Page 241

Association of American Universities (AAU). 1994. Report of the AAU Task Force on Intellectual Property Rights in an Electronic Environment. Available online at <>.

Atkins, D., P. Buis, C. Hare, R. Kelley, C. Nachenburg, A.B. Nelson, P. Philips, T. Ritchie, and W. Steen. 1996. Internet Security: Professional Reference. Indianapolis, IN: New Riders Publishing.

Aucsmith, D. 1996. "Tamper Resistant Software," pp. 317–334 in Proceedings of the 1st International Information-Hiding Workshop. Lecture Notes in Computer Science, 1174. Berlin: Springer.

Bauman, Larry. 1999. "New Issues, Including Interactive Intelligence, Cybergold, and eGain, Weather the Tech Sell-Off," Wall Street Journal, September 24, p. C7.

Bayeh, E. 1998. "The Web Sphere Application Server Architecture and Programming Model," IBM Systems Journal, 37(3):336–348.

Bearman, David, and Jennifer Trant. 1998. "Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process," D-Lib Magazine, June. Available online at <>.

Benkler, Y. 1999. "Intellectual Property and the Organization of Information Production." Draft: October. New York: New York University Law School.

Besen, Stanley M., and Leo J. Raskind. 1991. "An Introduction to the Law and Economics of Intellectual Property," Journal of Economic Perspectives, 5(1):3–27, Winter.

Blaze, M., J. Feigenbaum, and J. Lacy. 1996. "Decentralized Trust Management," pp. 164–173 in Proceedings of the 17th Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press. Available online at <>.

Blaze, Matt, J. Feigenbaum, Paul Resnick, and M. Strauss. 1997. "Managing Trust in an Information-Labeling System," European Transactions on Telecommunications, 8(5):491–501, September.

Blaze, Matt, J. Feigenbaum, and Martin Strauss. 1998. "Compliance Checking in the PolicyMaker Trust-Management System," pp. 254–274 in Proceedings of the 2nd Financial Cryptography Conference. Lecture Notes in Computer Science, 1465. Berlin: Springer.

Bloomberg News. 1999a. "6 Companies to Push New Digital Standard," Bloomberg News, New York Times, February 18.

Bloomberg News. 1999b. " Sues Microsoft," Bloomberg News, New York Times, October 14. Available online at <>.

Brackenbury, I.F., D.F. Ferguson, K.D Gottschalk, and R.A. Storey. 1998. "IBM's Enterprise Server for Java," IBM Systems Journal, 37(3):323–335.

Branscomb, Anne W. 1994. Who Owns Information? From Privacy to Public Access. New York: Basic Books.

Briggs, B. 1998. "Lotus eSuite," IBM Systems Journal, 37(3):372–385.

Buel, Stephen. 1999. "Grateful Dead Lets Fans Swap Concert Recordings on the Web," San Jose Mercury News, May 12, p. 1A.

Business Software Alliance/Software and Information Industry Association (BSA/SIIA). 1999. 1999 Global Software Privacy Report. Washington, DC: BSA/SIIA.

Business Wire. 1999a. "Liquid Audio and 48 Leading Companies Form Coalition to Add Authentication Mark to Digital Music Formats Including MP3," Business Wire (via Lexis/Nexis), Redwood City, CA, January 25. Available online at <>.

Business Wire. 1999b. " Links Patent Licensing Program to SDMI, Targeting Companies for Provisional Agreements," Business Wire (via Lexis/Nexis), Beverly Hills, CA, January 28. Available online at <>.

The National Academies of Sciences, Engineering, and Medicine
500 Fifth St. N.W. | Washington, D.C. 20001

Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement