Goel, U. and Dua, R. L. (2012). A review paper on cryp-
tographic approach for license management system in
cloud computing. In Indian Journal of Computer Sci-
ence and Engineering (IJCSE), volume 3, No.4, pages
626–631.
Goldreich, O. (1987). Towards a theory of software pro-
tection and simulation by oblivious rams. In Proc. of
ACM STOC ’87, pages 182–194.
Goldreich, O. and Ostrovsky, R. (1996). Software protec-
tion and simulation on oblivious rams. In Journal of
ACM, volume 43(3), pages 431–473.
Hohl, F. (1998). Time limited blackbox security: Protecting
mobile agents from malicious hosts. In Lecture Notes
in Computer Science 1419, pages 92–113.
Hou, Z., Zhou, X., and Wang, Y. (2007). Software li-
cense management optimization in the campus com-
putational grid environment. In Proc of the third In-
ternational Conference on Semantics, Knowledge and
Grid, pages 604 –605.
Kantarcioglu, M., Bensoussan, A., and Hoe, S. (2011). Im-
pact of security risks on cloud computing adoption. In
2011 49th Annual Allerton Conference on Communi-
cation, Control, and Computing (Allerton), pages 670
–674.
Li, J., Weldrich, O., and Ziegler, W. (2008). Towards sla-
based software licenses and license management in
grid computing. In From Grids to Service and Per-
vasive Computing, pages 139–152.
Mana, A. and Pimentel, E. (2001). An efficient software
protection scheme. In Proc. of 16th IFIP International
Conference on Information Security (ISC2001), pages
385–401.
Microsoft Corporation (2003). Technical overview of win-
dows rights management services for windows server
2003.
Monden, A., Iida, H., Matsumoto, K., Inoue, K., and
Torii, K. (2000). A practical method for watermark-
ing java programs. In Proc. of 24th Computer Soft-
ware and Applications Conference (COMPSAC2000),
pages 191–197.
Mumtaz, S., Iqbal, S., and Hameed, E. I. (2005). Develop-
ment of a methodology for piracy protection of soft-
ware installations. In Proc. of International Multi-
topic Conference (INMIC2005).
Nakano, Y., Cid, C., Kiyomoto, S., and Miyake, Y.
(2012). Memory access pattern protection for
resource-constrained devices. In Proc. of The 8th
Smart Card Research and Advanced Application Con-
ference (CARDIS2012), LNCS, volume 7771, pages
188–202.
Popovic, K. and Hocenski, Z. (2010). Cloud computing
security issues and challenges. In MIPRO, 2010 Pro-
ceedings of the 33rd International Convention, pages
344 –349.
Raekow, Y., Simmendinger, C., Grabowski, P., and Jenz,
D. (2010). License management in grid and cloud
computing. In Proc. of 2010 International Conference
on P2P, Parallel, Grid, Cloud and Internet Computing
(3PGCIC), pages 9 –15.
Shaikh, F. and Haider, S. (2011). Security threats in cloud
computing. In 2011 International Conference for
Internet Technology and Secured Transactions (IC-
ITST), pages 214 –219.
Shi, W., Hsien-Hsin, Falk, S. L. L., and Ghosh, M. (2006).
An integrated framework for dependable and reviv-
able architectures using multicore processors. In Proc.
of the 33rd International Symposium on Computer Ar-
chitecture (ISCA2006).
Shokurov, A. (2004). An approach to quantitative analy-
sis of resistance of equivalent transformations of alge-
braic circuits. Technical report, Institute for System
Programming Russian Academy of Sciences.
Simmendinger, C., Kraemer-Fuhrmann, O., and Raekow, Y.
(2008). Support for client-server based license man-
agement schemes in the grid. In Collaboration and the
Knowledge Economy: Issue, Application, Case Stud-
ies, pages 1262–1272.
Suh, G. E., Clarke, D., Gassend, B., van Dijk, M., and
Devadas, S. (2003). Aegis: Architecture for tamper-
evident and tamper-resistant processing. In Proc. the
17th annual international conference on Supercom-
puting, pages 160–171.
The BEinGRID Project (2009). BEinGRID, business exper-
iments in grid. the European Unionfs sixth research
Framework Programme (FP6).
The SmartLM Project (2013). SmartLM - grid-friendly
software licensing for location independent appli-
cation execution. the European Commission Pro-
gramme, Information and Communication Technolo-
gies.
Wang, C., Davidson, J., Hill, J., and Knight, J. (2001). Pro-
tection of software-based survivability mechanisms.
In Proc. of International Conference of Dependable
Systems and Networks (DSN2001), pages 193–202.
Zhang, X. and Gupta, R. (2003). Hiding program slices for
software security. In Proc. of the international sympo-
sium on Code generation and optimization: feedback-
directed and runtime optimization, pages 325–336.
Zhang, Y., Juels, A., Reiter, M. K., and Ristenpart, T.
(2012). Cross-vm side channels and their use to ex-
tract private keys. In Proc. of the 2012 ACM confer-
ence on Computer and communications security, CCS
’12, pages 305–316.
Zhao, J., Yao, N., and Cai, S. (2009). A new method to
protect software from cracking. In Proc. of World
Congress on Computer Science and Information En-
gineering (CSIE2009), pages 636–638.
Zhuang, X., Zhang, T., Lee, H.-H. S., and Pande, S. (2004).
Hardware assisted control flow obfuscation for em-
bedded processors. In Proc. of ACM CASES 2004,
pages 292–302.
LMM-ACommonComponentforSoftwareLicenseManagementonCloud
295