期刊文献+

基于可信计算的DRM互操作研究 被引量:5

Study on the Interoperability of DRM Based on Trusted Computing
下载PDF
导出
摘要 出于对自有数字内容产品的保护,不同的内容提供者采用不同的保护方法,同时也为消费者带来了数字内容使用上的不便。分析当前DRM在主流开放式操作系统中实现时存在的问题,指出可信计算(Trusted Computing,TC)环境下DRM互操作实现的可靠性,并给出一种基于可信计算的安全的互操作解决办法。 For the protection of their own digital contents, different content provider adopts various DRMs, which makes consumer discomfortable. By analyzing some flaws of the realization of DRM based on mainstream operating system today and indicating the reliability of the interoperability of DRM based on Trusted Computing, a secure architechture for the solution of interoperability based on Trusted Computing was proposed.
出处 《计算机科学》 CSCD 北大核心 2009年第1期77-80,共4页 Computer Science
基金 国家自然科学基金(60672117)资助
关键词 数字版权管理 互操作 可信计算 DRM模块 Digital rights management, Interoperability, Trusted computing, DRM module
  • 相关文献

参考文献9

  • 1iTunes FairPlay. http://www.apple.com/lu/support/itunes/authorization.html
  • 2Microsoft Windows Media Rights Manager. http : / / www. microsoft, com/windows/windowsmedia/howto/articles/drmarchitecture. aspx
  • 3Open Mobile Alliance. http://www.openmobilealliance.org/
  • 4俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 5Koenen R H, Lacy J, Mackey M, et al. The Long March to Interoperahle Digital Rights Management//Proceedings of the IEEE. 2004,92(6):883- 897
  • 6Reid J F, Caelli W J. DRM, Trusted Computing and Operating System Architecture. Australasian Information Security Workshop 2005 (AISW2005). Newcastle,Australia
  • 7Trusted Computing Group. TCG Specification Architecture Overview. Specification Revision 1.2. https://www.trustedcomputinggroup.org, April 2004
  • 8The Trusted Computing Group. TPM Main Part 1 Design Principles. February 2005
  • 9Taban G,Cardenas A A,Gligor V D. Towards a Secure and Interoperahle DRM Architecture//Proceedings of the ACM Digital Rights Management workshop DRM' 05. Alexandria, Virginia, USA, 2005 :69-78

二级参考文献64

  • 1俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 2Rosenblatt W.,Trippe W.,Mooney S.Digital Rights Management:Business and Technology.New York:M & T Books,2002
  • 3Garnett N.Digital rights management,copyright,and napster.ACM SIGecom Exchanges,2001,2(2):1~5
  • 4Davis R.The digital dilemma.Communications of the ACM,2001,44(2):77~83
  • 5Biddle P.,England P.,Peinado M.,Willman B.The darknet and the future of content distribution.In:Feigenbaum J.ed.Digital Rights Management,Lecture Notes in Computer Science 2696,Berlin:Springer-Verlag,2003,155 ~ 176
  • 6Sibert O.,Bernstein D.,Wie D.V.The DigiBox:A self-protecting container for information commerce.In:Proceedings of the 1st USENIX Workshop on Electronic Commerce,New York,1995,171~183
  • 7Konstantas D.,Morin J.H.Trading digital intangible goods:The rules of the game.In:Proceedings of the 33rd Hawaii International Conference on System Sciences,IEEE Computer Society,Maui,Hawaii,2000,3362~3371
  • 8Chong C.N.,Buuren R.,Hartel P.H.,Kleinhuis G.Security attributes based digital rights management.In:Boavida F.,Monteiro E.,Orvalho J.eds.Protocols and Systems for In teractive Distributed Multimedia,Lecture Notes in Compute Science 2515,Berlin:Springer-Verlag,2002,339~352
  • 9Yau J.C.K.,Hui L.C.K.etal.A digital rights managemen system for e-content.University of Hong Kong,Hong Kong HKU CSIS Technical Reports TR-2004-03,2004
  • 10Rump N.Definitions,aspects,and overview.In:Becker E.et al.eds.Digital Rights Management:Technological,Economic,Legal and Political Aspects,Lecture Notes in Computer Science 2770,Berlin:Springer-Verlag,2003,3~6

共引文献140

同被引文献37

  • 1俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 2张志勇,普杰信,黄涛.UCOND:Usage Control委托模型及关键技术研究[J].网络安全技术与应用,2006(6):42-44. 被引量:7
  • 3范科峰,莫玮,曹山,赵新华,裴庆祺.数字版权管理技术及应用研究进展[J].电子学报,2007,35(6):1139-1147. 被引量:64
  • 4Park J, Sandhu R. The UCONABC Usage Control Model[ J] .ACM Transactions on Information and System Secu-rity,2004, 7(1): 128-174.
  • 5Zhang Zhiyong, Yang Lin , Pei Qingqi, Ma Jianfeng . Research on Usage Control Model with Delegation Charac-teristics Based on OM-AM Methodology [C].2007 IFIP In-ternational Conference on Network and Parallel Computing, Dalian,China, Sep, 2007.
  • 6彭凌西,杨频,彭银桥,孙飞显,曾金全,刘才铭.使用控制访问模型的研究[J].计算机应用研究,2007,24(9):121-123. 被引量:3
  • 7Rosenblum D. What anyone can know: The privacy risks of so- cial networking sites [J]. IEEE Security and Privacy, 2007, 5 (3) :40-49.
  • 8Grawrock D. TCG Specification Architecture Overview Revision 1. 4 [EB/OL]. http//www. trustedcomputionggroup. org/ groups/TCG-1.4- Archiecture_Overview. pdf,2011-05-01.
  • 9Popescu B,Crisop B, Tanenbaum A, et al. A DRM security ar- chitecture for home networks[C] ff Proceedings of 4th ACM Workshop on Digital Rights Management. Oct. 2004.
  • 10Kim H, Lee Y, Chung B, et al. Digital Rights Management with right delegation for home networks[C]//Proceedings of 9th In- ternational Conference on Information Security and Cryptology. LNCS 4296,2006 : 233-245.

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部