Architecture of the License Software Manager using Blockchain technology

dc.citation.epage332
dc.citation.issue2
dc.citation.journalTitleМатематичне моделювання та комп'ютинг
dc.citation.spage326
dc.contributor.affiliationНаціональний університет “Львівська політехніка”
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorЛюбінський, Б. Б.
dc.contributor.authorДемедюк, М. С.
dc.contributor.authorТопилко, П. І.
dc.contributor.authorLiubinskyi, B. B.
dc.contributor.authorDemediuk, M. S.
dc.contributor.authorTopylko, P. I.
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2025-03-04T11:14:21Z
dc.date.created2022-02-28
dc.date.issued2022-02-28
dc.description.abstractУ роботі розглянуто технологію блокчейн та можливість її застосування для запобігання піратства програмного забезпечення. Побудовано підхід, який базується на використанні технології блокчейн. Розроблено архітектуру менеджера ліцензій програмного забезпечення з використанням технології блокчейн. Код програмного забезпечення доступний за адресою: https://github.com/maksym-demediuk-clicense/clicense.
dc.description.abstractThe paper considers Blockchain technology and the possibility of its use to prevent software piracy. There is proposed an approach using Blockchain technology. An architecture of the License Software Manager has been developed using Blockchain technology. The software code is available at https://github.com/maksym-demediuk-clicense/clicense.
dc.format.extent326-332
dc.format.pages7
dc.identifier.citationLiubinskyi B. B. Architecture of the License Software Manager using Blockchain technology / B. B. Liubinskyi, M. S. Demediuk, P. I. Topylko // Mathematical Modeling and Computing. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 9. — No 2. — P. 326–332.
dc.identifier.citationenLiubinskyi B. B. Architecture of the License Software Manager using Blockchain technology / B. B. Liubinskyi, M. S. Demediuk, P. I. Topylko // Mathematical Modeling and Computing. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 9. — No 2. — P. 326–332.
dc.identifier.doidoi.org/10.23939/mmc2022.02.326
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/63433
dc.language.isoen
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofМатематичне моделювання та комп'ютинг, 2 (9), 2022
dc.relation.ispartofMathematical Modeling and Computing, 2 (9), 2022
dc.relation.references[1] Maude T., Maude D. Hardware protection against software piracy. Communications of the ACM. 27 (9), 950–959 (1984).
dc.relation.references[2] Mooers C. N. Preventing Software Piracy. Computer. 10 (3), 29–30 (1977).
dc.relation.references[3] Suhler P. A., Bagherzadeh N., Malek M., Iscoe N. Software Authorization Systems. IEEE Software. 3 (5), 34–41 (1986).
dc.relation.references[4] Im J. H., van Epps P. D. Software piracy and software security measures in business schools. Information & Management. 23 (4), 193–203 (1992).
dc.relation.references[5] Taylor G. S., Shim J. P. A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives. Human Relations. 46 (14), 419–433 (1993).
dc.relation.references[6] Conner K. R. Software piracy: An analysis of protection strategies. Management Science. 37 (2), 125–139 (1991).
dc.relation.references[7] Katz M. L. Systems competition and network effects. Journal of Economic Perspectives. 8 (2), 93–115 (1994).
dc.relation.references[8] Shy O., Thisse J. F. A strategic approach to software protection. Journal of Economics & Management Strategy. 8 (2), 163–190 (1999).
dc.relation.references[9] Darmon E., Rufini A., Torre D. Back to software “profitable piracy”: The role of information diffusion. Economics Bulletin. 29 (2), 543–553 (2009).
dc.relation.references[10] Business Software Alliance. The Compliance Gap; Technical Report; Business Software Alliance: Washington, DC, USA (2014).
dc.relation.references[11] Traphagan M., Griffith A. Software Piracy and Global Competitiveness: Report on Global Software Piracy. International Review of Law, Computers & Technology. 12 (3), 431–451 (1998).
dc.relation.references[12] Andr´es A. R., Goel R. K. Does software piracy affect economic growth? Evidence across countries. Journal of Policy Modeling. 34 (2), 284–295 (2012).
dc.relation.references[13] Business Software Alliance. https://www.bsa.org/files/2019-02/2018_BSA_GSS_Report_en_.pdf.
dc.relation.references[14] Herbert J. Solving a global software piracy problem (2017). https://openrepository.aut.ac.nz/bitstream/handle/10292/11021/HerbertJ.pdf.
dc.relation.references[15] Peyravian M., Roginsky A., Zunic N. Methods for preventing unauthorized software distribution. Computers & Security. 22 (4), 316–321 (2003).
dc.relation.references[16] Morgan M. J., Ruskell D. J. Software Piracy — The Problems. Industrial Management & Data Systems. 87 (3/4), 8–12 (1987).
dc.relation.references[17] Sachan A., Emmanuel S., Kankanhalli M. Efficient license validation in MPML DRM architecture. DRM ’09: Proceedings of the nineth ACM workshop on Digital rights management. 73–82 (2009).
dc.relation.references[18] Liu Z., Roychoudhury A. Relating software validation to technology trends. International Journal on Software Tools for Technology Transfer. 14, 631–638 (2012).
dc.relation.references[19] Herbert J., Litchfield A. A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology. Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015). 27–30 (2015)
dc.relation.references[20] Sigi G. Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups. Information Management & Computer Security. 18 (4), 204–225 (2010).
dc.relation.references[21] Han K., Shon T. Software authority transition through multiple distributors. The Scientific World Journal. 2014, 295789 (2014).
dc.relation.references[22] Android marketplace hit by malware. Computer Fraud & Security. 2011 (3), 3 (2011).
dc.relation.references[23] BBC Technology Desk. http://www.bbc.com/news/technology-34338362.
dc.relation.references[24] Davies C. Virus Scanner – or Malware? Beware App Store Fakes. https://www.cnet.com/news/privacy/virus-scanners-filled-with-malware-are-flooding-app-stores/.
dc.relation.references[25] Trade Finance Global – Overview of Blockchain. https://www.tradefinanceglobal.com/blockchain/history-of-blockchain/.
dc.relation.references[26] Nomura Research Institute. Survey on Blockchain Technologies and Related Services. FY2015 Report. 1–78, (2016).
dc.relation.references[27] Leibowitz J. Bitcoin: A 21st Century Currency Explained By a Wall Street Veteran. Coindesk (2016).
dc.relation.referencesen[1] Maude T., Maude D. Hardware protection against software piracy. Communications of the ACM. 27 (9), 950–959 (1984).
dc.relation.referencesen[2] Mooers C. N. Preventing Software Piracy. Computer. 10 (3), 29–30 (1977).
dc.relation.referencesen[3] Suhler P. A., Bagherzadeh N., Malek M., Iscoe N. Software Authorization Systems. IEEE Software. 3 (5), 34–41 (1986).
dc.relation.referencesen[4] Im J. H., van Epps P. D. Software piracy and software security measures in business schools. Information & Management. 23 (4), 193–203 (1992).
dc.relation.referencesen[5] Taylor G. S., Shim J. P. A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives. Human Relations. 46 (14), 419–433 (1993).
dc.relation.referencesen[6] Conner K. R. Software piracy: An analysis of protection strategies. Management Science. 37 (2), 125–139 (1991).
dc.relation.referencesen[7] Katz M. L. Systems competition and network effects. Journal of Economic Perspectives. 8 (2), 93–115 (1994).
dc.relation.referencesen[8] Shy O., Thisse J. F. A strategic approach to software protection. Journal of Economics & Management Strategy. 8 (2), 163–190 (1999).
dc.relation.referencesen[9] Darmon E., Rufini A., Torre D. Back to software "profitable piracy": The role of information diffusion. Economics Bulletin. 29 (2), 543–553 (2009).
dc.relation.referencesen[10] Business Software Alliance. The Compliance Gap; Technical Report; Business Software Alliance: Washington, DC, USA (2014).
dc.relation.referencesen[11] Traphagan M., Griffith A. Software Piracy and Global Competitiveness: Report on Global Software Piracy. International Review of Law, Computers & Technology. 12 (3), 431–451 (1998).
dc.relation.referencesen[12] Andr´es A. R., Goel R. K. Does software piracy affect economic growth? Evidence across countries. Journal of Policy Modeling. 34 (2), 284–295 (2012).
dc.relation.referencesen[13] Business Software Alliance. https://www.bsa.org/files/2019-02/2018_BSA_GSS_Report_en_.pdf.
dc.relation.referencesen[14] Herbert J. Solving a global software piracy problem (2017). https://openrepository.aut.ac.nz/bitstream/handle/10292/11021/HerbertJ.pdf.
dc.relation.referencesen[15] Peyravian M., Roginsky A., Zunic N. Methods for preventing unauthorized software distribution. Computers & Security. 22 (4), 316–321 (2003).
dc.relation.referencesen[16] Morgan M. J., Ruskell D. J. Software Piracy - The Problems. Industrial Management & Data Systems. 87 (3/4), 8–12 (1987).
dc.relation.referencesen[17] Sachan A., Emmanuel S., Kankanhalli M. Efficient license validation in MPML DRM architecture. DRM ’09: Proceedings of the nineth ACM workshop on Digital rights management. 73–82 (2009).
dc.relation.referencesen[18] Liu Z., Roychoudhury A. Relating software validation to technology trends. International Journal on Software Tools for Technology Transfer. 14, 631–638 (2012).
dc.relation.referencesen[19] Herbert J., Litchfield A. A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology. Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015). 27–30 (2015)
dc.relation.referencesen[20] Sigi G. Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups. Information Management & Computer Security. 18 (4), 204–225 (2010).
dc.relation.referencesen[21] Han K., Shon T. Software authority transition through multiple distributors. The Scientific World Journal. 2014, 295789 (2014).
dc.relation.referencesen[22] Android marketplace hit by malware. Computer Fraud & Security. 2011 (3), 3 (2011).
dc.relation.referencesen[23] BBC Technology Desk. http://www.bbc.com/news/technology-34338362.
dc.relation.referencesen[24] Davies C. Virus Scanner – or Malware? Beware App Store Fakes. https://www.cnet.com/news/privacy/virus-scanners-filled-with-malware-are-flooding-app-stores/.
dc.relation.referencesen[25] Trade Finance Global – Overview of Blockchain. https://www.tradefinanceglobal.com/blockchain/history-of-blockchain/.
dc.relation.referencesen[26] Nomura Research Institute. Survey on Blockchain Technologies and Related Services. FY2015 Report. 1–78, (2016).
dc.relation.referencesen[27] Leibowitz J. Bitcoin: A 21st Century Currency Explained By a Wall Street Veteran. Coindesk (2016).
dc.relation.urihttps://www.bsa.org/files/2019-02/2018_BSA_GSS_Report_en_.pdf
dc.relation.urihttps://openrepository.aut.ac.nz/bitstream/handle/10292/11021/HerbertJ.pdf
dc.relation.urihttp://www.bbc.com/news/technology-34338362
dc.relation.urihttps://www.cnet.com/news/privacy/virus-scanners-filled-with-malware-are-flooding-app-stores/
dc.relation.urihttps://www.tradefinanceglobal.com/blockchain/history-of-blockchain/
dc.rights.holder© Національний університет “Львівська політехніка”, 2022
dc.subjectблокчейн
dc.subjectліцензія на програмний продукт
dc.subjectпіратство програмного продукту
dc.subjectblockchain
dc.subjectsoftware product license
dc.subjectsoftware product piracy
dc.titleArchitecture of the License Software Manager using Blockchain technology
dc.title.alternativeАрхітектура менеджера ліцензій програмного забезпечення з використанням технології блокчейн
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
2022v9n2_Liubinskyi_B_B-Architecture_of_the_326-332.pdf
Size:
628.66 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
2022v9n2_Liubinskyi_B_B-Architecture_of_the_326-332__COVER.png
Size:
439.38 KB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.85 KB
Format:
Plain Text
Description: