Page 241

Association of American Universities (AAU). 1994. Report of the AAU Task Force on Intellectual Property Rights in an Electronic Environment. Available online at <http://www.arl.org/aau/IPTOC.html>.

Atkins, D., P. Buis, C. Hare, R. Kelley, C. Nachenburg, A.B. Nelson, P. Philips, T. Ritchie, and W. Steen. 1996. Internet Security: Professional Reference. Indianapolis, IN: New Riders Publishing.

Aucsmith, D. 1996. "Tamper Resistant Software," pp. 317–334 in Proceedings of the 1st International Information-Hiding Workshop. Lecture Notes in Computer Science, 1174. Berlin: Springer.

Bauman, Larry. 1999. "New Issues, Including Interactive Intelligence, Cybergold, and eGain, Weather the Tech Sell-Off," Wall Street Journal, September 24, p. C7.

Bayeh, E. 1998. "The Web Sphere Application Server Architecture and Programming Model," IBM Systems Journal, 37(3):336–348.

Bearman, David, and Jennifer Trant. 1998. "Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process," D-Lib Magazine, June. Available online at <http://www.dlib.org/dlib/june98/06bearman.html>.

Benkler, Y. 1999. "Intellectual Property and the Organization of Information Production." Draft: October. New York: New York University Law School.

Besen, Stanley M., and Leo J. Raskind. 1991. "An Introduction to the Law and Economics of Intellectual Property," Journal of Economic Perspectives, 5(1):3–27, Winter.

Blaze, M., J. Feigenbaum, and J. Lacy. 1996. "Decentralized Trust Management," pp. 164–173 in Proceedings of the 17th Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press. Available online at <http://www.research.att.com/~jf/pubs/oakland96proc.ps>.

Blaze, Matt, J. Feigenbaum, Paul Resnick, and M. Strauss. 1997. "Managing Trust in an Information-Labeling System," European Transactions on Telecommunications, 8(5):491–501, September.

Blaze, Matt, J. Feigenbaum, and Martin Strauss. 1998. "Compliance Checking in the PolicyMaker Trust-Management System," pp. 254–274 in Proceedings of the 2nd Financial Cryptography Conference. Lecture Notes in Computer Science, 1465. Berlin: Springer.

Bloomberg News. 1999a. "6 Companies to Push New Digital Standard," Bloomberg News, New York Times, February 18.

Bloomberg News. 1999b. "Priceline.com Sues Microsoft," Bloomberg News, New York Times, October 14. Available online at <http://www.nytimes.com/library/tech/99/10/biztech/articles/14suit.html>.

Brackenbury, I.F., D.F. Ferguson, K.D Gottschalk, and R.A. Storey. 1998. "IBM's Enterprise Server for Java," IBM Systems Journal, 37(3):323–335.

Branscomb, Anne W. 1994. Who Owns Information? From Privacy to Public Access. New York: Basic Books.

Briggs, B. 1998. "Lotus eSuite," IBM Systems Journal, 37(3):372–385.

Buel, Stephen. 1999. "Grateful Dead Lets Fans Swap Concert Recordings on the Web," San Jose Mercury News, May 12, p. 1A.

Business Software Alliance/Software and Information Industry Association (BSA/SIIA). 1999. 1999 Global Software Privacy Report. Washington, DC: BSA/SIIA.

Business Wire. 1999a. "Liquid Audio and 48 Leading Companies Form Coalition to Add Authentication Mark to Digital Music Formats Including MP3," Business Wire (via Lexis/Nexis), Redwood City, CA, January 25. Available online at <http://www.businesswire.com>.

Business Wire. 1999b. "SightSound.com Links Patent Licensing Program to SDMI, Targeting Companies for Provisional Agreements," Business Wire (via Lexis/Nexis), Beverly Hills, CA, January 28. Available online at <http://www.businesswire.com>.



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement