After analyzing the reference monitor in digital rights management, the paper gives multi-layer architecture and third-party architecture in order to solve the shortcomings in the current DRM systems. Finally it analyzes the key elements of the architecture.
孙辉. DRM体系结构研究*[J]. 现代图书情报技术, 2007, 2(12): 45-49.
Sun Hui. The Architecture of Digital Rights Management. New Technology of Library and Information Service, 2007, 2(12): 45-49.
[1] iTunes[EB/OL]. [2006-04-24]. http://www.apple.com.cn/itunes/overview/.
[2] Protecting Microsoft Reader eBooks [EB/OL]. [2006-04-26].http://www.microsoft.com/reader/developers/info/das.asp.
[3] Bill Rosenblatt, Bill Trippe, Stephen Mooney. Digital Right management: Business and Technology[M]. New York: M&T Books, 2002:83-84.
[4] 孙辉. DRM中的利益失衡研究[J]. 图书情报工作,2007,51(7):90-93.
[5] Pasi Tyrvainen. Concepts and a Design for Fair Use and Privacy in DRM[J]. D-lib Magazine, 2005:11(2).
[6] Kwok S H, Lui S M. A License Manegement Model to Support B2C and C2C Music Sharing[C]. In:Proceedings of the 10th International World Wide Web Conference (WWW10), Hong Kong,2001:136-137.
[7] Erickson, J. Fair Use, DRM, Trust System[J]. Communication of the ACM, 2003,46(4):35-39.
[8] The International Organization for Standardization. Information technology—Open Systems Interconnection—Security Frameworks for Open Systems—Part 3:Access Control Framework[S]. ISO/IEC10181-3:1996.
[9] William Stallings. 密码编码学与网络安全——原理与实践[M]. 第三版. 北京:电子工业出版社,2004.
[10] Jaehong Park. Usage Control: A Unified Framework for Next Generation Access Control[D]. George Marson University, 2003:82-84.
[11] 孙辉.DRM中的分发控制研究[J].现代图书情报技术,2007(9):34-39.
[12] 俞银燕, 汤帜. 数字版权保护技术研究综述[J]. 计算机学报, 2005,28(12):1957-1958.