期刊文献+

基于可信计算平台的DRM应用研究 被引量:1

Research of DRM Application Based on Trusted Computing Platform
下载PDF
导出
摘要 数字版权保护技术DRM已经成为数字网络环境下数字内容交易和传播的重要技术,用于保护数字内容的版权,控制数字内容的使用和传播。可信计算技术是确保终端系统安全与可信的技术。将可信计算平台引入DRM应用系统,提出了基于可信计算平台的DRM应用框架,讨论了可信任环境的建立,并描述了基于可信计算平台的DRM系统中数字内容的分发及策略的执行。 Digital rights management is becoming a key enabling technology to protect intellectual property of digital contents, control their dissemination and usage. Trusted Computing Technique guarantees the security and Trustworthiness of terminals. Introducing Trusted Computing Platform into DRM, We proposed architecture of DRM application based on Trusted Computing Platform, discussed the trusted enviranment's establishment, and described the dissemination of digital content and enforcement of policies based on the proposed application architecture.
作者 刘曼华 鲁柯
出处 《微计算机信息》 2010年第6期232-234,共3页 Control & Automation
关键词 数字版权保护 可信计算平台 引用监视器 digital rights management trust computing platform reference monitor
  • 相关文献

参考文献5

  • 1Hauser, T. and Wenz, C. (2003): DRM Under Attack: Weaknesses in Existing Systems. LNCS 2770, Springer, pp 206-223.
  • 2Ravi Sandhu, Xinwen Zhang, Kumar Ranganathan. Client-side access control enforcement using trusted computing and PEI models.Jotlrnal of High Speed Networks,Special issue on Managing Security Polices: Modeling,Verification and Configuration,2006, 15(3).
  • 3Erickson J.S. Fair use, DRM and trusted computing [J]. Communications of the ACM, 2003, 46(4):34-39.
  • 4俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 5耿延军,张红旗,周靖.基于可信计算的网格行为信任模型研究[J].微计算机信息,2007(24):61-62. 被引量:4

二级参考文献69

  • 1史创明,王立新.数字签名及PKI技术原理与应用[J].微计算机信息,2005,21(06X):122-124. 被引量:32
  • 2俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 3Rosenblatt W.,Trippe W.,Mooney S.Digital Rights Management:Business and Technology.New York:M & T Books,2002
  • 4Garnett N.Digital rights management,copyright,and napster.ACM SIGecom Exchanges,2001,2(2):1~5
  • 5Davis R.The digital dilemma.Communications of the ACM,2001,44(2):77~83
  • 6Biddle P.,England P.,Peinado M.,Willman B.The darknet and the future of content distribution.In:Feigenbaum J.ed.Digital Rights Management,Lecture Notes in Computer Science 2696,Berlin:Springer-Verlag,2003,155 ~ 176
  • 7Sibert O.,Bernstein D.,Wie D.V.The DigiBox:A self-protecting container for information commerce.In:Proceedings of the 1st USENIX Workshop on Electronic Commerce,New York,1995,171~183
  • 8Konstantas D.,Morin J.H.Trading digital intangible goods:The rules of the game.In:Proceedings of the 33rd Hawaii International Conference on System Sciences,IEEE Computer Society,Maui,Hawaii,2000,3362~3371
  • 9Chong C.N.,Buuren R.,Hartel P.H.,Kleinhuis G.Security attributes based digital rights management.In:Boavida F.,Monteiro E.,Orvalho J.eds.Protocols and Systems for In teractive Distributed Multimedia,Lecture Notes in Compute Science 2515,Berlin:Springer-Verlag,2002,339~352
  • 10Yau J.C.K.,Hui L.C.K.etal.A digital rights managemen system for e-content.University of Hong Kong,Hong Kong HKU CSIS Technical Reports TR-2004-03,2004

共引文献143

同被引文献11

引证文献1

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部