期刊文献+
共找到383篇文章
< 1 2 20 >
每页显示 20 50 100
Digital Rights Management:Model,Technology and Application 被引量:7
1
作者 Zhaofeng Ma 《China Communications》 SCIE CSCD 2017年第6期156-167,共12页
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ... with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality. 展开更多
关键词 digital rights management drm security infrastructure ENCRYPTION watermark usage control drm-free
下载PDF
Home Network and Digital Rights Management Technology 被引量:2
2
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home Network and digital rights management Technology ZTE ISDB ATSC
下载PDF
Digital Rights Management for a Chinese XML Text Centre
3
作者 Wai -man Wong(The Open University of Hong Kong Library,Hong Kong,China) 《现代图书情报技术》 CSSCI 北大核心 2002年第S1期172-177,共6页
The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased direc... The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased directly from the market,and about,1,000 locallyproduced electronic titles.The locally produced titles are notavailable in the market but require local digitization andnegotiation with publishers with regard to the right to use(RTU)them so as to meet the learning needs of the OUHKcommunity.Nearl... 展开更多
关键词 TEXT digital rights management for a Chinese XML Text Centre XML
下载PDF
A Novel Digital Rights Management Scheme in P2P Networks
4
作者 Jing Feng Ruoshan Kong Yulin Wang 《Communications and Network》 2010年第4期230-234,共5页
P2P networking is a distributed application architecture that partitions tasks or workloads between peers. How to integrate P2P networks and DRM to offer a novel content distribution mode for digital media resources i... P2P networking is a distributed application architecture that partitions tasks or workloads between peers. How to integrate P2P networks and DRM to offer a novel content distribution mode for digital media resources is a significant research project. In this paper, a novel DRM architecture in P2P Networks is proposed, three phases include content provide phase, content purchase phase and content access phase, are modeled, and key technologies are introduced. Finally analysis indicates that the proposed scheme has the characteristics of security, controllability and scalability. 展开更多
关键词 PEER-TO-PEER (P2P) digital rights management (DRM) INTELLECTUAL PROPERTY (IP)
下载PDF
Digital Rights Management Scheme for Mobile
5
作者 Xiaoming Wang 《通讯和计算机(中英文版)》 2006年第5期91-93,共3页
关键词 数字化 通讯网 通讯技术 自动化
下载PDF
Encrypted data sharing with multi-owner based on digital rights management in online social networks 被引量:1
6
作者 HUANG Qin-long FU Jing-yi +2 位作者 MA Zhao-feng YANG Yi-xian NIU Xin-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第1期86-93,共8页
The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before s... The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient. 展开更多
关键词 digital rights management online social networks multi-owner attribute-based encryption broadcast encryption
原文传递
Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection
7
作者 黄政嘉 卢佩君 +3 位作者 庄文胜 范俊逸 林政扬 林俊宏 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期443-447,共5页
In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by th... In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management(DRM)scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem. 展开更多
关键词 identity authentication elliptic curve cryptosystem privacy protection digital rights management(DRM)
原文传递
General digital rights management solution based on white-box cryptography
8
作者 Liu Jun Hu Yupu Chen Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第1期52-63,共12页
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto... Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical. 展开更多
关键词 digital rights management(DRM) white-box cryptography traceable white-box program white-box compiler
原文传递
Dynamic Management of Digital Rights for Long-term Preservation:the Expert System Approach
9
作者 Frederic MARTIN 《现代图书情报技术》 CSSCI 北大核心 2008年第1期75-82,共8页
This presentation focuses on the complex issue of managing digital rights for long-term preservation. It describes the strategy and the methodology adopted within the SPAR project (French National Library), which rely... This presentation focuses on the complex issue of managing digital rights for long-term preservation. It describes the strategy and the methodology adopted within the SPAR project (French National Library), which rely on a special kind of knowledge-based system. 展开更多
关键词 数字资源 长期保存 动态管理 专家系统 数字图书馆
下载PDF
A DRM System Based on Mobile Agent for Digital Rights Redistribution
10
作者 LI Ping LU Zhengding ZOU Fuhao LING Hefei 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期475-480,共6页
We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent ... We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given. 展开更多
关键词 digital rights management public key infrastructure certificate authority mobile agent rights redistribution
下载PDF
A Digital Right Management Model for Distribution of Digital Audiovisual Content
11
作者 FAN Kefeng PEI Qingqi +2 位作者 WANG Meihua MO Wei CAO Ling 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1877-1881,共5页
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, ... This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption registration for content fair distribution, of the model are all provided. The scheme also provides distribution and evidence for using the copyright of digital content fairly and effectively. Finally, analysis shows the proposed model has both high security and good performance. 展开更多
关键词 digital rights management content distribution authentication mechanism MODEL
下载PDF
数字时代劳动者权益保护算法治理:生成逻辑与优化路径
12
作者 吴帅 石嘉伟 朱丹雨 《治理研究》 北大核心 2024年第5期147-156,160,共11页
数字时代,劳动场景和劳动过程管理发生重大变化,对算法治理提出新要求。当前,以算法对劳动过程的控制为切入点,探讨数字化劳动场景下算法治理的生成逻辑与优化路径意义重大。研究发现,数字化劳动场景下算法对劳动过程的控制主要沿着劳... 数字时代,劳动场景和劳动过程管理发生重大变化,对算法治理提出新要求。当前,以算法对劳动过程的控制为切入点,探讨数字化劳动场景下算法治理的生成逻辑与优化路径意义重大。研究发现,数字化劳动场景下算法对劳动过程的控制主要沿着劳动时间、劳动空间以及绩效考核三条进路展开。而劳动过程控制的这些变化则带来劳动者对离线休息、安全健康和抽成正义等权益的保护诉求。在算法保护新机制和权益保护新内容的双重驱动下,劳动者权益保护面临“算法良治”新挑战,亟需优化劳动时间、劳动空间和绩效考核等维度的算法规则,推动劳动算法治理从无序走向有序,从乱治走向良治。 展开更多
关键词 数字时代 劳动过程管理 劳动者权益保护 算法控制 算法治理
下载PDF
数字时代运动员数据权利保护探究
13
作者 张佳星 张恩利 +2 位作者 冯洁 何棚城 邢天胜 《体育文化导刊》 北大核心 2024年第8期42-46,54,共6页
运用文献资料、逻辑分析、案例分析等方法,探讨数字时代运动员数据权利保护价值、困境,并提出保护策略。价值:维护个人隐私,保障权利归属,提升数据经济价值。困境:数据隐私权保护不到位,个人信息自决权保护欠缺,数据财产权保护力度不足... 运用文献资料、逻辑分析、案例分析等方法,探讨数字时代运动员数据权利保护价值、困境,并提出保护策略。价值:维护个人隐私,保障权利归属,提升数据经济价值。困境:数据隐私权保护不到位,个人信息自决权保护欠缺,数据财产权保护力度不足。保护策略:规范数据采集获取行径,遵循数据隐私权保护原则;维护数据占有主体权益,落实个人信息自决权保护;建立健全数据产权系统,加强数据财产权保护力度。 展开更多
关键词 体育管理 运动员 数据权利 数字时代
下载PDF
人工智能生成内容模型的数字水印技术研究进展
14
作者 郭钊均 李美玲 +4 位作者 周杨铭 彭万里 李晟 钱振兴 张新鹏 《网络空间安全科学学报》 2024年第1期13-39,共27页
人工智能(AI)正在改变世界,人工智能生成内容(AIGC)是当前最前沿的技术之一。探讨人工智能生成内容的演变历程,介绍从AI到AIGC的技术变迁,讨论AIGC引发的相关问题和挑战以及应对策略。同时,关注全球范围内的法律法规和国际动向,分析不... 人工智能(AI)正在改变世界,人工智能生成内容(AIGC)是当前最前沿的技术之一。探讨人工智能生成内容的演变历程,介绍从AI到AIGC的技术变迁,讨论AIGC引发的相关问题和挑战以及应对策略。同时,关注全球范围内的法律法规和国际动向,分析不同国家和组织在人工智能监管方面采取的举措,尤其是中国在全球AI治理中的贡献。着重介绍的是AIGC模型的数字水印(DigitalWatermarking)技术。数字水印已有多年发展的历史,在多媒体确权、防伪、认证等方面发挥了重要作用,随着AIGC的兴起,数字水印在模型保护、内容溯源、样本保护等方面又开始发挥新的作用。关于AIGC模型的数字水印技术研究进展的介绍,将为理解AIGC安全领域的发展提供新的视角维度,为研究AIGC领域的应用实践提供参考。 展开更多
关键词 数字水印 大模型安全 大模型版权保护 大模型水印 生成物版权保护 生成物溯源
下载PDF
REAL-TIME LICENSING MANAGEMENT OF SECURE MULTIMEDIA CONTENT DELIVE RY
15
作者 马兆丰 冯博琴 《Journal of Pharmaceutical Analysis》 SCIE CAS 2004年第2期110-113,118,共5页
Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violat... Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violated w ay is one of most important issues to take into account. In this paper, a novel and efficient authorization and authentication Digital Rights Management (DRM) s chema is proposed firstly for secure multimedia delivery, then based on the sche ma, a real-time digital signature algorithm built on Elliptic Curve Cryptograph y (ECC) is adopted for fast authentication and verification of licensing managem ent, thus secure multimedia delivery via TCP/RTP can efficiently work with real -time transaction response and high Quality of Service (QoS) . Performance eval uations manifest the proposed schema is secure, available for real-time media s tream authentication and authorization without much effected of QoS. The propose d schema is not only available for Client/Server media service but can be easily extended to P2P and broadcasting network for trusted rights management. 展开更多
关键词 digital rights management multimedia delivery real-time licensing management elliptic curve cryptography
下载PDF
基于透明管理的集体林权流转效能提升路径
16
作者 杨加猛 张文瑞 《南京林业大学学报(人文社会科学版)》 2024年第1期58-66,共9页
集体林权改革已进入数字化时代,基于数字化转型的透明管理将为集体林权流转效能的提升提供新动能。根据透明管理的内涵界定,厘清透明管理在集体林权流转中的应用场景,结合全面深化集体林权制度改革的核心诉求和关键环节,从集体林权流转... 集体林权改革已进入数字化时代,基于数字化转型的透明管理将为集体林权流转效能的提升提供新动能。根据透明管理的内涵界定,厘清透明管理在集体林权流转中的应用场景,结合全面深化集体林权制度改革的核心诉求和关键环节,从集体林权流转确权透明化、流转程序透明化、流转监管透明化三个维度,提出集体林权流转全过程的透明管理方案,并对未来集体林权流转的数字化场景应用进行了分析展望。 展开更多
关键词 透明管理 集体林权流转 数字化转型 数字治理
下载PDF
病案复印全流程管理系统的设计与应用
17
作者 侯鹏 肖永平 《中国数字医学》 2024年第7期36-40,共5页
目的:提高病案复印效率、质量与安全性。方法:通过需求分析,综合运用数字水印打印防伪、动态二维码等技术,设计开发病案复印全流程管理系统,包括复印登记、自助缴费、打印防伪病案、查询统计、防伪鉴别等功能模块。结果:系统运行后,复... 目的:提高病案复印效率、质量与安全性。方法:通过需求分析,综合运用数字水印打印防伪、动态二维码等技术,设计开发病案复印全流程管理系统,包括复印登记、自助缴费、打印防伪病案、查询统计、防伪鉴别等功能模块。结果:系统运行后,复印病案者登记时间、缴费时间及调阅、打印病案时间均显著缩短(P<0.01)。结论:病案复印全流程管理系统可提高病案复印效率,防止病历被非法复制与篡改,提升病案管理水平。 展开更多
关键词 病案管理 病案复印 数字水印 打印防伪
下载PDF
图书馆用户个人数据注销机制研究——基于数据被遗忘权视角
18
作者 袁帆 李佳 《大学图书情报学刊》 2024年第2期113-119,共7页
图书馆在利用用户个人数据实现精准服务的同时,也面临着数据安全和隐私保护的问题,个人数据隐私保护已成为重要议题。研究旨在深入探讨数据被遗忘权对图书馆用户个人数据的影响和挑战,以提供借鉴和建议,帮助图书馆构建更加透明、安全、... 图书馆在利用用户个人数据实现精准服务的同时,也面临着数据安全和隐私保护的问题,个人数据隐私保护已成为重要议题。研究旨在深入探讨数据被遗忘权对图书馆用户个人数据的影响和挑战,以提供借鉴和建议,帮助图书馆构建更加透明、安全、符合隐私保护要求的个人数据处理机制。为了完善图书馆用户数据隐私管理模式,研究设计了面向图书馆资源服务平台用户的个人数据注销机制。通过该机制,用户可以要求图书馆数字平台删除个人访问、检索、阅读、下载数据,主要目的在于彻底删除用户隐私数据,从根本上避免数据泄露或滥用,进而保障图书馆服务用户的隐私信息,提升用户对图书馆信息资源与服务的使用意愿。 展开更多
关键词 数据被遗忘权 隐私保护 数据注销 数字图书馆 管理机制
下载PDF
Effects of JPEG Compression on Reading Optical Watermarking Embedded by Using Color-Difference Modulation 被引量:1
19
作者 Kazutake Uehira Hiroshi Unno 《Journal of Computer and Communications》 2018年第1期56-64,共9页
In this paper, we evaluate the readability of optically written watermarking from an image compressed by JPEG. We previously proposed an optical watermarking technique that can protect the portrait rights of real obje... In this paper, we evaluate the readability of optically written watermarking from an image compressed by JPEG. We previously proposed an optical watermarking technique that can protect the portrait rights of real objects. It produces a watermarking pattern in the illumination light by modulating color differences. The illumination light that contains such watermarking is pro-jected onto an object. An image of the object taken by a camera contains the same watermarking, which can be extracted by image processing. Therefore, this technique can protect the portrait rights of real objects. We conducted simulations of capturing an object image illuminated by watermarked light, compressing it by JPEG, and reading embedded information from the decoded image. The simulation results showed that the accuracy in reading out embedded information decreases when captured images are compressed. However, for medium-level or low compression rates 100% accuracy can be expected by using the error correction technique. 展开更多
关键词 digital watermarkING Information EMBEDDING PORTRAIT rights
下载PDF
The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model
20
作者 Sergey Bezzateev Natalia Voloshina 《Journal of Computer and Communications》 2014年第9期121-126,共6页
The algorithm of fingerprint constructing for still images based on weighted image structure model is proposed. The error correcting codes that are perfect in weighted Hamming metric are used as a base for fingerprint... The algorithm of fingerprint constructing for still images based on weighted image structure model is proposed. The error correcting codes that are perfect in weighted Hamming metric are used as a base for fingerprint constructing. 展开更多
关键词 Fingerprinting Error CORRECTING CODES Perfect CODES in WEIGHTED Hamming METRIC WEIGHTED Container Model digital rights management
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部