Based on credibility and usage control (UCON), this paper researches the access control in digital resource dissemination. Combining application of traditional access control, trust management and digital rights management (DRM) covered by UCON, this paper realizes the control system of resource dissemination for online reading in the open network environment. And also a formal description for this system is given.
王斐,王凤英. 基于可信度和UCON的资源分发研究与应用*[J]. 现代图书情报技术, 2007, 2(9): 40-43.
Wang Fei,Wang Fengying. Research and Application of Credibility-based Resource Dissemination in UCON. New Technology of Library and Information Service, 2007, 2(9): 40-43.
[1] Park J,Sandhu R. Towards Usage Control Models:Beyond Traditional Access Control[C]. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, 2002: 57-64.
[2] Park J,Sandhu R. Usage Control: A Vision for Next Generation Access Control[C]. In: Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2003:17-31.
[3] Park J,Sandhu R. The UCONABC Usage Control Model[J]. ACM Transactions on Information and System Security, 2004, 7(1):128-174.
[4] 王斐, 王凤英. UCONRD: Usage Control 资源分发模型[J].山东科技大学学报(齐鲁研究生论坛), 2007, 26(109):243-245.
[5] Park J,Sandhu R. Originator Control in Usage Control[C].In: Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks,2002:60-66.
[6] Li Z D,Ye X J. Towards a Dynamic Multi-Policy Dissemination Control Model (DMDCON)[J]. ACM SIGMOD Record, 2006,35(1):33-38.
[7] 唐文, 陈钟. 基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.
[8] 唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.
[9] 袁磊.使用控制模型的研究[J].计算机工程,2005,31(12):146-148.
[10] 愈银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1966.