Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(104.49KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy Prevention
Vineet Kumar Sharma, S.A.M. Rizvi, S. Zeeshan Hussain, Vignesh
Pages - 550 - 558     |    Revised - 30-12-2009     |    Published - 31-01-2010
Volume - 3   Issue - 6    |    Publication Date - January 2010  Table of Contents
MORE INFORMATION
KEYWORDS
End User License Agreements, User Datagram Protocol, Distributed software and License key management
ABSTRACT
Today the software technologies have evolved it to the extent that now a customer can have free and open source software available in the market. But with this evolution the menace of software piracy has also evolved. Unlike other things a customer purchases, the software applications and fonts bought don't belong to the specified user. Instead, the customer becomes a licensed user — means the customer purchases the right to use the software on a single computer, and can't put copies on other machines or pass that software along to colleagues. Software piracy is the illegal distribution and/or reproduction of software applications for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. The major reasons of piracy include the high cost of software and the rigid licensing structure which is becoming even less popular due to inefficient software utilization. Various software companies are inclined towards the research of techniques to handle this problem of piracy. Many defense mechanisms have been devised till date but the hobbyists or the black market leaders (so called “software pirates”) have always found a way out of it. This paper identifies the types of piracies and licensing mechanisms along with the flaws in the existing defense mechanisms and examines social and technical challenges associated with handling software piracy prevention. The goal of this paper is to design, implement and empirically evaluate a comprehensive framework for software piracy prevention and optimal utilization of the software.
CITED BY (1)  
1 Garbervetsky, D., & Kim, S. (2013). Report from 2nd international workshop on developing tools as plug-ins (TOPI 2012). ACM SIGSOFT Software Engineering Notes, 38(1), 49-51.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Libsearch 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 WorldCat 
13 SlideShare 
14 PDFCAST 
15 PdfSR 
16 National Science Digital Library (NSDL) 
1 C. Collberg and C. Thomborson. Software watermarking: Models and dynamic embeddings. In Principles of Programming Languages, pages 311–324, 1999.
2 Mukesh Singhal & Niranjan G. Shivratri. Voting and Election Algorithms. In Advanced concept in operating Systems pages 209 & 343, 2002
3 George Coulouris, Jean Dollimore & Tim Kindberg. Election Algorithm, Bully Algo & Ring based algo. In Distributed Systems page 445-448, 2006
4 Leili Noorian & Mark Perry. Autonomic Software License Management System: an implementation of licensing patterns. 2009 Fifth International Conference on Autonomic and Autonomous Systems. IEEE 978-0-7695-3584-5/09
5 Mathias Dalheimer and Franz-Josef Pfreundt. License Management for Grid and Cloud Computing Environments. 9th IEEE/ACM International Symposium on Cluster Computing and the Grid. IEEE 978-0- 7695-3622-4/09
6 Mikhail J. Atallah, Jiangtao Li. Enhanced Smart-card based License Management. IEEE International Conference on E-Commerce (CEC’03)0-7695-1969-5/03 2003 IEEE
7 Yawei Zhang, Lei Jin, Xiaojun Ye Dongqing Chen.Software Piracy Prevention: Splitting on Client. 2008 International Conference on Security Technology IEEE 978-0-7695-3486-2/08
8 Daniel Ferrante. Software Licensing Models:What’s Out There? 1520-9202/06/ © 2006 IEEE
9 Dinesh R. Bettadapur.Software Licensing Models in the EDA Industry 0-7803-4425-1/98/$10.00 1998 IEEE
10 Sathiamoorthy Manoharan and Jesse Wu. Software Licensing: A Classification and Case Study. Proceedings of the First International Conference on the Digital Society (ICDS'07) 0-7695-2760-4/07 $20.00 © 2007 IEEE
11 Zhengxiong Hou, Xingshe Zhou, Yunlan Wang Software License Management Optimization in the Campus Computational Grid Environment. Third International Conference on Semantics, Knowledge and Grid 0-7695-3007-9/07 © 2007 IEEE
12 Petar Djekic & Claudia Loebbecke Software Piracy Prevention through Digital Rights Management Systems Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC’05) 1530-1354/05 $20.00 © 2005 IEEE
Associate Professor Vineet Kumar Sharma
KIET - India
vineet_sharma@kiet.edu
Dr. S.A.M. Rizvi
Jamia Millia Islamia, Central University, New Delhi - India
Dr. S. Zeeshan Hussain
Jamia Millia Islamia, Central University, New Delhi - India
Professor Vignesh
- India