Techniques for Limiting Use
Access control
Effective multilevel security is hard to achieve
Copy protection
Hardware and software
Licensing
Shrink-wrap, Shareware, GNU Public license
Digital watermarks
Provide a basis for prosecution
Previous slide
Next slide
Back to first slide
View graphic version