Please wait a minute...
Advanced Search
现代图书情报技术  2007, Vol. 2 Issue (9): 34-39     https://doi.org/10.11925/infotech.1003-3513.2007.09.07
  数字图书馆 本期目录 | 过刊浏览 | 高级检索 |
DRM中的分发控制研究
孙辉
(南京大学出版社 南京 210093)
Dissemination Control in Digital Rights Management
Sun Hui
(Nanjing University Press, Nanjing 210093,China)
全文: PDF (594 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 

分析数字权益管理系统中各主体之间的授权关系,给出DRM中的分发控制特点,并在此基础上提出扩展使用控制模型。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
孙辉
关键词 数字权益管理扩展使用控制权利委托分发控制    
Abstract

After analyzing the delegations of rights in Digital Rights Management(DRM), the paper gives the characteristics of the dissemination control and extended usage control model.

Key wordsDigital rights management    EUCON    Delegations of rights    Dissemination control
收稿日期: 2007-07-24      出版日期: 2007-09-25
: 

G250.76 

 
     
  TP309

 
通讯作者: 孙辉     E-mail: sh163@jlonline.com
作者简介: 孙辉
引用本文:   
孙辉. DRM中的分发控制研究[J]. 现代图书情报技术, 2007, 2(9): 34-39.
Sun Hui. Dissemination Control in Digital Rights Management. New Technology of Library and Information Service, 2007, 2(9): 34-39.
链接本文:  
https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/10.11925/infotech.1003-3513.2007.09.07      或      https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/Y2007/V2/I9/34

[1] iTUNes 7[EB/OL].[2006-04-24].http://www.apple.com.cn/itunes/overview/
[2] Protecting Microsoft Reader eBooks[EB/OL].[2006-04-26].http://www.microsoft.com/reader/developers/info/das.asp
[3] Roshan K. Thomas, Ravi Sandhu. Towards a Multi-dimensional Characterization of Dissemination Control[C].  In:Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks . POLICY 2004: 197-200.
[4] Cheung S C, Curreem H. Rights Protection for Digital Contents Redistribution over the Internet[C]. In:Proceedings of the 26th Annual International Computer Software and Applications Conference, IEEE Computer Society, 2002:105-110
[5] 汤帜,吴毛力,刘宁胜,等.对数字内容作品的网上交易进行计数的装置系统:中国,CN011404205[P].2003-06-21
[6] 洪帆,段素娟. 多域多应用环境下的访问控制研究[J]. 计算机科学,2006,33(4):281-283
[7] 吕远大,刘文清,周雁舟. 数字版权管理中的角色访问控制模型[J].计算机工程,2006,32(11):180-185
[8] 谷和启. 授权管理基础设施PMI技术与应用[EB/OL].( 2004-07-17 )[2007-06-10]. http://www.infosecurity.org.cn/article/pki/pmi/23446.html
[9] Park J,Sandhu R. Originator control in usage control[C]. In:Proc. 3rd IEEE International Workshop on Policies for Distributed Systems Networks, Monterey, California, 2002: 60-66
[10] Li Z D,Zhan G Q,Ye Y J.Resource Management Continuity With Constraint Inheritance Relation[C]. In:Proceedings of the First International Conference on Availability,Reliability and Security.2006:77-83
[11]Li Z,Ye X. Towards A Dynamic Multi-policy Dissemination Control Model (DMDCON)[J]. SIGMOD Record,2006,35(1):9-13
[12] Sandhu R,Park J. Usage Control: A Vision for Next Generation Access Control[C]. In:Proceedings of the 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security.2003: 17-31
[13] Sandhu R,Park J. The UCONABC Usage Control Model[J]ACM Transaction on Information and System Security, 2004, 7(1): 128-172

[1] 孙辉. DRM体系结构研究*[J]. 现代图书情报技术, 2007, 2(12): 45-49.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 《数据分析与知识发现》编辑部
地址:北京市海淀区中关村北四环西路33号 邮编:100190
电话/传真:(010)82626611-6626,82624938
E-mail:jishu@mail.las.ac.cn