期刊文献+

软件授权技术的研究 被引量:8

Research and Development of Software Licensing Technology
下载PDF
导出
摘要 软件授权是软件保护技术的延伸与发展。首先对软件保护技术进行了简单的分析和概括。在此基础上重点介绍了软件授权技术,分析了最新发展的云授权和软件即服务(SaaS)技术的特点以及需要解决的问题。最后对虚拟化技术的应用给软件授权带来的新问题进行了探讨。通过对各种问题引发原因的分析,得出SaaS作为一种创新的商业模式,只要能保证使用者的安全性,SaaS将会解决软件授权目前面临的许多问题。目的是对软件授权技术进行全面的分析与研究,指出软件授权技术面临的新问题以及今后的发展方向。 Software licensing is the development of software protection. First summarize software protection technology. On the basis, focus on software licensing technology including latest cloud licensing and SaaS ( software as a service ) technology, their characteristics and problems to be solved are also included. Finally, the challenges of software licensing comes from virtualization are analysed and dis- cussed. According to analyzing the reasons of software licensing problems, a conclusion is got that SaaS is a new business mode and it can solve the problems as long as it ensures the safety of users. The purpose is to point out the software licensing existing issues and development direction
出处 《计算机技术与发展》 2012年第9期235-238,共4页 Computer Technology and Development
基金 陕西省教育专项科研项目(09JK518)
关键词 软件保护 软件授权 软件即服务 虚拟化技术 software protection software licensing software as a service virtualization
  • 相关文献

参考文献9

二级参考文献42

  • 1沈海波,史毓达.软件代码的防篡改技术[J].武汉科技学院学报,2004,17(5):64-67. 被引量:7
  • 2李永祥,陈意云.基于函数指针数组的代码迷惑技术[J].计算机学报,2004,27(12):1706-1711. 被引量:14
  • 3佟晓筠,王翥,杜宇,岳银亮.基于软件安全混合加密技术的研究[J].计算机工程,2004,30(23):98-100. 被引量:20
  • 4安康.SaaS 全新的软件世界[J].软件世界,2006(15):25-25. 被引量:3
  • 5Collberg C,Thomborson C,Low D.Breaking abstractions and unstructuring data structures[C].In Proc IEEE InternationalConference on Computer Languages,1998:28-38.
  • 6Barak B.On the(Im)possibility of Obfuscating Programs[C].Proc of 21 Ann.Int'l Cryptology Conf,2001:l-18.
  • 7Collberg C S,Thomhomon C.Watermarking,Tamper-proofing and Obfuscation-Tools for Software Protection[J].IEEE Transactions on Software Engineering,2002,8(8).
  • 8LINN C,DEBRAY S.Obfuscation of executable code to improve resistance to static disassembly[C] //Proc of the 10th ACM CCS'03.New York:ACM Press,2003:290-299.
  • 9WANG Chen-xi.A security architecture for survivability me-chanisms[D].Charlottes:Department of Computer Science,University of Virginia,2000.
  • 10Ogiso T,Sakabe Y,Soshi M,Miyaji A.Softwate tamper resitance based on the difficulty of interprocdeural analysis[C] //The Third International Workshop on Information Security Applications,2002:437-452.

共引文献47

同被引文献36

引证文献8

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部