期刊文献+

使用控制模型在DRM中的应用 被引量:6

Application of Usage Control Model in DRM
下载PDF
导出
摘要 使用控制模型是最近才提出的新型访问控制模型,它系统全面地定义了现代访问控制模型的框架。本文在对使用控制模型介绍和分析的基础上,将其应用到DRM中实现了其策略,并给出了两个具体的应用实例。 Usage control model is a new access control model proposed nearly, it defines the framework of modern access control mod-el systematically and semantically.In this paper the usage control model is introduced and analyzed at first,then used to implements the DRM policy,and finally two application examples are proposed.
出处 《微计算机信息》 北大核心 2007年第3期74-75,126,共3页 Control & Automation
基金 "十五"国防预研项目(编号不公开)
关键词 使用控制模型 数字版权管理 授权 Usage Control Model,Digital Rights Management,Authorization
  • 相关文献

参考文献5

  • 1[2]Jaehong Park,Ravi Sandhu.Towards Usage Control Models:Beyond Traditional Access Control[A].SACMAT'02[C].Monterey,Califomia,USA:ACM,2002.57-64.
  • 2[3]Jaehong Park,Ravi Sandhu.The UCONABC Usage Control Model[J].ACM Transactions on Information and System Security (TISSEC),2004,(10):1-47.
  • 3彭凌西,陈月峰,彭银桥.新型的使用访问控制模型[J].信息技术,2005,29(6):27-29. 被引量:3
  • 4俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 5[6]Ravi Sandhu,Jaehong Park.Usage Control:A Vision for Next Generation Access Control[A].MMM-ACNS'03[C].Petersburg,Russia:Springer,2003.17-31.

二级参考文献72

  • 1俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 2Rosenblatt W.,Trippe W.,Mooney S.Digital Rights Management:Business and Technology.New York:M & T Books,2002
  • 3Garnett N.Digital rights management,copyright,and napster.ACM SIGecom Exchanges,2001,2(2):1~5
  • 4Davis R.The digital dilemma.Communications of the ACM,2001,44(2):77~83
  • 5Biddle P.,England P.,Peinado M.,Willman B.The darknet and the future of content distribution.In:Feigenbaum J.ed.Digital Rights Management,Lecture Notes in Computer Science 2696,Berlin:Springer-Verlag,2003,155 ~ 176
  • 6Sibert O.,Bernstein D.,Wie D.V.The DigiBox:A self-protecting container for information commerce.In:Proceedings of the 1st USENIX Workshop on Electronic Commerce,New York,1995,171~183
  • 7Konstantas D.,Morin J.H.Trading digital intangible goods:The rules of the game.In:Proceedings of the 33rd Hawaii International Conference on System Sciences,IEEE Computer Society,Maui,Hawaii,2000,3362~3371
  • 8Chong C.N.,Buuren R.,Hartel P.H.,Kleinhuis G.Security attributes based digital rights management.In:Boavida F.,Monteiro E.,Orvalho J.eds.Protocols and Systems for In teractive Distributed Multimedia,Lecture Notes in Compute Science 2515,Berlin:Springer-Verlag,2002,339~352
  • 9Yau J.C.K.,Hui L.C.K.etal.A digital rights managemen system for e-content.University of Hong Kong,Hong Kong HKU CSIS Technical Reports TR-2004-03,2004
  • 10Rump N.Definitions,aspects,and overview.In:Becker E.et al.eds.Digital Rights Management:Technological,Economic,Legal and Political Aspects,Lecture Notes in Computer Science 2770,Berlin:Springer-Verlag,2003,3~6

共引文献142

同被引文献34

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部