期刊文献+

基于可信计算的文档主动防护模型

Active Defense Model for Document Protection Based on Trust-computing
下载PDF
导出
摘要 现有的文档保护技术大都是依赖于系统中特定的安全保护机制实施边界防御。电子文档作为静态客体,本身只能携带属性权限,而没有任何防护能力,难以同时满足"防外"和"防内"的双重需求。本文以可信计算为基础,借鉴主动存储的思想,将数据的使用隔离与数据存储绑定,提出了一种文档主动防护模型。通过构建从底层硬件到上层应用环境的信任链,确保数据以满足预期的方式被使用,授权用户可以正常使用文档,而不能将其泄露出保护区域。基于该主动模型在Windows系统平台下实现了一个主动安全U盘,可以广泛应用于数字版权保护以及企业和个人敏感数据保护。 The existing document protection technologies were implemented depending on specific mechanisms on the boundary. As static objects, electronic documents could only have data content and attributes without any active protection capability on themselves. It is insufficient to defense threats from both outsider and insider in the open network environment. This paper proposed an active defense model for document protection based on trust-computing which band special isolation mechanism to data storage. The trust chain from hardware to usage environment in operation system confines even authorized users to access the document in expected manners. A kind of active USB disk device is designed and implemented based on the model, which is effective for DRM as well as sensitive data protection for enterprises and personals.
出处 《信息安全与技术》 2010年第6期39-44,共6页
基金 国家自然科学基金青年基金项目[60903204]
关键词 数据安全 主动防护 可信计算 隔离环境 信任链 访问控制 数字版权保护 data security active defense trust-computing isolation environment trust chain access control Digital Rights Management (DRM)
  • 相关文献

参考文献2

二级参考文献64

  • 1俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 2Rosenblatt W.,Trippe W.,Mooney S.Digital Rights Management:Business and Technology.New York:M & T Books,2002
  • 3Garnett N.Digital rights management,copyright,and napster.ACM SIGecom Exchanges,2001,2(2):1~5
  • 4Davis R.The digital dilemma.Communications of the ACM,2001,44(2):77~83
  • 5Biddle P.,England P.,Peinado M.,Willman B.The darknet and the future of content distribution.In:Feigenbaum J.ed.Digital Rights Management,Lecture Notes in Computer Science 2696,Berlin:Springer-Verlag,2003,155 ~ 176
  • 6Sibert O.,Bernstein D.,Wie D.V.The DigiBox:A self-protecting container for information commerce.In:Proceedings of the 1st USENIX Workshop on Electronic Commerce,New York,1995,171~183
  • 7Konstantas D.,Morin J.H.Trading digital intangible goods:The rules of the game.In:Proceedings of the 33rd Hawaii International Conference on System Sciences,IEEE Computer Society,Maui,Hawaii,2000,3362~3371
  • 8Chong C.N.,Buuren R.,Hartel P.H.,Kleinhuis G.Security attributes based digital rights management.In:Boavida F.,Monteiro E.,Orvalho J.eds.Protocols and Systems for In teractive Distributed Multimedia,Lecture Notes in Compute Science 2515,Berlin:Springer-Verlag,2002,339~352
  • 9Yau J.C.K.,Hui L.C.K.etal.A digital rights managemen system for e-content.University of Hong Kong,Hong Kong HKU CSIS Technical Reports TR-2004-03,2004
  • 10Rump N.Definitions,aspects,and overview.In:Becker E.et al.eds.Digital Rights Management:Technological,Economic,Legal and Political Aspects,Lecture Notes in Computer Science 2770,Berlin:Springer-Verlag,2003,3~6

共引文献141

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部