on Security and Privacy, Apr. 22-24, 1985, Oakland, California, pp. 208-218. . Dukach, S., "SNPP: A Simple Network Payment Protocol," MIT Laboratory for Computer Science, (undated), 7 pages. . Eastlake III, D., "Physical Link Security Type of Service," Network Working Group RFC 1455, May, 1993. . Eastlake Ill et al., "Randomness Recommendations for Security," Network Working Group RFC 1750, Dec. 1994. . "EFT Network Data Book; 1993 Edition," Bank Network News, vol. 11, No. 13, Nov. 1992. . Eizenberg, G., "Contribution of Information Technology Security to Intellectual Property Protection," CERT-DERI. . "Electronic Reverse Copyright Management System (ERCOMS)," International Institute for Electronic Library Research, website updated by Ramsden, Anne, Jul. 22, 1996. . Ellison, C. et al., "SPKI Certificate Theory," Internet Engineering Task Force (IETF) RFC 2693, Sep. 1999, 38 pages, available at http://www.ietf.org/rfc/rfc26939.txt?number=2693. . Email from Chris Drost-Hansen re press release: "AT&T Launches A2B Music Trial for Delivering Songs Over the Internet," Business Wire, Nov. 3, 1997. . Email from Edmond Kouka to Jean-Francois Boisson re TELENET TELEtraining platform--Bogdan Lutkiewicz, Poland, Gdansk, Mar. 4, 2001. . Epstein, J., "A Trusted X Window System Server for Trusted Mach," Usenix Association Proceedings, Mach Workshop, Oct. 4-5, 1990 Burlington, Vermont, pp. 141-155. . Erickson, John S., "A Copyright Management System for Networke Interactive Multimedia", Proceedings of the 1995 Dartmouth Institute for Advanced Graduate Studies, 1995. . Erickson, John S., "Rights Management Through Enhanced Attribution", Presented at INET 96 Proceedings, Jun. 1996. . ESPIRIT Project 20676--IMPRIMATUR--Intellectual Multimedia Property Rights Model and Terminology for Universal Reference, IMPRIMATUR Consortium, Oct. 1998. . ESPIRIT Project: 5469: Contract Amendment No. 2; Commission of the European Communities, Sep. 16, 1993. . ESPRIT Project 22226--MUSE--DeveIoping Standardized Digital media Management, Signaling and encryption Systems for the European Music Sector, International Federation of the Phonographic Industry, Oct. 1998. . ESPRIT Project 24378--MENHIR European Multimedia Network of High Quality Image Registration, Museums On Line, Feb. 1, 1997. . "Europe and The Global Information Society Recommendations to the European Council," Bamgemann Report, www.medicif.org web pages, Glfobal Information Society (May 1994). . Everett, David B., "Smart Card Tutorial-Part 1," Sep. 1992. . Farmer. D., "The COPS Security Checker System," Jul. 10, 1992. . Feistel, H. "Cryptographic Coding for Data-Bank Privacy," IBM document RC 2827, Mar. 18, 1970. . Ferraiolo, D., et al., "Role-Based Access Control," Reprinted from the Proceedings of the 15th National Computer Society Conference, 1992, pp. 1-11. . Fine, T.,et al, "Assuring Distributed Trusted Mach," Secure Computing Corporation, 1993, 13 pages. . Finin et al., "A Language and Protocol to Support Intelligent Agent Interoperability," Proceedings of the CE & CALS, Washington '92 Conference, Apr. 1992. . Forcht, K.A., Computer Security Management, Boyd & Fraser Publishing Company, 1994. . "Forum on Risks to the Public in Computers and Related Systems," The Risks Digest, vol. 15; Issue 39, Jan. 21, 1994, pp. 1-12. . "Forum on Technology-Based Intellectual Property Management--Electronic Commerce for Content", IMA INtellectual Property Proceedings, Vol. 2, Jun. 1996. . Franklin, M., et al., "An Overview of Secure Distribution Computing," Mar. 24, 1992, pp. 1-46. . Franz, M., "Technological Steps Toward a Software Component Industry," Institut fur Computersysteme, Zurich, Switzerland, (undated), 23 pages. . Frederick, Keith P., "Certification and Accreditation Approach". Air Force Cryptologic Support Center (OL-FP). . Fuchsberger et al., "Public-key Cryptography on Smart Cards," Information Security Group. . Fugini, M., et al., "Security Management in Office Information Systems," Computer Security: A Global Challenge, 1984, pp. 487-498. . Fugini, M.G., et al., "Authorization and Access Control in the Office-Net System," Computer Security in the Age of Information, 1989, pp. 147-162. . Galvin et al., "Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)," Network Working Group RFC 1446, Apr. 1993. . Galvin, J., et al., "SNMP Security Protocols," Network Working Group, Jul. 1992, pp. 1-26. . Gamble, Todd, "Implementing Execution Controls in Unix," Usenix Association, Proceedings of the Seventh Systems Administration Conference, Nov. 1-5, 1993, Monterey, California, pp. 237-242. . Garfinkel, S., PGP: Pretty Good Privacy, O'Reilly & Associates, Inc., (undated). . Garfinkel, Simson, et al., Practical UNIX Security, O'Reilly & Associates, Inc., 1991. . Gasser, M., et al., "The Digital Distributed System Security Architecture." Reprint from the Proceedings of 1989 National Computer Security Conference, 1989, pp. 1-13. . Gaster, J. L., "Authors' Rights and Neighboring Rights in the information Society," DG XV/E/4, European Commission. . Gifford, D., et al., "The Cirrus Banking Network," Communications of the ACM, vol. 28, No. 4, Aug. 1985, pp. 798-807. . Gifford, D.K., "Cryptographic Sealing for Information Secrecy and Authentication," Communications of the ACM, vol. 25, No. 4, Apr. 1982, pp. 274-286. . Gilde, R., "DAT-Heads: Frequently Asked Questions," 1991, Release 3.1, Sep. 2, 1992. . Gircys, G.R., Understanding and Using COFF, O'Reilly & Associates, Inc., Nov. 1988. . Glatzer, H., "The Promise of LANs MIS Back in Control," Software News, Mar. 1985, pp. 51-58. . "Gemplus. MCOS: Multi Application Chip Operating System--Introduction," Gemplus Card International, 1990. . Gligor, V.D., et al., "Object Migration and Authentication," IEEE Transactions on Software Engineering, vol. SE-5, No. 6, Nov. 1979, pp. 607-611. . Global Projects Group, "Smart Card Technology International: The Global Journal of Advanced Card Technology," undated, pp. 1-151. . Gong, Li, "A Secure Identity-Based Capability System," University of Cambridge Computer Laboratory, Jan. 1989, pp. 1-15. . Gong, L. et al., "Signing, Sealing and Guarding Java Objects," Mobile Agents and Security, G. Vigna, editor, Springer-Verlag, 1998, vol. 1419 of LNCS, pp. 206-216. . Gosler, James, "Software Protection: Myth or Reality", Lecture Notes in Computer Science, Advances in Cryptology--Crypto '85 Proceedings, 1985. . Gosling, J., "Oak Intermediate Bytecodes," 1995, 5 pages. . Gozani et al., "GAFFES: The Design of a Globally Distributed File System," Report No. UCB/CSD 87/361; Computer Science Division (EECS), U.C. Berkley, Jun. 1997. . Greenwald et al., "The Distributed Compartment Model for resource management and Access Control," Technical report No. TR94-035, The University of Florida, Oct. 1994. . Griswold, Gary N., "A Method for Protecting Copyright on Networks", IMA Intellectual Property Proceedings, vol. 1. Issue 1, Jan. 1994. . Gruber, R., et al., "Disconnected Operation in the Thor Object-Oriented Database System," Laboratory of Computer Science, Massachusetts Institute of Technology, (undated), pp. 1-6. . Guide to the Secure Configuration and Administration of Microsoft Exchange 5.x.RTM., National Security Agency, Jun. 20, 2002, pp. 1-58. . Guillou, Louis C.; "Smart Cards and Conditional Access", Springer-Verlag, 1988. . Halfhill, T.R., et al., "Agents on the Loose," Byte.com, Feb. 1994, pp. 1-2. . Halfhill, Tom, R., et al., "Just Like Magic?," Byte.com, Feb. 12, 1994, pp. 1-5. . Haller, N., "The S/KEY One-Time Password System," Network Working Group RFC 1760, Feb. 1995. . Hansen, S.E., et al., "Automated System Monitoring and Notification with Swatch," Proceedings of the 1993 LISA, Monterey, California, Nov. 1-5, 1993, pp. 101-108. . Hardjono, Thomas, "Record Encryption in Distributed Databases," Department of Computer Science, University of New South Wales, Jan. 1990, pp. 386-395. . Hardy, N. "The Keykos Architecture," Eighth Edition, Dec. 1990, pp. 1-8. . Harn, Lein, et al., "A Software Authentication System for the Prevention of Computer Viruses," ACM, 1992, pp. 447-450. . Harris, J., et al., "Bento Specification." Apple Computer, Inc., Jul. 15, 1993, 106 pages. . Harty, K., et al., "Case Study: The VISA Transaction Processing System," May 30, 1988, pp. 1-23. . Hauser, Ralf, "Control Information Distribution and Access," Dissertation Der Wirtschaftswissenschaftlichen Fakultat Der Universitat Zurich, May 31, 1995. . Hauser, Ralf, et al., "LTTP Portection--A Pragmatic Approach to Licenseing", Institut fur Informatik, Universitat Zurich, Jan. 13, 1994. . Hauser, Ralf, et al., "LTTP Portection--A Pragmatic Approach to Licenseing", Institut fur Informatik, Universitat Zurich, Jan. 13, 1994. . Hawk, H.S., "RSA & General Magic," email to Good Guys, Jan. 6, 1994, 1 page. . Herzberg, Amir, et al., "On Software Protection", Proceedings of the 4th Jerusalem Conference on information Technology (JCIT), IEE Computer Society Proes. Apr. 1984. . Herzberg, Amir, et al., "Public Protection of Software", ACM Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987. . Hewlett Packard Co., "Manager's Guide to MPE/iX Security," Hewlett-Packard Company, Apr. 1994. . Hickman, Kipp, E.B., SSL 2.0 Protocol Specificatoin. . Hill, William et al., "Edit Wear and Read Wear." Computer Graphics and Interactive Media Research Group, ACM; May 3-7, 1992. . Hill, William et al., "History-Enriched Digital Objects," Computer Graphics and interactive Media Research Group; Bell Communications Research, 1993. . Hoffman, L.J., Modere Methods for Computer Security and Privacy, Prentice-Hall, Inc., 1977. . Holsinger, E:, How Music and Computers Work, Ziff-Davis Press, 1994. . Holt, S., "Start-Up Promises User Confidentiality In Web Marketing Service," InfoWorld Electric News, updated Aug. 13, 1997, 2 pages. . Holzner, S., Heavy Metal OLE 2.0 Progamming, IDG Books Worldwide, Inc., 1994. . Honeyman, P., "Digest of the First UNSENIX Workshop on Electronic Commerce (EC 95)," Jul. 1995. . Horster, P., Communications and Multimedia Security II, Chapman & Hall, 1996. . Hsiao, D., et al., Computer Security, Academic Press, Inc., 1979. . Hutt, A.E., et al., Computer Security Handbook Second Edition, Macmillan Publishing Company, 1988, pp. 201-217. . IBM, "Key Cryptolope Components", viewed on Mar. 13, 2002 at <http://www-3.ibm.com/software/security/cryptolope.about.html> pp. 1-2. . IBM, "OpenDoc vs. OLE 2.0: Superior by Design," IBM, Jan. 1994, pp. 1-4. . Information Systems Audit and Control Association-Montreal Chaper, "Authentification dans les environmements de traitement distributes," viewed on Mar. 25, 2002 at <http://www.apvcsi-montreal.ca/en/publications/contact133.html> pp. 1-15. . Interchange Message Specification for Debit and Credit Card Message Exchange Among Financial Institutions, American National Standard, Accredited Standards Committee X9-Financial Services Committee, ANSI X9.2-1988, American Bankers Association, May 16, 1988. . "Imprimatur News," iMPRIMATUR (Dec. 1998). . "iOpener," Registered Trademark of National Semiconductor Corporation, Registration date Oct. 4, 1994, 27 pages. . International Infrastructure Standards Panel, "ISP Need #31-Containers or Secure Packaging," Electronic Publishing Research, Sep. 18, 1995, pp. 1-3. . International Infrastructure Standards Panel, "IISP Need #32-Authentication of Content," Electronic Publishing Research, Sep.18, 1995, pp. 1-3. . International Infrastructure Standards Panel, "IISP Need #33-Control Enforcement," Electronic Publishing Research, Sep. 18, 1995, pp. 1-3. . International Infrastructure Standards Panel, "IISP Need #34-Billing and Payment," Electronic Publishing Research, Sep. 18, 1995, pp. 1-3. . International Infrastructure Standards Panel, "IISP Need #35-Reporting," Electronic Publishing Research, Sep. 18,1995, pp. 1-3. . International Standard ISO8583, "Bank Card Originated Messages--Interchange Message Specifications--Content for Financial Transactions," lnternational Organization for Standardization, Aug. 15, 1987. pp. 1-33. . Ioannidis, J. et al., "The Architecture and ImpIementation of Network-Layer Security Under Unix," Fourth USENIX Security Symposium Proceedings (Oct.), USENIX, Berkeley, Calif: 1993, 11 pages. . Jaeger, T, et al., "Support for the File System Security Requirements of Computational E-Mail Systems," Nov. 1994, ACM 0-89791-732-4/94/0011, 9 pages. . Johnson, H.L., et al., "A Secure Distributed Capability Based System," ACM, 1985, pp. 392-402. . Johnson, R., "Info on Telescript," 1994 Software Agents List Archieve, Dec. 6,1994, pp. 1-4. . Jones et al., "Credentials for Privacy and Interoperation." University of Illinois at Urbana-Champaign. . Jones, D., Document from the Internet: "Top Tech Stories, PowerAgent Introduces First Internet Informediary to Empower and Protect Consumers," (updated Aug. 13,1997) 3 pages. . JUKEBOX--Music Across Borders, LIB-JUKEBOX/4-1049. . Kahn, Robert, et al. A Framework for Distgributed Digital Object Services, Corporation for National Research Initiatives, May 13, 1995. . Kahn, D., The Codebreakers: The Story of Secret Writing, The Macmillan Company, 1967. . Kaliski, Jr., et al. "A Layman's Guide to a Subset of ASN.1, BER. and DER", RSA Laboratories Technical Note, 1991, Revised Nov. 1, 1993. . Kamens, J.l., "Retrofitting Network Security to Third-Party Applications--The SecureBase Experience," Symposium Proceedings, Unix Security IV, Oct. 4-6, 1993, Santa Clara, California, pp. 41-57. . Kaner, Cem et al., Testing Computer Software, Second Edition, Van Nostrand Reinhold, 1988. . Kaplan, M., "IBM Cryptolopes, Super Distribution and Digital Rights Movement," , viewed at <http://www.research.ibm.com/people/k/kaplan/cryptolope-docs/ crypap,html>on Dec. 30, 1996, pp. 1-10. . Karger, P.A., et al., "A VMM Security Kernel for the VAX Architecture," CH2884-5/90/0000/0002, IEEE 1990, pp. 2-19. . Karger, P.A., et al., "Multics Security Evaluation: Vulnerability Analysis," HQ Electronic Systems Division, Hanscom AFB, Technical Report 19, Jun. 1974, 14 pages. . Kastenholz, F., "The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol," Network Working Group RFC 1472, Jun. 1993. . Katzan, Harry, Jr., Computer Data Security, Litton Educational Publishing Company, 1973. . Keefe, T.F., et al., "Prototyping the SODA Security Model," Department of Computer Science, University of Minnesota, 1990, pp. 211-235. . Kelman, Alistair, "Electronic Copyright Management: Possibilities and Problems", Scientists for Labor Presentation, Nov. 14, 1996. . "Key Management Using ANSI X9.17,"Federal Information Processing Standards Publication 171, U.S. Department of Commerce (Apr. 1992). . "KeyKOS Principles of Operation," Key Logic document KL002-04, 1985, Fourth Edition, Jan. 1987. . Kelter, U., "Discretionary Access Controls in a High-Performance Object Management System," 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20-22, 1991, Oakland, California, pp. 288-299. . Kelter, U., et al., "Type Level Access Controls for Distributed Structurally Object-Oriented Database Systems," Computer Security, ESCORICS 92, Second European Symposium on Research In Computer Security, Toulouse, France, Nov. 23-25, 1992, pp. 21-40. . Kent, S., et al., "Privacy Enhancement for Internet Electronic Mall: Part II--Certificate-Based Key Management," Network Working Group, Aug. 1989, pp. 1-22. . Kent, S., Privacy Enhancement for Internet Electronic Mail: "Part II: Certificate-Based Key Management,"Network Working Group, RFC 1422, 1993, pp. 1-29. . Kent, S., "U.S. Department of Defense Security Options for the Internet Protocol," Network Working Group RFC 1108, Nov. 1991. . Ketchpel, Steve P., et al. "Shopping Models: A Flexible Architecture for Information Commerce", Stanford University. . Kim, Gene H., et al. "Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection," Purdue Technical Report CSD-TR-94-012, Feb. 21, 1994. . Kim, G.H., et al., "The Design and Implementation of Tripwire: A File System Integrity Checker." Nov. 19, 1993. . Kim. L., et al., "Novell Cuisine," Proceedings of the ACM SIGUCCS User Services Conference XIX, Nov. 3-6, 1991, Seattle, Washington, pp. 183-184. . Kim, W., et al., "Features of the ORION Object-Oriented Database System," 1989, pp. 251-282. . Kim, Won, et al., Object-Oriented Concepts, Databases, and Applications, ACM Press, 1989. . Klemond, P., "Investigating Object Linking and Embedding, Part II: Adding Server Support," Microsoft Systems Journal, May/Jun. 1992, pp. 87-94. . Klemond, P., "Taking the Bull by the Horns: Investigating Object Linking and Embedding, Part I," Microsoft Systems Journal, Mar./Apr. 1992, pp. 19-38. . Kluepfel, H.M., "Securing a Global Village and its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks," 1993, pp. 195-212. . Koenig, A., "Automatic Software Distribution," Usenix Association Software Tools Users Group, Summer Conference, Salt Lake City, Jun. 12-15, 1984, pp. 312-322. . Kohl et al., "Safeguarding Digital Library Contents and Users," IBM research Division, D-Lib magazine. Sep. 1997. . Kohl, J.T., et al., "The Evolution of the Kerberos Authentication Service," Digital Equipment Corporation, (1991), pp. 1.15. . Konheim, Alan, G., et al.,Cryptography: A Primer, John Wiley & Sons, Inc., 1981. . Krajewski, Jr., M., "Applicability of Smart Cards to Network User Authentication," Computing Systems, vol. 7, No. 1, Winter 1994, pp. 75-89. . Krajewski, Jr., M., "Smart Card Augmentation of Kerberos,". The Mitre Corporation, (undated), 6 pages. . Krajewski, Jr., M., et al., Concept for a Smart Card Kerberos, The Mitre Corporation, (undated), 7 pages. . Kramer, M., "Strength in Numbers," PC Week, Jul. 22, 1986, pp. 57-58. . Kreutzer, A.N. "An On-Line System for Controlling and Monitoring Software Usage in a Microcomputer Laboratory," SIGUCCS Newsletter, vol. 18, No. 2, 1988, pp. 29-32. . Kristol, D.M., et al., "Anonymous Internet Mercentile Protocol," AT&T Bell Laboratories, Mar. 17, 1994, pp. 1-16. . Krol, E., The Whole Internet User's Guide and Catalog, 2nd. Ed., O'Reilly & Associates, Inc., 1992. . Kurak, C., et al., "A Cautionary Note On Image Downgrading," Proceedings of the 1992 Computer Security Applications Conference, San Antonio, TX, Dec. 1992, 7 pages. . Lacy, Jack, el al., "Music on the Internet and the Intellectual Property Protection Problem". . Lagoze et al., "A Design for Inter-Operable Secure Object Stores (ISOS)," Cornell University, NCSA, CNRI, Nov. 1995. . Lagoze.,Carl, "A Secure Repository Design for Digital Libraries", D-Lib Magazine, Dec. 1995. . LaLonde Wilf, R., et al., Inside Smalltalk: vol. 1, Prentice-Hall, Inc., 1990. . Lampson, B., "Computer Security." Digital Equipment Corporation, 1991, pp. 1-54. . Lampson, B.W., "A Note on the Confinement Problem," Communications of the ACM, Oct., 1973, pp. 1-5. . Landwehr, C.E, et al., "A Taxonomy of Computer Program Security Flaws," ACM Computer Surveys, vol. 26, No. 3, Sep. 1994, pp. 211-254. . Landwehr, C.E., "Formal Models for Computer Security," Computer Surveys, vol. 13, No. 3, Sep. 1981, pp. 247-278. . Langelaar, G.C. "Overview of Protection Methods in Existing TV and Storage Devices," SMS-TUD-609-1, Final Ver. 1,2, Feb. 26, 1996. . Leary, P., "Are There Ciphers in Shakespeare?," 1995, pp. 1-18. . Lehman, B., "Intellectual Property and the National Information Infrastructure, A Preliminary Draft of the Report of the Working Group on Intellectual Property Rights." Jul. 1994, 4 introductory pages and pp. 1-141. . Leiss, E., "On Authorization Systems with Grantor-Controlled Propagation on Privileges," Compcon 83, Feb. 28-Mar. 3,1983, San Francisco, California, pp. 499-502. . Letter re: ESPIRIT III-Project 5469 (CITED) from A. Stajano at Commission of the European Communities, Oct. 7, 1993. . Levine, P.H., et al., "Network License Server," Apollo, Oct. 1987, pp. 1-19. . Levy, Steven; "E-Money (That's What I Want)", Wired Magazine, Issue 2.12, Dec. 1994. . Lewontin, S., et al., "The DCE Web Project: Providing Authorization and Other Distributed Services to the World Wide Web," Feb. 22, 2002. . Lin, P.; "The Encapsulated Security Services Interface (ESSI)," Computer Security (A-37), 1993, pp. 119-135. . Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part I--Message Encipherment and Authentication Procedures," Network Working Group, Aug. 1989, pp. 1-30. . Lipson, S., "Little Black Box `Blocks` Illicit Software Copying." Stamford Advociate, Sep. 14, 1986, pp. E1-E2. . Lockhart, Jr., H.W., OSF DCE Guide to Developing Distributed Applications, McGraw-Hill, Inc., 1994. . Lorcan Dempsey & Stuart L. Weibel; The Warwick Metadata Workshop; A Framework for the Deployment of Resource Description, Jul./Aug. 96. . Lord et al., "Access Management in Multi-Administration Networks," IEE 2nd International Conference on Secure Communication Systems, 1986. . Low, S.H., et al., "Anonymous Credit Cards," Proceedings of the 2nd ACM Conference on Computers and Communication Security, Fairfax, Virginia, Nov. 2-4, 1994, pp. 1-10. . Lunt, Teresa, "Multilevel Security for Object-Oriented Database Systems," SRI International Computer Science Laboratory, 1990, pp. 199-209. . Mann, C.C., "Homeland Insecurity," Sep. 2002. . Maude, T., et al., "Hardware Protection Against Software Piracy," Communications of the ACM, vol. 27, No. 9, Sep. 1984, pp. 951-959. . Maxemchuk, N.F.,; Electronic Document Distribution, AT&T Bell Laboratories. . McCloghrie, K., et al., "Definitions of Managed Objects for Administration of SNMP Parties," Network Working Group, Jul. 1992, pp. 1-17. . McCloghrie et al., "Management Information Base for Network Management of TCP/IP-based Internets," Network Working Group, RFC 1156 (May 1990). . McCollum, C.J., et al., "Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.", Unisys Defense Systems, 1990, pp. 190-200. . McGraw, G., et al., Java Security, John Wiley & Sons, Inc., 1997. . Medvinsky, G., et al., "NetCash: A Design for Practical Electronic Currency on the Internet," Information Sciences Institute, University of Southern California, 1993, pp. 102-106. . Merkle, R.C., "Secure Communications Over Insecure Channels," Communications of the ACM, vol. 21, No. 4, Apr. 1978, pp. 294-296. . Merkle, Ralph C., "Protocols for Public Key Cryptosystems", IEEE, 1980. . Meyer, C.H., et al., Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, Inc., 1982. . "Mach Books," viewed on Feb. 6, 2002 at http://www2.cs.cmu .edu/afs/cs/project/mach/public/www/doc/books.html., pp. 1-3. . "Microsoft Authenticode Technology," Microsoft Corporation, Oct. 1996. . "MSDN-INF: LAN Manager 2.1 Server Autotuning (Part2)," PSS ID No. 080078, Microsoft, Feb. 1993. . "MSDN-Licence Service Application Programming Interface," API Specification vl.02, Micorsoft, Jan. 1993. . "Multimedia System Services Ver. 1.0", Hewlett-POackard, IBM, & SunSoft, 1993. . Microsoft Press, OLE 2 Programmer's Reference: vol. 1, "Working with Windows Objects," 1994. . Millen, J.K., et al., "Security for Object-Oriented Database Systems," Proceedings of the 1992 IEREE Computer Society Symposium on Research in Security and Privacy, May 4-6, 1992, Oakland, California, pp. 260-272. . Miller, S.P., et al., "Kerberos Authentication and Authorization System," Massachusetts Institute of Technology, Oct. 27, 1998, pp. 1-36. . Minear, S.E., "Providing Policy Control Over Object Operations in a Mach Based System," Secure Computing Corporation, Apr. 28, 1995, 15 pages. . Miscellaneous letter from Georges Van Slype at Bureau Van Dijik, Feb. 28, 1994. . Moens, Jan, "Case of Application of the Generic CITED Model to the CITEDisation of a Directory Database on CD-ROM, Ver. 2.0," ESPIRIT II, Project 5469, The CITED Consortium, Nov. 30, 1992. . Miscellaneous Letters from Georges Van Slype at Bureau Van Dijk, Apr: 19, 1994, Apr. 18, 1994, Apr. 11, 1994, Apr. 6, 1994. . Miscellaneous Letters from Georges Van Slype at Bureau Van Dijk, Feb. 13, 1995 and Nov. 2, 1994. . Miscellaneous Letters from Georges Van Slype at Bureau Van Dijk, Feb. 9, 1994, Jan. 27, 1994, Jan. 19, 1994, Jan. 12, 1994, Dec. 22, 1993, Nov. 30, 1993, Nov. 22, 1993, Dec. 6, 1993, Nov. 16, 1993, Oct. 15, 1993, Oct. 7, 1993, Oct. 4, 1993, Sep. 20, 1993. . Miscellaneous Letters from Georges Van Slype at Bureau Van Dijk, Mar. 30, 1994, Mar. 24, 1994, Feb. 10, 1994. . Miscellaneous Letters from Georges Van Slype at Bureau Van Dijk, Mar. 30, 1995. . Miscellaneous Letters from Georges Van Slype at Bureau Van Dijk, Sep. 12, 1994, May 11, 1994, May 10, 1994, May 6, 1994, May 4, 1994, Apr. 21, 1994, Apr. 20, 1994. . Moens, Jan, "Report on the Users Requirements, Ver. 1.0," ESPIRIT II, Project 5469, The CITED Consortium, Nov. 27, 1991. . Moffeti, J., et al., "Specifying Discretionary Access Control Policy for Distributed Systems," Computer Communications, vol. 13, No. 9, Nov., 1990, pp. 1-17. . Moffett, J.D., "Specification of Management Policies and Discretionary Access Control," Department of Computer Science, University of York, Jun. 28, 1994, pp. 1-28. . Moffett, J.D., et al., "The Representatiorn of Policies as System Objects," Proceedings of the Conference on Organizational Computer Systems (COCS'91), Atlanta, Georgia, Nov. 5-8, 1991, 16 pages. . Moffett, J.D.,et al., "Policy Hierarchies for Distributed Systems Management," IEEE JSAC Special Issue on Network Management, vol. 11, No. 9, Dec. 1993, pp. 1-4. . Moffett, Jonathan, D., et al., "An Introduction to Security Distributed Systems," Department of Computer Science, University of York, England Aug. 1993, pp. 1-14. . Montini, G, et al., "Access Control Models and Office Structures," Computer Security: A Global Challenge, 1984, pp. 473-485. . Mori, R. et al., "Superdistribution: The Concept and the Architecture," The Transactons of the EIEICE, V, E73, No.7, Tokyo, Japan, Jul. 1990, pp. 1133-1146. . Motorola MC68030 Enhanced 32-bit Microprocessor User's Manual, 2nd Ed., Prentice-Hall, 1989. . Muftic, Sead, Security Mechanisms for Computer Networks, Ellis Horwood Limited, 1989. . Mullender, S., Distributed Systems, ACM Press, 1989. . Multics, Home; viewed on Nov. 12, 2001 at <http://www/multicians.org> pp. 1-3. . Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme via Encryption; IBM Technical Disclosure BUlletin, vol. 37, No. 3, Mar. 1994. . National Computer Security Center, "Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX (R) System," Aug. 18,1989. . National Institute of Standards and Technology, "History of Computer Security: Early Computer Security Papers, Part 1," viewed on Sep. 4, 2002 at <http://csrc.nist.gov/publications/history/index.html> pp. 1-27. . National Security Agency, "A Guide to Understanding Security Modeling in Trusted Systems," Oct. 1992, 122 pages. . National Semiconductor "iPower Technology," (undated), 11 pages. . Needham, R.M., "Ading Capability Access to Conventional File Servers," Xerox Palo Alto Research Center, (undated), pp. 3-4. . Neuman et al. "Kerberos: An Authentication Service for Computer Networks," IEEE Communications magazine, Sep. 1994. . Neuman, B.C., "Proxy-Based Authorization and Accounting for Distributed Systems," Information Sciences Institute, University of Southern California, 1993, pp. 283-291. . Nguyen, Thanh et al., "Guidelines for VaIidation of a CITED system," CITED 5469, SA-21-40-003, Jul. 4, 1994. . NIST & NSA, "Federal Criteria for Information Technology Security," vol. II, Version 1.0. National Institute of Standards and Technology and National Security Agency, Dec. 1992, 270 pages. . NSA Korean War 1950-1953 Commemoration, History Papers, National Security Agency, http://www.nsa.gov/korea/papers.htm, pp. 1-2. . O'Connor, MaryAnn, "New Distribution Option for Electronic Publishers," Information Access Co., Mar. 1994, pp. 1-6. . Olivier, M.S., "A Multilevel Secure Federated Database," Database Security, VIII (A-60), 1994, pp. 183-198. . Olson, M., et al., "Concurrent Access Licensing," vol. 6, No. 9, Unix Review, 1988, pp. 67-74. . OLE 2.0 Draft Content: Object Linking & embedding, Microsoft, Jun. 5, 1991. . 0MG Security Working Group, "0MG White Paper on Security," 0MG Security Working Group, Apr. 1994, pp. 1-24. . OOPSLA 1993: Addendum to the Proceedings, "Security for Object-Oriented Systems." Sep. 26-Oct. 1, 1993, pp. 77-78. . Open Software Foundation, OSF DCE Administration Guide-Core Components, PTR Prentice Hall, 1993. . Orfali, R., et al., The Essential Distributed Objects Survival Guide, John Wiley & Sons, Inc., 1996. . Organick, E.I., The Multics System: An Examination of Its Structure, MIT Press, 1972. . Paepcke, Andreas, "Summary of Stanford's Digital Library Testbed and Status," Stanford University, D-Lib Magazine, Jul. 1996. . Paradinas, Pierre et al., "New Directions for Integrated Circuit Cards Operating Systems." . Park, J.S., AS/400 Security in a Client/Server Environment, John Wiley & Sons, Inc., 1995. . Perlman, Bill, "A Working Anti-Taping System for Cable Pay-Per-View," IEEE Trans. On Consumer Electronics, vol. 35, No. 3 (Aug. 1989). . Pethia et at., "Guidelines for the Secure Operation of the Internet," Network Working Group, RFC 1281, Nov. 1991. . Pietreck, M., Windows Internals: The Implementation of the Windows Opeartion Environment, Addison-Wesley, 1993. . Pijenborg, Mari, F.J., "Auteursrecht En De Digitale Bibliotheek," 195 Open, Jan. 1995. . Pijnenborg, Mari F.J., "CITED Final Report," Elsevier Science B.V., Apr. 1994. . Picciotto, J., et al., "Extended Labeling Policies for Enhanced Application Support," Computers & Security, vol. 13, No. 7, 1994, pp. 587-599. . PKCS #1:RSA Encryption Standard, RSA Laboratories Technical Note, Ver. 1.5, revised Nov. 1, 1993. . PKCS #3: Duffie-Hellman Key-Agreement Standard, RSA Laboratories Technical Note, Ver. 1.4, revised Nov. 1, 1993. . PKCS #5: Password-Based Encryption Standard. An RSA Laboratories Technical Note, Ver. 1.5, 1991-1993, Revised Nov. 1, 1993. . PKCS #6: Extended-Certificate Syntax Standard, RSA Laboratories Technical Note, Ver. 1.5, revised Nov. 1, 1993. . PKCS #8: Private-Key Information Syntax Standard, An RSA Laboratories Technical Note, Ver. 1.2, 1991-1993, Revised Nov. 1. 1993. . PKCS #9: Selected Attribute Types, RSA Laboratories Technical Note, Ver. 1.1, revised Nov. 1, 1993. . PKCS #10: Certification Request Syntax Stanard An RSA Laboratories Technical Note, Ver. 1.0, Nov. 1. 1993. . PKCS #11: Cryptographic Token Interface Standard, An RSA Laboratories Technical Note, Ver. 2.0, Apr. 15, 1997. . PKCS #12 v 1.0: Personal Information Exchange Syntax, RSA Laboratories, Jun. 24, 1999. . PKCS #13: Elliptic Curve Crytography Standard, RSA Security, Jan. 12, 1998. . PKCS #15 v 1.0: Cryptographic Token Information Format Standard, RSA Laboratories, Apr. 23, 1999. . "Privacy and the Nil: Safeguarding Telecommunications--Related Personal Infrmation", U.S. Dept. of Commerce, Oct. 1995. . Polk, T.W., "Approximating Clark-Wilson "Access Triples" with Basic UNIX Controls," Symposium Proceedings, Unix Security IV, Oct. 4-6, 1993, Santa Clara, California, pp. 145-154. . Popek, Gerald, J., et al., "Encryption and Secure Computer Networks," Computing Surveys, vol. 11, No. 4, Dec. 1979, pp. 331-356. . Press. J., "Secure Transfer of Identity and Privilege Attributes in an Open Systems Environment," Computers & Security, vol. 10, No. 2, 1991, pp. 117-127. . Press, Jim et al, "A New Approach to Crytographic Facility Design", ICL Mid-Range Systems Division Reading, Berks, UK. . "Proceedings: Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment," 1994, Coalition for Networked Information, Interactive Multimedia Association, John F. Kennedy School of Government, Journal of the Interactive Mutlimedia Association, available at <http://www.cni.org/docs/ima.ip-workshop>, 308 pages. . Purdy, G.B., et al., "A Software Protection Scheme," Proceedings of the 1982 Symposium on Security and Privacy, Apr. 26-28, 1982, Oakland CalIfornia, pp. 99-103. . Rashid, R.F., CMU Computer Science: A 25th Anniversary Commemorative, Addison-Wesley Publishing Company, 1991. . Reali, Patti, "Copy Protection: The answer to pay per view's Prayers?," TVRO Dealer, Dec. 1994. . Reiher et al., "Truffles--A Secure Service for Widespread File Sharing," UCLA, Trusted Information Systems. . Rescorla, E.; et al., "The Secure HyperText Transfer Protocol," Enterprise Integration Technologies, Jun. 1994, pp. 1-23. . Resnick, P., "Filtering Information on the Internet," Scientific American, Mar. 1997, pp. 62-64. . Richardson, D.W., Electronic Money: Evolution of an Electronic Funds-Transfer System, The MIT Press. 1970. . Rindfrey J., "Security in the World Wide Web." Fraunhofer Institute for Computer Graphics, Dec. 1996. . Rindfrey, Jochen, "Towards an Equitable System for Access Control and Copyright Protection in Broadcast Image Services; The Equicrypt Approach," Fraunhofer Institute for Computer Graphics. . Rivest, R., "The MD5 Message-Digest Algorithm," Network Working Group, Apr. 1992, pp. 1-21. . Rivest, R.L., et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, No. 2, Feb., 1978, pp. 120-126b. . Rivest, Ronald L., et al., "SDSI--A Simple Distributed Security Infrastructure". MIT and Microsoft Corporation, Apr. 30, 1996. . Roberts, R., et al., Compute!'s Computer Security, Compute!Publications, Inc., 1989. . Robinson et al., "Encoding Header Field for Internet Messages," Network Working Group RPC 1154, Apr. 1990. . ROI, Personal Library Software, 1987 or 1988. . Rose et al., "Structure and Identification of management Information for TCP/IP-based Internets," Network Working Group RFC 1155, May 1990. . Rosenberry. W., et al., "Distributing Applications Across DCE and Windows NT," 1993. . Rosenberry, W., et al., Understanding DCE, O'Reilly & Associates, Inc., 1992. . Rosenthal, Doug, "EINet: A secure, Open Network for Electronic Commerce", IEEE, 1994. . Ross, P.E., "Cops versus robbers in cyberspace," Forbes, Sep. 9, 1996. . Rouaix, F., "A Web Navigator with Applets in Cami," INRIA. . Rozenblit, Moshe, "Secure Software Distribution", IEEE 0-7803-1811-0/94, 1994. . RSA Security; News: "Enterprise Solutions Announces RSA Mail," <http://rsasecurity.com/news/pr/940112-2.html.>, dated Jan. 12; 1994, pp.1-2. . RSA Security; News; "Hewlett-Packard ChoosesRSA," <http://rsasecurity.com/news/pr/940112-5.html.>, dated Jan. 12,1994, pp. 1-2. . RSA Security; News; "Hilgraeve Ships Secure Version of HyperACCESS/5," <http://rsasecurity.com/news/pr/940112-8.html.>, dated Jan. 12, 1994, pp. 1-2. . RSA Security; News; "iPower's Data Security Approach," <http://rsasecurity.com/news/pr/940112-10.html.>, dated Jan. 12, 1994. . "Request for Technology: Multimedia System Services", Ver. 2.0, Interactive Multimedia Association Compatibility Project, Nov. 9, 1992. . RSA Security; News; "RSA Enters Wireless Arena," <http://rsasecurity.com/news/pr/940112-6.html.>, dated Jan. 12,1994, pp. 1-2. . RSA Security; News; <http://rsasecurity.com/news/pr/9401.html.>, dated Jan. 12,1994, pp. 1-2. . Rubin, A.D., "Trusted Distribution of Software Over the Internet," Bellcore, 1995, pp. 1-9. . Rushby, J.M., "Design and Verification af Secure Systems," ACM, 1981, pp. 12-21. . Russell, D., et al., Computer Security Basics, O'Reilly & Associates, Inc., 1991. . Russell, S., "Paradigms for Verification of Authorization at Source of Electronic Documents in an Integrated Environment," Computers & Security, vol. 12, No. 6, 1993, pp. 542-549. . Russell, S., "Planning for the EDI of Tomorrow Using Electronic Document Authorization," Computer Security (A-37), 1993, pp. 243-251. . S.H. Low, N.F. Maxemchuk, J.T. Bassil, & L. O'Gorman, "Document Marking and Identification Using Both Line and Word Shifting," AT&T Bell Laboratories Infocom 95, Jul. 29, 1994. . Sammer et al., "New Tools for the Internet," Jeanneum Research, Graz University of Technology. . Sander, T. et al., "Protecting Mobile Agents Against Malicious Hosts," Mobile Agents and Security: Lecture Notes in Computer Science, Springer-Verlag, G. Vigna, Ed., vol. 1419, Nov. 11, 1997, 16 pages. . Sander, T. et al., "Towards Mobile Cryptography," IEEE Proceedings of Security and Privacy, May 1998, 10 pages. . Sandhu, R., et al., "A Secure Kernelized Architecture for Multilevel Object-Oriented Databases," Proceedings of the IEEE Computer Security Foundations Workshop IV, Jun. 1991, Franconia, NH, pp. 139-152. . Sandhu, R.S., "The Typed Access Matrix Model," Proceedings of the IEEE Symposium on Security and Privacy, Oakland California, May 4-6, 1992, pp. 122-136. . Sandhu, R.S., et al.. "Data and Database Security and Controls." Handbook of Information Security Management, Auerbach Publishers, 1993, pp. 1-37. . Sandhu, Ravi, S., et al., "Implementation considerations for the Typed Access Matrix Model in a Distributed Environment," Proceedings of the 15th NIST-SCSC National Computer Security Conference, Baltimore, Maryland, Oct. 1992, pp. 221-235. . Saydjari, O.S., et al., "LOCK Trek: Navigating Unchartered Space," National Computer security Center, 1989, pp. 167-175. . Schaumuller-Bichl, S., "IC-Cards in High-Security Applications," Voest-Alpine AG, (undated), pp. 177-199. . Schill, A., et al., "Mobility Aware Multimedia X. 400 e-mail: A Sample Application Based on a Support Platform for Distributed Mobile Computing," Dresden University of Technology, Faculty of Computer Science, (undated), pp. 1-7. . Schill, A.B., et al., "DC++: Distributed Object-Oriented System Support on top of OSF DCE," 1993. . Schill, A.B., at al., "DCE-The OSF Distributed Computing Environment Client Server Model and Beyond," Oct. 1993. . Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., 1994. . Sebes, E.J., et al., "The Architecture of Triad: A Distributed, Real-Time, Trusted System," (undated), pp. 1-12. . Sebes, E.J., et al., "The Triad System: The Design of a Distributed, Real-Time, Trusted System," (undated), pp. 1-12. . Secure Computing, "Constructing a High Assurance Mail Guard," 1994, pp. 1-10. . Shaffer, S.L., et al., Networik Security, Academic Press, Inc., 1994. . Shear, Victor; "Solutions for CD-ROM Pricing and Data Security Problems". . Sheridan Software Systems, Data Widgets 2.0: Programmer's Guide, Sheridan Software Systems, Inc., 1993-1995. . Shirley, J., "Guide to Writing DCE Applications," 1st Ed. 1992. . Shirley, J., et al., "Guide to Writing DCE Applications," 2nd Ed. 1994. . Short, K.L., Microprocessors and Programmed Logic, Prentice-Hall, Inc., 1981. . Schulze, Dr. J., "Case of Application of the Generic CITED Model to the CiTEDisation in the Software Distribution Process," ESPIRIT II, Project, Jan. 12, 1993. . Schutzer, D., "A Need for a Common Infrastructure: Digital Libraries and Electronic Commerce," Citibank, D-Lib Magazine, Apr. 1996. . Short, K.L., Microprocessors and Programmed Logic, Prentice-Hall, Inc., 1981. . Sibert, O., et al., "The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems," (undated), 12 pages. . "Security Enhanced LINUX," National Security Agency, http://www.nsa.gov/selinux/, pp. 1-2. . "Security in KeyKOS." . "SIGSALY Secure Digital Voice Communications in World War II," National Security Agency, http://www.nsa.gov/wwii/papers/sigsaly.htm, Oct. 13, 2000, pp. 1-2. . "S/PAY: RSA's Developer's Suite for Secure Electronic transactions (SET)," RSA Data Security, Inc., 1997. . Simon et al., "Digital Images Protection Management in a Broadcast. Framework: Overview/TALISMAN Solution," Thomson-CSF, RTBF, ART3000, UCL. . Sirbu et al., "NetBill: An Internet Commerce System Optimized for Network Delivered Services," Carnegie Mellon University. . Smart Card 1993 Conference Proceedings, "Day 1: Communications and Marketing Systems & Market Overview," Lowndes Exhibition Organisers, Ltd., 1993, pp. 1-79. . Smith, Mary Grace, et al., "A New Set of Rules for Information Commerce: Rights-Protection Technologies and Personalized-Information Commerce Will Affect All Knowledge Workers", CommunicationsWeek, Nov. 6, 1995. . Solomon, A., PC Viruses: Detection, Analysis and Cure, Springer-Verlag, (undated). . Solomon, Daniel, J., "Processing Multilevel Secure Objects," Proceedings of the 1981 Symposium on Security and Privacy, Apr. 27-29, 1981, Oakland, California, pp. 56-61. . St. Johns, M., "Draft Revised IP Security Option", Network Working Group, RFC, 1038, Jan. 1998. . Stallings, W., Cryptography and Network Security: Principles and Practice, Prentice-Hall, Inc., 1999. . "STARFISH State of the Art Financial Services for the in Habitants of Isolated Areas--Project Profile," Information Society technologies, time schedule, Jan. 21, 2000-Jun. 30, 2002. . Stepney et, al., "Formal specification of an Access Control System," Software-Practice and Experience, vol. 17, No. 9, 1987. . Strack, Hermann, "Extended Access Control in UNIX System V-ACLs and Context," Usenix Association, Proceedings of the Unix Security II Workshop, Aug. 27-28, 1990, Portland, Oregon, pp. 87-101. . Stubblebine, S.G., "Security Services for Multimedia Conferencing," Proceedings of the 16th National Computer Security Conference, Baltimore, Maryland, Sep. 20-23, 1993, pp. 1-5. . Summaries of Projects (FP III/IV)--Part I: "ESPIRIT Project 20517--COPYSMART CITED based multi-media IPR management on cost effective smart device," European Information technology for Information Science, Oct. 1998. . Swedlow, Tracy, "2000: Interactive Enhanced Television: A Historical and Critical Perspective," Interactive TV Today. . "TALISMAN: Tracing Authors' Rights by Labeling Image Services and Monitoring Access Network," ACTS, Swiss Participation in European Research Programs, Sep. 1, 1995, Aug. 31, 1998. . Tanenbaum et al., "Amoeba System," Communications of the ACM, vol. 33, No. 12, Dec. 1990. . Tanenbaum, A.S., et al., "Distributed Operating Systems," Computing Surveys, vol. 17, No. 4, Dec. 1985, pp. 419-470. . Tanenbaum, A.S., et al., "Experiences with the Amoeba Distributed Operating System," 1990. . Tanenbaum, A.S., et al., "The Amoeba Distributed Operating System," 1990. . Tanenbaum, A.S., Modern Operating Systems, Prentice-Hall, Inc. 1992. . Tanenbaum, A.S., Operating Systems: Design and Implementation, Prentice-Hall, Inc. 1987. . Tanenbaum et al., "Using Sparse Capabilities in a Distributed Operating System," Vrije Universiteit and Centre for Mathematics and Computer Science. . Tardo et al., "Mobile Agent Security and Telescript," General Magic, Inc. . "Technical Description: Pay-Per-View Copy Protection," Macrovision, Jun. 1994. . "Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements," http://www.radium.ncsc.mil/tpep/library/rainbow/CSC-STD-004-85.html, Jun. 25, 1985, pp. 1-40. . "Technical Strategies for Protecting Intellectual Property in the Networked Multimedia Environment", IMA Intellectual Property Proceedings, vol. I, Issue 1, Jan. 1994. . "Telescript Security," BYTE.com, Oct. 1994. . "TELENET TELEtraining Platform (on NETworks)--Project Profile," Information Society Technologies, time schedule, Mar. 6, 2000-Mar. 30, 2000. . The First USENIX Workshop on Electronic Commerce Proceedings, New York, New York, Jul. 11-12, 1995, Usenix Association. . "The Future of Cited: A Feasibility Study," ESPIRIT II, Project 5469, CITED Project Review, Apr. 15, 1994. . "The PowerTV White Paper", powertv.com website, Oct. 11, 1996. . The Risks Digest, "Forum on Risks to the Public in Computers and Related Systems," vol. 15; Issue 39, Jan. 21 1994, pp. 1-12. . The Risks Digest, "Forum on Risks to the Public in Computers and Related Systems," vol. 15; Issue 47, Feb. 9, 1994, pp. 1-12. . "The Standard Business:Time for Change," European Commision DG111 Espirit Project 5th Consensus Forum, Nov. 3-4, 1998. . Think C: Object-Oriented Programming ManuaI, Symantec Corporation, 1989. . Thomas, R.K., et al, "Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects," Proceedings of the IFIP Workshop on Database Security; Aug. 19-21, 1992, Vancouver, Canada, 21 pages. . Thompson, Victoria P., et al., "A Concept for Certification of an Army MLS Management Information System", Proceedings of the 16th NationaI Computer Security Conference, Sep. 20-23, 1993. . Thor, "A Distributed Object-Oriented Database System", MIT. . Thuraisingham, B., et al., "Parallel Processing and Trusted Database Management Systems." ACM, 1993. . Thuraisingham, M.B., "Mandatory Security in Object-Oriented Database Systems," OOPSLA '89 Proceedings, Oct. 1-6, 1989, pp. 203-210. . Ting, T.C., et al., "Requirements, Capabilities and Functionalities of User Role Based Security for an Object-Oriented Design Model," Database Security, V: Status and Prospectus, 1992, pp. 275-297. . Tirkel, A.Z. et al., "Electronic Water Mark," (undated), 5 pages. . Toohey, J., Using OLE 2.X in Application Development, Que Corporation, 1994. . Townsend, J.E., "NIST on Internet Security," Mar. 22, 1994, pp. 1-15. . Tuck, Bill, "Electronic Copyright Management Systems: Final Report of a Scoping Study for Elib," Jul. 1996. . TULIP Final Report, ISBN 0-444-82540-1, 1991, revised Sep. 18, 1996. . U.S. Department of Commerce (NIST), "Security Requirements for Cryptographic Modules, " Jan. 11, 1994, pp. 1-53. . U.S. Patent and Trademark Prosecution History for National Semiconductor Corporation "iOpener" Trademark, Registration date Oct. 4, 1994, 27 pages. . Uhler, Stephen A., "PhoneStation, Moving the Telephone onto the Virtual Desktop," 1993 Winter USENIX, San Diego, California, Jan. 25-29, 1993, pp. 131-140. . UniverCD: The InterActive, Online Library of Product Information From Cisco Systems, Cisco Systems 1993. . Unix System v. Release 3.2. Programmer's Guide. vol. II, AT&T, Prentice Hall, 1989. . van Gilluwe, F., The Undocumented PC: A Programmer's Guide to I/O, Cpus, and Fixed Memory Areas, Addison-Wesley Publishing Company, 1994. . van Schyndel, R.G., et al., "A Digital Watermark," (undated), 3 pages. . Van Slype, Georges et al, "The Future of CITED; a Feasibility Study," ESPIRIT II, Project 5469, The CITED Consortium, Nov. 15, 1993. . Van Slype, Georges et al., "Natural Language Version of the Generic CITED Model, Ver. 4.2, vol. I: Presentation of the Generic Model," ESPIRIT II, Project 5469, The CITED Consortium, May 8, 1995. . Van Slype, Georges et al., "The Future of CITED: A Feasibility Study, Ver. 1.0, vol. II: Full Report," ESPIRIT II, Project 5469, The ClTED Consortium, Feb. 28, 1994. . Van Slype, Georges, "Draft CITED Interchange Formats, Ver. 1.0", ESPIRIT II, Project 5469, the CITED Consortium, Jan. 28, 1994. . Van Slype, Georges, "Knowledge Economy; Future Trends," CITED 5469. . Van Slype, Georges, "Natural Language Version of the generic CITED model Vol. I: Presentation of the generic model, ver. 3.0", and "vol. II: Cltedf usage monitoring system design for computer based applications, ver. 1.0" Project 54659, The CITED Consorti. . Van Slype, Georges, "Natural Language Version of the Generic CITED Model, Ver. 2.1, vol. II ECMS (Electric Copyright Management System) Design for Computer Based Applications," ESPIRIT II, Project 5469, The CITED Consortium, May 8, 1995. . Van Slype, Georges, "PL4 RACE/ACCOPI Workshop on Conditional Access and Copyright Protection," ESPIRIT II, Project 5469, Presentation of the CITED, Nov. 9, 1994. . Van Slype, Georges, "The CITED Approach, Ver. 4.0," ESPIRIT II, Project 5469, The CITED Consortium, Apr. 20, 1994. . Van Slype, Georges, "The Future of CITED: A Feasibility Study, Ver. 1.0, vol. I: Summary Report and and Recommendations," ESPIRIT II, Project 5469, The CITED Consortium, Feb. 28, 1994. . Van Slype, Georges, "The Future of CITED: A Feasibility Study, Ver. 1.1, vol. I: Summary Report and Recommendations," ESPIRIT II. Project 5469, The CITED Consortium, Mar. 28, 1994. . Van Slype, Georges, "The Future of CITED: A Feasibility Study, Ver. 1.1, vol. III: Draft CITED Interchange Formats," ESPIRIT II, Project 5469, The CITED Consortium, Feb. 28, 1994. . Vickers Benzel, T.C., et al., "Identification of Subjects and Objects in a Trusted Extensible Client Server Architecture," (undated), pp. 1-17. . Vittal, J., "Active Message Processing: Messages as Messengers," Bolt, Beranek and Newman, Inc., 1980, pp. 175-195. . Voydock, V.L., et al., "Security Mechanisms in High-Level Network Protocols," Computing Surveys, vol. 15, No. 2, Jun. 1983, pp. 135-171. . Wagner, N. "Fingerprinting," Drexel University, IEEE Symp. On Info. and Privacy, Apr. 1993. . Walker, Bruce, J., et al., Computer Security and Protection Structures, Dowden, Hutchinson, & Ross, Inc., 1977. . Walker, S., "Notes from RSA Data Security Conference," Jan. 18, 1994, pp. 1-3. . Ware, W., Chairman RAND Corporation "Panel: The InterTrust Commerce Architecture," 1997, 6 pages. . Wayner, P., "Agents Away," Byte.com, May 1994, pp. 1-9. . Wayner, Peter, Digital Copyright Protection, Academic Press, 1997. . Weadon, P.D., "The SIGSALY Story," Dec. 10, 2002. . Weber, Robert; "Digital Rights Management Technologies--A Report to the International Federation of Reproduction Rights Organisations", Northeast Consulting Resources, Inc., Oct. 1995. . Weber, Robert; "Metering Technologies for Digital Intellectual Property--A Report to the International Federation of Reproduction Rights Organisations", International Federation of Reproduction on Rights Organisations, Northeast Consulting Resources, Inc. . Weingart, S.H., "Physical Security for the uABYSS System", IEEE, 1987. . Wells, Rob, Odyssey of Plastic Purchase; 20-Second Round Trip, Associated Press, Dec. 1993. . Willett, S., "Metered PCs: Is Your System Watching You?, Wave Systems Beta Tests New Technology," IDG Communications, Inc., May 2, 1994, pp. 1-6. . Williams, S., "An MSJ Interview with Microsoft's Chief Architect of OLE, Tony Williams," Microsoft Systems Journal, Oct. 1993, pp. 55-66. . Williams, Tony, "Microsoft Object Strategy", Microsoft PowerPoint Presentation, 1990. . Winslet et al., "Formal Query Languages for Secure Relational Databases," ACM Transactions on Database Systems, vol. 19, No. 4, Dec. 1994. . White, J.E., "Telescript Technology: An Introduction to the Language," General Magic, Inc., (undated), pp. 1-13. . White, Steve R.; Comerford, Liam; ABYSS: A Trusted Architecture for Software Protection:, IEEE, Apr. 27, 1987. . White, Steve R.; Comerford, Liam; "ABYSS: An Architecture for Software Protection", IEEE Transations on Software Engineering, vol 16, No. 6 Jun. 1990. . Wobber, E. et al., "Authentication in the Taos Operating System," an extended version of a paper presented at the 14th ACM Symposium on Operating System Principles, Dec. 1993, 44 pages, (Digital Paper). . Wong, R., et al., "The SIDOS System: A Secure Distributed Operating System Prototype," Odyssey Research Associates, Oct. 1989, pp. 172-183. . Woo, Thomas, Y.C., et al., "A Framework for Distributed Authorization," Proceedings of the 1st Conference Computer and Communication Security, Nov. 1993, pp.112-118. . Wood, P.H., et al., UNIX System Security, Pipline Associates, Inc., 1985. . Yee, B., et al., "Secure Coprocessors in Electronic Commerce Applications," Proceedings of the First Usenix Workshop on Electornic Commerce, New York, New York, Jul. 1995, 16 pages. . Young, W.D., "Verifiable Computer Security and Hardware: Issues," Computational Logic, Inc., Sep. 1991, pp. 1-39. . Zeleznick, M.P., "Security Design in Distributed Computing Applications," Department of Computer Science, University of Utah, Dec. 1993, 16 pages. . Zelnick, Nate, "Keeping Business Safe on the Internet," PC Magazine, Apr. 25, 1995, pp. 1-2. . Zurko, M.E., "Panels at the 1997 IEEE Symposium on Security and Privacy." Oakland, CA, May 1997, 12 pages. . Abadi, M. et al., "Authentication and Delegation with Smart-cards," Technical Report 67, DEC Systems Research Center, Oct. 1990, available at <http://citeseer.nj.nec.com/article/abadi92authentication.html>, 22 pages. . Best, R.M., "Preventing Software Piracy With Crypto-Microprocessors," Digest of Papers, VLSI: New Architectural Horizons, Feb. 1980, pp. 466-469. . Blaze, M., "A Cryptographic File System for Unix," pre-print of paper for First ACM Conference on Computer and Communications Security, Fairfax, Virginia, Nov. 3-5, 1993, 8 pages. . Blaze, M., "Key Management in an Encrypting File System," Proc. Summer '94 USENIX Tech. Conference Boston, MA. Jun. 1994, available at <http://www.usenix,org/publications/libratry/proceedings/bos94/full. sub.13 papers/blaze.asp>, 12 pages. . Castano, S. et al., Database Security, Addison-Wesley & Acm Press, 1995. . Champine, G., MIT Project Athena: A Model for Distributed Campus Computing, Digital Equipment Corporation, 1991, 22 introductory pages, Chapter 1 (pp. 3-18); Chapter 2 (pp. 19-33); Chapter 3, (pp. 37-68); Chapter 4 (pp. 69-75); Chapter 5 (pp. 79-107). . Chaum, D. et al. "Wallet databases with observers," Ernest F. Brickell, editor, Advances in Cryptology--CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, CA, Aug. 16-20, 1992, Proceedings, pp. 89-105. . Chaum, D., "Security Without Identification Card Computers to Make Big Brother Obsolete," Communications of the ACM, vol. 28., No. 10, Oct. 1985, 24 pages. . "List of Articles," <www.chaum.com/articles/list-of-articles.htm>, as on Aug. 23, 2002, 4 pages. . Cox, B., "What if There is a Silver Bullet and the competition gets it first?" Journal of Object-Oriented Programming, Jun. 1992, available at <http://www.virtualschool.edu/cox/CoxWhatifSilverBullet.html>, 5 pages. . CUPID Protocols and Services (Version 1): "An Architectural Overview," Nov. 1992, available at <http//www.cni.org/projects/CUPID>, 25 pages. . Custer, H. Inside Windows NT, Microsoft Press, Redmond WA, 1993. . Davies, D. et al., Security for Computer Networks, 2nd ed., John Wiley & Sons, 1989, 22 introductory pages and pp. 1-377. . Denning, D. E., "Secure Personal Computing in an Insecure Network," Communications of the ACM, Aug. 1979, vol. 22, No. 8, pp. 476-482. . Denning, D.E., "Cryptography and Data Security," Addison-Wesley, 1982. . Gleick, J., "Dead as a Dollar," The New York Times Magazine, Jun. 16, 1996, Sect. 6, pp. 26-30, 35, 42, 50, 54. . Hearst. M.A., "Interfaces for Searching the Web," Scientific American, Mar. 1997, pp. 68-72. . Herzberg, A. et al., "Public Protection of Software," ACM Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp. 371-393. . Ioannidis, J. et al., "The Architecture and Implementation of Network-Layer Security Under Unix," Fourth USENIX Security Symposium Proceedings (Oct.), USENIX, Berkeley, Calif. 1993, 11 pages. . Kohl, J. et al., "The Kerberos Network Authentication Service (V 5)," Network Working Group Reguest for Comments RFC-1510, Sep. 1993, 104 pages. . Kohl, U et al., "Safeguarding Digital Library Contents and Protecting Documents Rather Than Channels," in D-lib Magazine, Sep. 1997, available at <http://www.dlib.org/dlib/september97/ibm/09lotspiech.html>, 9 pages. . Lanza, M., "George Gilder's Fifth Article-Digital Darkhorse--Newspapers," Feb. 21, 1994, 2 pages. . Lampson, B. et al., "Authentication in Distributed Systems: Theory and Practice." ACM Trans. Computer Systems, vol. 10, No. 4 (Nov. 1992), 46 pages. . Lynch. C., "Searching the Internet," Scientific American, Mar. 1997, pp. 52-56. . Olivier, M.S. et al.,"A Taxonomy for Secure Object-oriented Databases," ACM Transactions on Database Systems, vol. 19, No. 1, Mar. 1994, pp. 3-46. . Olivier, M.S. et al., "Building a Secure Database using Self-protecting Objects," Computers & Security, vol. 11, No. 3, 1992, 14 pages. . Olivier, M.S. et al., "DISCO: A Discretionary Security Model for Object-oriented Databases," in GG Gable and WJ Caelli, Eds., IT Security: The Need for International Cooperation, pp. 345-357, Elsevier Science Publishers B.V. (North Holland), 1992, 14 pages. . Olivier. M.S. et al., "Secure Object-oriented Databases," Ph.D. Thesis, Rand Afrikaans University, Johannesburg, Dec. 1991, pp. i to xiv and 1-183. . "Proceedings: Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment," 1994, Coalition for Networked Information, Interactive Multimedia Association, John F. Kennedy School of Government, Journal of the Interactive Multimedia Association, available at <http://www.cni.org/docs/ima.ip-workshop> 308 pages. . Resnick, P., "Filtering Information on the Internet," Scientific American, Mar. 1997, pp. 62-64. [mistitled "Search the Internet" In form PTO-1449 previously submitted]. . Sager, I., "Bits & Bytes," Business Week, Sep. 23,1996, p. 142E. . Sibert, O. et al., "DigiBox: A Self-Protecting Container for Information Commerce," Proceedings of the First USENIX Workshop on Electronic Commerce, New York, NY, Jul. 1995, 13 pages. . Sibert, O. et al., "Securing the Content, Not the Wire, for Information Commerce," InterTrust Technologies Corporation, 1996, 12 pages. . Siuda, K., "Security Services in Telecommunications Networks," Seminar: Mapping New Applications Onto New Technologies, edited by B. Plattner and P. Gunzburger; Zurich, Mar. 8-10, 1988, pp. 45-52. . Stefik, M., "Trusted Systems," Scientific American, Mar. 1997, pp. 78-81. [mistitled "Interfaces for Searching the Web" on form PTO-1449 previously submitted]. . Symposium: "Applications Requirements for Innovative Video Programming: How to Foster (or Cripple) Program Development Opportunities for Interactive Video Programs Delivered on Optical Media: A Challenge for the Introduction of DVD (Digital Video Disc)," Sheraton Universal Hotel, Universal City, CA). . Tygar, J.D. et al., "Strongbox: A System for Self Securing Programs," CMU Computer Science: 25th Anniversary Commemorative, R. Rashid (ed.) Addison-Wesley, 1991, pp. 163-197. . White, J.E., "Telescript Technology: The Foundation for the Electronic Marketplace," General Magic, 1994. . Wobber, E. et al., "Authentication in the Taos Operating System," an extended version of a paper presented at the 14th ACM Symposium on Operating System Principles, Dec. 1993, 44 pages, (Digital Paper). . "Introducing . . . The Workflow CD-ROM Sampler," Creative Networks, MCI Mail: Creative Networks, Inc., (undated), 2 pages. . "CGI Common Gateway Interface," Document from the Internet [email protected], 1996, 1 page. . "About the Digital Notary Service," Surety Technologies, 1994-5, 6 pages. . "Sag's durch die Blume," (undated), 5 pages http://123.koehntopp.de/marit/publikationen/steganographie/index. . "What the Experts Are Reporting on PowerAgent," PowerAgent Press Releases, Aug. 13, 1997, 6 pages. . "What the Experts Are Reporting on PowerAgent," PowerAgent Press Releases, Aug. 4, 1997, 5 pages. . "Serving the Community: A Public Interest Vision of the National Information Infrastructure," Computer Professionals for Social Responsibility, Executive Summary, (Undated, pp. 8-38. . "Is Advertising Really Dead?," Wired 2.02, Part 2, 1994, 4 pages. . "How Can I Put an Access Counter on My Home Page?," World Wide Web FAQ, 1996, 1 page. . Arneke, D., et al.,"AT&T Encryption System Protects Information Services," (News Release), Jan. 9, 1995, 1 page. . Baggett, D., "Cable's Emerging Role in the Information Superhighway," Cable Labs, (undated), 13 pages. . Barassi, T.S .,"The Cybernotary: Public Key Registration and Certification and Authentication of International Legal Transactions," (undated), 4 pages. . Barnes, H., memo to Henry LaMuth, subject: George Gilder articles, May 31, 1994, 2 pages. . Bart, D., "Comments in the Matter of Public Hearing and Request for Comments on the International Aspects of the National Information Infrastructure," Before the Department of Commerce, Aug. 12, 1994, pp. 1-15. . Baum, M., "Worldwide Electronic Commerce: Law, Policy and Controls Conference" Nov. 11, 1993, 18 pages. . Bisbey II, R.L., et al., "Encapsulation: An Approach to Operating System Security," (USC/Information Science Institute, Marina Del Rey, CA), Oct. 1973, pp. 666-675. . Blom, R., et al., "Encryption Methods in Data Networks," Ericsson Technics, No. 2, Stockholm, Sweden, 1978. . Bruner, R.E., "Power Agent, NetBot.Help Advertisers Reach Internet Shoppers," Aug. 1997, 3 pages. . Caruso, D. "Technology, Digital Commerce: 2 Plans for Watermarks, Which Can Bind Proof of Authorship to Electronic Works," N.Y. Times, Aug. 7, 1995, p. D5. . Choudhury, A.K., et al, "Copyright Protection for Electronic Publishing Over Computer Networks," AT&T Bell Laboratories, Murray Hill, NJ, Jun. 1994, 17 pages. . Clark, T., "Ad Service Gives Cash Back," <www.news.com/News/Item/0,4,13050,00.html> (visited Aug. 4, 1997), 2 pages. . Cunningham, D., et al , "AT&T, VLSI Technology Join To Improve Info Highway Security," (News Release) Jan. 31, 1995, 3 pages. . Dempsey L.., "The Warwick Metadata Workshop: A Framework for the Deployment of Resource Description," D-Lib Magazine, Jul. 15, 1996, 8 pages. . Denning, D.E., et al., Data Security, 11 Computing Surveys No. 3, Sep. 1979, pp. 227-249. . Diffie, W. et al., "New Directions in Cryptography," IEEE Transactions on Information Theory, vol. 22, No. 6, Nov. 1976, pp. 644-651. . Diffie, W. et al., "Privacy and Authentication: An Introduction to Cryptography," Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979, pp. 397-427. . Dussee, S.R., et al., "A Cryptographic Library for the Motorola 56000," Advances in Cryptology-Proceedings of Eurocrypt 90, (I.M. Damgard, ed., Springer-Verlag) 1991, pp. 230-244. . Dyson, E., "Intellectual Value," WIRED Magazine, Jul. 1995, pp. 136-141 and 182-183. . Garcia, D.L., "Science, Space and Technology, Hearing before Subcomm. On Technology, Environment, and Aviation," May 26, 1994. . Greguras, F., "Softic Symposium '95, Copyright Clearances and Moral Rights," Dec. 11, 1995, 3 pages. . Guillou, L.C. "Smart Cards and Conditional Access," Advances in Cryptography--Proceedings of EuroCrypt 84 (T. Beth et al, Ed., Springer-Veriag, 1985) pp. 480-490. . Haar, S.V., Document from the Internet. "PowerAgent Launches Commercial Service," Interactive Week, Aug. 4 1997, 1 page. . Harman, H., Modern Factor Analysis, Third Edition Revised, University of Chicago Press, Chicago and London, 1976. . Hofmann, J., "Interfacing the NII to User Homes," Consumer Electronic Bus. Committee, NIST, Jul. 1994, 12 slides. . Jiang, J.J., et al., "A Concept-based Approach to Rerieval from an Electronic Industrial Directory," International Journal of Electronic Commerce, vol. 1, No. 1 (Fall 1996) pp. 51-72. . Kelly, K., "E-Money," Whole earth Review, Summer 1993, pp. 40-59. . Kent, S. T., "Protecting Externally Supplied Software in Small Computers," (MIT/LCS/TR-255) Sep. 1980, 254 pages. . Kristol, D.M., et al., "Anonymous Internet Mercantile Protocol," AT&T Bell Laboratories, Murray Hill, NJ, Mar. 17, -1994, pages 1-16. . Lagoze, C., "The Warwick Framework, A Container Architecture for Diverse Sets of Metadata," D-Lib Magazine, Jul./Aug. 1996, 7 pages. . Levy, S., "E-Money, That's What I Want," WIRED, Dec. 1994 10 pages. . Low, S.H., et al., "Anonymous Credit Cards," AT&T Bell Laboratories, Proceedings of the 2nd ACM Conference on Computer and Communication Security, Fairfax, VA, Nov. 2-4, 1994, 10 pages. . Low, S.H., et al., "Anonymous Credit Cards and Its Collusion Analysis" AT&T Bell Laboratories, Murray Hill, NJ, Oct. 10, 1994, 18 pages. . Low S H., et al., "Document Marking and Identification Using both Line and Word Shifting" AT&T Bell Laboratories, Murray Hill, NJ, Jul. 29, 1994, 22 pages. . Maclachlan, M., Document from the Internet: "PowerAgent Debuts Spam-Free Marketing," TechWire, Aug. 13, 1997, 3 pages. . Maxemchuk, N.F., "Electronic Document Distribution," AT&T Bell Laboratories, Murray Hill, NJ, (undated), 11 pages. . Milbrandt, E., Document from the Internet: "Steganography Info and Archive," 1996, 2 pages. . Mori, R., et al., "Superdistribution: The Concept and the Architecture," The Transactons of the EIEICE, V, E73, No. 7, Tokyo, Japan, Jul. 1990, pp. 1133-l146. . Mossberg, W.S., "Personal Technology, Threats to Privacy On-Line Become More Worrisome," The Wall Street Journal, Oct. 24, 1996, 2 pages. . Negroponte, N., "Some Thoughts on Likely and Expected Communications Scenarios: A Rebuttal," Telecommunications, Jan. 1993, pp. 41-42. . Negroponte, N., "Electronic Word of Mouth," WIRED, Oct. 1996, p. 218. . Neumann, P.G., et al., "A Provably Secure Operating System: The System, Its Applications, and Proofs," Computer Science Laboratory Report CSL-116, Second Edition, SRI International, Jun. 1980, 206 pages . Pelton, J.N., "Why Nicholas Negroponte is Wrong About the Future of Telecommunications," Telecommunications, Jan. 1993, pp. 35-40. . Rankine, G., "THOMAS--A Complete Single-Chip RSA Device," Advances in Cryptography, Proceedings of CRYPTO 86, (A.M. Odiyzko Ed., Springer-Verlag) 1987, pp. 480-487. . Reilly, A.K., "Input to the `International Telecommunications Hearings,` Panel 1: Component Technologies of the NIl/GIl," Standards Committee T1-Telecommunciations (undated). . Resnick, P., et al., "Recommender Systems," Communications of the ACM, vol. 40, No.3, Mar. 1997, pp. 56-89. . Rose, L., Cyberspace and the Legal Matrix: Laws or Confusion?, 1991. . Rosenthal, S., "Interactive Network: Viewers Get Involved, New Media," Dec. 1992, pp. 30-31. . Rosenthal, S., "Interactive TV: The Gold Rush is on, New Media," Dec. 1992, pp. 27-29. . Rosenthal, S.,"Mega Channels," New Media, Sep. 1993, pp. 36-46. . Rothstein, E., "Technology Connections, Making The Internet Come To You Through `Push` Technology," N.Y. Times, Jan. 20, 1997, p. D5. . Rutkowski, K., "PowerAgentIntroduces First Internet `Informediary` to Empower and Protect Consumers," Tech Talk News Story, Aug. 4, 1997, 1 page. . Schlosstein, S., "America: The G7's Comeback Kid, International Economy," Jun./Jul. 1993, 5 pages. . Scnaumueller-Bichl, S., et al., "method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques," (undated), 9 pages. . Schumann, J. "Pattern Classification, a Unified View of Statistical and Neural Approaches," John Wiley & Sons, Inc., 1996. . Shear, V., "Solutions for CD-ROM Pricing and Data Security Problems," CD ROM Yearbook 1988-1989 (Microisoft Press 1988 or 1989) pp. 530-533. . Smith. S., et al/. "Signed Vector Timestamps: A Secure Protocol for Partial Order Time," CMU-93-116, School of Computer Science Carnegie Mellon University, Pittsburgh, Pennsylvania, Oct. 1991; version of Feb. 1993, 15 pages. . Stefik, M. "Letting Loose the Light: Igniting Commerce in Electronic Publication," Xerox PARC, Palo Alto, CA, 1994-1995, 35 pages. . Stefik, M., "Letting Loose the Light: Igniting Commerce in Electronic Publication," Internet Dreams: Archetypes, Myths, and Metaphors. Massachusetts Institute of Technology, 1996, pp. 219-253. . Stefik, M.,"Chapter 7, Classification," Introduction to Knowledge Systems, Morgan Kaufmann Publishers, Inc., 1995, pp. 543-607. . Stephenson, T., "The Info Infrastructure Initiative: Data Super Highways and You," Advanced Imaging, May 1993, pp. 73-74. . Sterling, B., "Literary Freeware: Not for Commercial Use," Computers, Freedom and Private Conference IV, Chicago, IL, Mar. 26, 1994. . Struif, B., "The Use of Chipcards for Electronic Signatures and Encryption," Proceedings for the 1989 Conference on VSLI and Computer Peripherals, IEEE Computer Society Press, 1989, pp. (4)155-(4)158. . Tygar, J.D., et al., "Cryptography: It's Not Just for Electronic Mail Anymore," CMU-CS-93-107, School of Computer Science Carnegie Mellon University, Pittsburgh, PA, Mar. 1, 1993, 21 pages. . Tygar, J.D., et al., "Dyad: A System for Using Physically Secure Coprocessors," School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, May 1991, 36 pages. . Valovic, T., "The Role of Computer Networking in the Emerging Virtual Marketplace," Telecommunications, (undated), pp. 40-44. . Voight, J., "Beyond the Banner," Wired, Dec. 1996, pp. 196, 200, 204. . Weber, R.,"Metering Technologies for Digital Intellectual Property," A Report to the International Federation of Reproduction Rights Organisations (Boston, MA), Oct 1994, pp. 1-29. . Weber, R., Document from the Internet: "Digital Rights Management Technologies," Oct. 1995, 21 pages. . Weber, R., "Digital Rights Management Technologies," A Report to the International Federation of Reproduction Rights Organisations, Northeast Consulting Resources, Inc., Oct. 1995, 49 pages. . Weder, A., "Life on the Infohighway," INSITE, (undated), pp. 23-25. . Weingari, S.H., "Physical Security for the ABYSS System," (IBM Thomas J. Watson Research Center, Yorktown Heights, NY), 1987, pp. 52-58. . Weitzner, D.J., "A Statement on EFF's Clpen Platform Campaign as of Nov.," 1993, 3 pages. . White, S.R., "ABYSS: A Trusted Architecture for Software Protection," (IBM Thomas J. Watson Research Center, Yorktown Heights, NY), 1987, PP. 38-50. . Yee, B., "Using Secure Coprocessors", CMU-CS-94-149, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, 1994, 94 pages. . Yellin, F., Document from the Internet: "Low Level Security in Java," Sun Microsystems, 1996, 8 pages. . "Argent Information, Q&A Sheet," Document from the Internet: <http://www.digital-watermark.com/>, Copyright 1995, The DICE Company, (last modified Jun. 16, 1996), 7 pages. . "New Products, Systems and Services," AT&T Technology, vol. 9, No. 4, (undated), pp. 16-19. . "Cable Television and America's Telecommunications Infrastructure," (National Cable Television Association, Washington, D.C.), Apr. 1993, 19 pages. . "Codercard, Basic Coder Subsystem," Interstate Electronics Corp., Anaheim, CA, (undated), 4 pages. . "Communications of the ACM," vol. 39, No. 6, Jun. 1996, 130 pages. . "Communications of the ACM," Intelligent Agents, vol. 37, No. 7, Jul. 1994, 170 pages. . "Computer Systems Policy Project (CSSP), Perspectives on the National Information Infrastructure: Ensuring Interoperability," Feb. 1994, 5 slides. . "DiscStore" (Electronic Publishing Resources, Chevy Chase, MD), 1991. . "DSP56000/DSP56001 Digital Signal Processor User's Manual," (Motorola), 1990, p. 2-2. . Premenos Corp "White Paper: The Future of Electronic Commerce," A Supplement to Midrange Systems, Premenos Corp. Aug. 1995, 4 pages. . "HotJava.TM.: The Security Story," (undated) 4 pages. . "Templar Overview: Premenos," undated, 4 pages. . Templar Software and services, Secure Reliable, Standards-Based EDI Over the Internet, undated, 1 page. . "JAVASOFT, Frequently Asked Questions-Applet Security," Jun. 7, 1996, 8 pages. . "News from The Document Company XEROX, Xerox Announces Software Kit for Creating `Working Documents` with Dataglyphs," Nov. 6, 1995, 13 pages. . "Premenos Announces Templar 2.0--Next Generation Software for Secure Internet EDT," Jan. 17, 1996, 1 page. . "WEPIN Store, Stenography (Hidden Writing)," Common Law, 1995; 1 page. . "EIA and TIA White Paper on National Information Infrastructure," The Electronic Industries Association and the Telecommunications Industry Association, Washington, D.C., (undated), 27 pages. . "Electronic Currency Requirements," XIWT (Cross Industry Working Group), (undated), 16 pages. . "Electronic Publishing Resources Inc. Protecting Electronically Published Properties Increasing Publishing Profits" (Electronic Publishing Resources, Chevy Chase, MD) 1991, 19 pages. . "What is Firefly?," Firefly Network, Inc., Firefly revision: 41.4, Copyright 1995, 1996,1 page. . "First CII Honeywell Bull International Symposium on Computer Security and Confidentiality," Conference Text, Jan. 26-28, 1981, pp. 1-21. . "Framework for National information Infrastructure Services," Draft, U.S. Department of Commerce, Jul. 1994. . "Framework for National Information Infrastructure Services," NIST, Jul. 1994, 12 Slides. . "Intellectual Property and the National Information Infrastructure, a Preliminary Draft of the Report of the Working Group on Intellectual Property Rights," Green paper, Jul. 1994, 141 pages. . "Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme Via Encryption," IBM Technical Disclosure Bulletin, vol. 37, No. 3, Mar. l, 1994, pp. 413-417. . "Transformer Rules Strategy for Software Distribution Mechanism-Support Products," IBM Technical Disclosure Bulletin, vol. 37, No. 48, Apr. 1994, pp. 523-525. . "IISP Break Out Session Report for Group No. 3," Standards Development and Tracking System, (undated). . Information Infrastructure Standards Panel: NII "The Information Superhighway," NationsBank--HGDeal--ASC X9, (undated), 15 pages. . "Invoice? What's an Invoice?," Business week, Jun. 10, 1996, pp. 110-112. . "Micro Card," Micro Card Technologies, Inc., Dallas, TX, (undated), 4 pages. . "Background on the Administration's Telecommunications Policy Reform Initiative," News Release, The White House, Office of the President, Jan. 11, 1994, 7 pages. . "NII, Architecture Requirements, XIWT," (undated), 38 pages. . Symposium: "Open System Environment Architectural Framework for National Information Infrastructure Services and Standards, in Support of National Class Distributed Systems," Distributed System Engineering Program Sponsor Group, Draft 1.0, Aug. 5, 1994, 34 pages. . "Proper Use of Consumer Information on the Internet," White Paper, Power Agent Inc., Menlo Park, CA, Jun. 1997, 9 pages. . "Portland Software's Ziplock," Internet Information, Copyright Portland Software 1996-1997, 12 pages. . Press Release, National Semiconductor and EPR Partner for Information Metering/Data Security Cards (Mar. 4, 1994). . "ROI--Solving Critical Electronics Publishing Problems," Personal Library Software, 1987 or 1988, 4 pages. . "The 1:1 Future of the Electronic Marketplace: Return to a Hunting and Gathering Society," (undated), 2 pages. . "The Benefits of ROI for database Protection and Usage Based Billing," Personal Library Software, 1987 or 1988, 5 pages. . "The New Alexandria No. 1," Alexandria Institute, Jul.-Aug. 1986, pp. 1-12. . XIWT Cross Industry Working Team, Jul. 1994, 5 pages.. |