期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Study on Transfer Problem of Contract and Management Right of Agricultural Land in Anhui Province 被引量:1
1
作者 Jingliang LIU Zhongxiang YU 《Asian Agricultural Research》 2017年第3期48-51,共4页
The status quo and significance of contract and management right transfer of rural land are analyzed,and major problems existed in contract and management right transfer of rural land in Anhui Province are studied,con... The status quo and significance of contract and management right transfer of rural land are analyzed,and major problems existed in contract and management right transfer of rural land in Anhui Province are studied,containing unsound transfer market,insufficient flow demand motion,single transfer form,non-standard register,right determination and certificate issuing. On this basis,several policies and suggestions are proposed,such as combining practical use with suitable use of land right determination and certificate issuing,establishing multilayer rural social security system and expanding land management range. 展开更多
关键词 Rural land Contract and management right TRANSFER Anhui Province
下载PDF
The Transfer of Land Contractual Management Rights in Ethnic Village--A Case Study of Ya'ergou Village in the Ningxia Hui Autonomous Region
2
作者 WANG Hai-hong YANG Yue-ju 《Asian Agricultural Research》 2012年第4期44-49,共6页
Based on field survey in Ya'ergou Village,Yuanzhou District,Guyuan City,the Ningxia Hui Autonomous Region,we analyze the status quo of the transfer of land contractual management rights in this village,and study t... Based on field survey in Ya'ergou Village,Yuanzhou District,Guyuan City,the Ningxia Hui Autonomous Region,we analyze the status quo of the transfer of land contractual management rights in this village,and study the basic information,form,characteristics,and problems concerning the transfer of land contractual management rights in this nationality village.Then corresponding countermeasures are put forward for promoting the transfer of land contractual management rights in ethnic village as follows:strengthening the publicity of the policy in order to improve farmers' ideological understanding;raising the rent in order to promote the transfer of the land contractual management rights;diverting the governmental investment to the talented people within village;consolidating management and resolving disputes in the transfer timely and effectively. 展开更多
关键词 The land contractual management rights Nationality village TRANSFER
下载PDF
NEW REGULATIONS ON IMPORT AND EXPORT MANAGEMENT RIGHTS GRANTED TO COMMERCIAL AND MATERIAL SUPPLY ENTERPRISES
3
作者 Yang Yasha 《大经贸》 北大核心 1997年第6期95-95,共1页
With the approval of the State Council, State Economicand Trade Commission, Ministry of Foreign Trade and EconomicCooperation and Ministry of Internal Trade recently issued theCircular Regarding Some Relevant Issues i... With the approval of the State Council, State Economicand Trade Commission, Ministry of Foreign Trade and EconomicCooperation and Ministry of Internal Trade recently issued theCircular Regarding Some Relevant Issues in Granting Import andExport Management Rights to Commercial and Material SupplyEnterprises. It means that work ofgranting import and exportmanagement rights has from a trial been led onto the right path ofexamination and approval. The principle of examination and ap-proval, conditions, and the procedure of reporting to a higher in-stitution shall still be in conformity with the relevant regulationsprescribed in Decree No.76 (1993) of the State Council.In November 1993, the State Council approved and trans-mitted Opinions on Experiment of Granting Import and ExportManagement Rights to Some Commercial and Material Enterprisesby State Economic and Trade Commision, Ministry of ForeignTrade and Economic Cooperation and Ministry of Internal Trade.Totaling 206 commercial (including grain and supply and sale)and material supply enterprises are put to trial and granted 展开更多
关键词 OVER NEW REGULATIONS ON IMPORT AND EXPORT management rightS GRANTED TO COMMERCIAL AND MATERIAL SUPPLY ENTERPRISES
下载PDF
Contract System for Circulation of the Right to Rural Land Contractual Management
4
作者 CAO Wu-kun WU De-en 《Asian Agricultural Research》 2010年第8期53-57,共5页
From the perspective of civil subject theory,law of value,comparative law and history of laws,the thesis expounds that the contract on the transfer of the contractual right of rural lands is in nature a civil contract... From the perspective of civil subject theory,law of value,comparative law and history of laws,the thesis expounds that the contract on the transfer of the contractual right of rural lands is in nature a civil contract instead of an administrative one.Then it explores the defects in the contract from the viewpoint of legal value goal,contract law and legal sociology,that is,the relevant provisions in Rural Land Contract Law and Explanations of Supreme People's Court about the Issues concerning the Laws Applicable to the Trial of Cases of Disputes over Rural Land Contracting go against the principle of free contracting and run counter to the legal value goal of justice,so they do not achieve good implementing effect.Finally,the thesis demonstrates and makes some practical legislative proposals to perfect the contract system for circulation of the right to operate constructed rural lands,aiming at improving the circulation rate through perfecting the contract of the right to rural land contractual management,solving the disputes in rural lands circulation and safeguarding the legitimate rights of the farmers. 展开更多
关键词 Rural lands Contractual management right Circulation means Contract system China
下载PDF
Home Network and Digital Rights Management Technology 被引量:2
5
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home Network and Digital rights management Technology ZTE ISDB ATSC
下载PDF
A Digital Right Management Model for Distribution of Digital Audiovisual Content
6
作者 FAN Kefeng PEI Qingqi +2 位作者 WANG Meihua MO Wei CAO Ling 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1877-1881,共5页
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, ... This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption registration for content fair distribution, of the model are all provided. The scheme also provides distribution and evidence for using the copyright of digital content fairly and effectively. Finally, analysis shows the proposed model has both high security and good performance. 展开更多
关键词 digital rights management content distribution authentication mechanism MODEL
下载PDF
Digital Rights Management for a Chinese XML Text Centre
7
作者 Wai -man Wong(The Open University of Hong Kong Library,Hong Kong,China) 《现代图书情报技术》 CSSCI 北大核心 2002年第S1期172-177,共6页
The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased direc... The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased directly from the market,and about,1,000 locallyproduced electronic titles.The locally produced titles are notavailable in the market but require local digitization andnegotiation with publishers with regard to the right to use(RTU)them so as to meet the learning needs of the OUHKcommunity.Nearl... 展开更多
关键词 TEXT Digital rights management for a Chinese XML Text Centre XML
下载PDF
Prison Management Works Hard to Bring Human Rights under Good Protection
8
作者 CHEN CHUN’AN 《The Journal of Human Rights》 2009年第4期8-10,共3页
EDITOR'S NOTE: Human rights protection in prisons is an important part of China's National Human Rights Action Plan and the human rights conditions in prisons constitute an important hallmark of the human rights pr... EDITOR'S NOTE: Human rights protection in prisons is an important part of China's National Human Rights Action Plan and the human rights conditions in prisons constitute an important hallmark of the human rights protection level of the country. In order to get to know more about human rights protection in this special area, this reporter paid a visit to the No. 4 Prison in Henan Province, central China. 展开更多
关键词 In Prison management Works Hard to Bring Human rights under Good Protection
下载PDF
A DRM System Based on Mobile Agent for Digital Rights Redistribution
9
作者 LI Ping LU Zhengding ZOU Fuhao LING Hefei 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期475-480,共6页
We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent ... We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given. 展开更多
关键词 digital rights management public key infrastructure certificate authority mobile agent rights redistribution
下载PDF
REAL-TIME LICENSING MANAGEMENT OF SECURE MULTIMEDIA CONTENT DELIVE RY
10
作者 马兆丰 冯博琴 《Journal of Pharmaceutical Analysis》 SCIE CAS 2004年第2期110-113,118,共5页
Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violat... Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violated w ay is one of most important issues to take into account. In this paper, a novel and efficient authorization and authentication Digital Rights Management (DRM) s chema is proposed firstly for secure multimedia delivery, then based on the sche ma, a real-time digital signature algorithm built on Elliptic Curve Cryptograph y (ECC) is adopted for fast authentication and verification of licensing managem ent, thus secure multimedia delivery via TCP/RTP can efficiently work with real -time transaction response and high Quality of Service (QoS) . Performance eval uations manifest the proposed schema is secure, available for real-time media s tream authentication and authorization without much effected of QoS. The propose d schema is not only available for Client/Server media service but can be easily extended to P2P and broadcasting network for trusted rights management. 展开更多
关键词 digital rights management multimedia delivery real-time licensing management elliptic curve cryptography
下载PDF
农村土地流转存在问题与行动策略 被引量:4
11
作者 金红利 《沈阳农业大学学报(社会科学版)》 2017年第2期134-138,共5页
当下中国农村土地流转工作正在如火如荼进行,土地规模化、集约化经营取得了一定的效果,但土地流转过程中还存在诸多问题亟需解决。包括土地流转主体错位,地方政府越位、缺位;片面强调经济收入,忽视土地的粮食保障功能;土地流转法律不完... 当下中国农村土地流转工作正在如火如荼进行,土地规模化、集约化经营取得了一定的效果,但土地流转过程中还存在诸多问题亟需解决。包括土地流转主体错位,地方政府越位、缺位;片面强调经济收入,忽视土地的粮食保障功能;土地流转法律不完备、程序不透明,农民利益得不到保障;片面追求流转规模和比例,土地流转风险难以规避。解决这些问题需要采取以下措施:一是加快制定农村土地经营权流转法律法规,规范流转主体行为,必须确定农民作为土地流转的主体,政府不缺位、不越位,规范土地流转合同,对流入方资格、土地用途和土地面积进行规定,这可以有力地减少流转风险;二是明确市场在土地流转中的决定性作用,保护农民权益。这需要建立起动态的价格确定机制以及土地流转准备金制度;三是监督流转土地使用,严格控制"非粮化"土地流转比例。这需要国家尽早划定永久基本农田以及加大粮食种植补贴和支持的力度来实现。 展开更多
关键词 土地承包经营权 土地流转 农民利益 粮食安全 基本农田
下载PDF
Encrypted data sharing with multi-owner based on digital rights management in online social networks 被引量:1
12
作者 HUANG Qin-long FU Jing-yi +2 位作者 MA Zhao-feng YANG Yi-xian NIU Xin-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第1期86-93,共8页
The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before s... The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient. 展开更多
关键词 digital rights management online social networks multi-owner attribute-based encryption broadcast encryption
原文传递
Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection
13
作者 黄政嘉 卢佩君 +3 位作者 庄文胜 范俊逸 林政扬 林俊宏 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期443-447,共5页
In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by th... In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management(DRM)scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem. 展开更多
关键词 identity authentication elliptic curve cryptosystem privacy protection digital rights management(DRM)
原文传递
General digital rights management solution based on white-box cryptography
14
作者 Liu Jun Hu Yupu Chen Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第1期52-63,共12页
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto... Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical. 展开更多
关键词 digital rights management(DRM) white-box cryptography traceable white-box program white-box compiler
原文传递
China-Japan white list management system going on the right track
15
作者 Zhong Xinzheng 《纺织服装周刊》 2012年第27期48-48,共1页
Recently, the enterprises which had joined Japanese textile standard of self-regulation standards(that is white list management system) had been officially announced. Including Qingdao GuiHua knitting limited company,... Recently, the enterprises which had joined Japanese textile standard of self-regulation standards(that is white list management system) had been officially announced. Including Qingdao GuiHua knitting limited company, there are 32 companies accessed to white list qualification. 展开更多
关键词 China-Japan white list management system going on the right track
原文传递
Composite Chaotic Pseudo-Random Sequence Encryption Algorithm for Compressed Video 被引量:10
16
作者 袁春 钟玉琢 杨士强 《Tsinghua Science and Technology》 SCIE EI CAS 2004年第2期234-241,共8页
Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random numb... Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random number generator-based approaches, for example, logistics maps, are comparatively promising approachs, but are vulnerable to attacks by nonlinear dynamic forecasting. A composite chaotic cryptography scheme was developed to encrypt the compressed video with the logistics map with a Z(2311) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography. The scheme maintained real-time performance and flexibility of the chaotic sequence cryptography. The scheme also in-tegrated asymmetrical public-key cryptography and encryption and identity authentification of control pa-rameters at the initialization phase. Encryption is performed in a layered scheme based on the importance of the data in a compressed video stream. The composite chaotic cryptography scheme has the advantage that the value and updating frequency of the control parameters can be changed online to satisfy the net-work requirements and the processor capability, as well as the security requirements. Cryptanalysis shows that the scheme guarantees robust security,provides good real-time performance,and has flexible im-plementation. Statistical evaluations and tests verify that the scheme is effective. 展开更多
关键词 CHAOTIC compressed video content-based encryption digital rights management stream cryptosystem
原文传递
Basic Considerations on AVS DRM Architecture 被引量:3
17
作者 黄铁军 刘永亮 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第3期366-369,共4页
Digital Rights Management (DRM) is an important infrastructure for the digital media age. It is a part of the AVS (Audio and Video coding Standard) of China. AVS Trusted Decoder (ATD) that plays back digital med... Digital Rights Management (DRM) is an important infrastructure for the digital media age. It is a part of the AVS (Audio and Video coding Standard) of China. AVS Trusted Decoder (ATD) that plays back digital media program according to rights conditions is the core of AVS DRM architecture. Adaptation layers axe responsible for translating or negotiating between ATD and peripheral systems. The Packaging Adaptation Layer (PAL), Licensing Adaptation Layer (LAL) and Rendering Adaptation Layer (RAL) will help ATD to gain the interoperability in various DRM environments. 展开更多
关键词 digital media digital rights management AVS (Audio and Video coding Standard)
原文传递
Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing 被引量:2
18
作者 HUANG Qin-long MA Zhao-feng +2 位作者 YANG Yi-xian FU Jing-yi NIU Xin-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第6期88-95,共8页
Cloud computing provides a convenient way of content trading and sharing. In this paper, we propose a secure and privacy-preserving digital rights management (DRM) scheme using homomorphic encryption in cloud comput... Cloud computing provides a convenient way of content trading and sharing. In this paper, we propose a secure and privacy-preserving digital rights management (DRM) scheme using homomorphic encryption in cloud computing. We present an efficient digital rights management framework in cloud computing, which allows content provider to outsource encrypted contents to centralized content server and allows user to consume contents with the license issued by license server. Further, we provide a secure content key distribution scheme based on additive homomorphic probabilistic public key encryption and proxy re-encryption. The provided scheme prevents malicious employees of license server from issuing the license to unauthorized user. In addition, we achieve privacy preserving by allowing users to stay anonymous towards the key server and service provider. The analysis and comparison results indicate that the proposed scheme has high efficiency and security. 展开更多
关键词 digital rights management homomorphic encryption proxy re-encryption privacy preserving cloud computing
原文传递
Timing and hamming weight attacks on minimal cost encryption scheme
19
作者 YUAN Zheng WANG Wei +1 位作者 ZHANG Hua WEN Qiao-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第1期81-85,共5页
The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is... The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is used to select and collect effective plaintexts for attack. Then the collected plaintexts are utilized to infer the expanded key differences of the secret key, from which most bits of the expanded secret key are recovered. The remaining bits of the expanded secret key are deduced by the correlations between Hamming weight values of the input of the S-boxes in the first-round. Finally, from the linear relation of the encryption time and the secret key's Hamming weight, the entire 56 bits of the secret key are thoroughly recovered. Using the attack, the minimal cost encryption scheme can be broken with 2^23 known plaintexts and about 2^21 calculations at a success rate a 〉 99%. The attack has lower computing complexity, and the method is more effective than other previous methods. 展开更多
关键词 timing and hamming weight attacks DES minimal cost encryption scheme digital right management (DRM)
原文传递
Non-ambiguity of blind watermarking:a revisit with analytical resolution
20
作者 KANG XianGui HUANG JiWu +1 位作者 ZENG WenJun SHI Yun Q. 《Science in China(Series F)》 2009年第2期276-285,共10页
Resistance to ambiguity attack is an important requirement for a secure digital rights management (DRM) system. In this paper, we revisit the non-ambiguity of a blind watermarking based on the computational indistin... Resistance to ambiguity attack is an important requirement for a secure digital rights management (DRM) system. In this paper, we revisit the non-ambiguity of a blind watermarking based on the computational indistinguishability between pseudo random sequence generator (PRSG) sequence ensemble and truly random sequence ensemble. Ambiguity attacker on a watermarking scheme, which uses a PRSG sequence as watermark, is viewed as an attacker who tries to attack a noisy PRSG sequence. We propose and prove the security theorem for binary noisy PRSG sequence and security theorem for general noisy PRSG sequence. It is shown that with the proper choice of the detection threshold Th = α n (a is a normalized detection threshold; n is the length of a PRSG sequence) and n i≥ 1.39 × m/α^2 (m is the key length), the success probability of an ambiguity attack and the missed detection probability can both be made negligibly small thus non-ambiguity and robustness can be achieved simultaneously for both practical quantization-based and blind spread spectrum (SS) watermarking schemes. These analytical resolutions may be used in designing practical non-invertible watermarking schemes and measuring the non-ambiguity of the schemes. 展开更多
关键词 WATERMARKING ambiguity attack PRSG sequence computational indistinguishability digital rights management (DRM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部