期刊文献+

一种用于数字权限管理安全审计的日志描述模型

A Log Descriptive Model for Digital Rights Management Security Audit
下载PDF
导出
摘要 数字权限管理安全审计日志记录的内容由数字权限管理安全审计日志描述模型给出。通过对已有数字权限管理事件模型的分析,提出了“基于原因-背景-影响的数字权限管理安全审计日志描述模型”;这个模型从数字权限管理安全审计日志角度描述了数字权限管理事件。 The digital rights management security audit log descriptive model presents what will be recorded by digital rights management security audit log. This paper puts forward“Cause-Context-Result ( Cause-Context-Result, CCR) based digital rights management security audit log descriptive model”; this model depicts digital rights management events from the point of digital rights management security audit.
出处 《计算机应用研究》 CSCD 北大核心 2006年第1期125-128,共4页 Application Research of Computers
关键词 数字权限管理 事件 描述 模型 安全审计 日志 Digital Rights Management(DRM) Events Descriptive Models Security Audit Log
  • 相关文献

参考文献17

  • 1Zheng Yan. Mobile Digital Rights Management[EB/OL]. http://www.tml. hut.fi/Studies/T-110.501/2001/papers/zheng.yan.pdf,2004.
  • 2Commission of the European Communities. Digital Rights Background, Systems, Assessment [EB/OL]. http://europa.eu.int/comro/commissioners/liikanen/profile/interest/digitalrights.pdf,2004.
  • 3Susan Wegner, T-Systems GmbH. Overview of State-of-the Art DRM Systems and Standardisation Activities [EB/OL]. http://www.eurescom.de/public/projectresuhs/P1200-series/P1207-TI.asp, 2004.
  • 4Cheun Ngen Chong, Ricardo Corin, Yee Wei Law. LicenseScript:State of the Art [EB/OL]. http://doc.telin.nl/dscgi/ds.py/Get/File-29469/soa.pdf, 2004.
  • 5Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn. Attacks on Copyrigt Marking Systems[C]. Portland, Oregon, USA, David Aucsmith, the 2nd Workshop on Information Hiding, 1998. 218-238.
  • 6S Voloshynovskiy, S Pereira, T Pun, et al. Attacks on Digital Watermarks: Classification, Estimation-based Attacks, and Benchmarks[J]. IEEE Communications Magazine, 2001, 39(8):118-126.
  • 7Cheun Ngen Chong, Sandro Etalle, Pieter H Hartel. Comparing Logic-based and XML-based Rights Expression Languages[J]. Lecture Notes in Computer Science 2889, Springer, 2003,779-792.
  • 8C N Chong, R van Buuren, P H Hartel, et al. Security Attribute Based Digital Rights Management[EB/OL]. http://www.home.cs.utwente.nl/-summer/publications/Security Attribute based Digital Rights Management.pdf, 2004.
  • 9Jaime Delgado, Isabel Gallego, Roberto Garcia, et al. DMAG Contribution to RDD-REL: IPRonto [EB/OL]. http://dmag.upf.es/ontologies/ipronto/m7675.pdf, 2004.
  • 10Chris Barlas, Godfrey Rust. Information Technology: Multimedia Framework (MPEG-21) Part 6: Rights Data Dictionary [EB/OL]. http://xml.coverpages.org/mpegRights.html, 2004.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部