[1] iTUNes 7[EB/OL].[2006-04-24].http://www.apple.com.cn/itunes/overview/
[2] Protecting Microsoft Reader eBooks[EB/OL].[2006-04-26].http://www.microsoft.com/reader/developers/info/das.asp
[3] Roshan K. Thomas, Ravi Sandhu. Towards a Multi-dimensional Characterization of Dissemination Control[C]. In:Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks . POLICY 2004: 197-200.
[4] Cheung S C, Curreem H. Rights Protection for Digital Contents Redistribution over the Internet[C]. In:Proceedings of the 26th Annual International Computer Software and Applications Conference, IEEE Computer Society, 2002:105-110
[5] 汤帜,吴毛力,刘宁胜,等.对数字内容作品的网上交易进行计数的装置系统:中国,CN011404205[P].2003-06-21
[6] 洪帆,段素娟. 多域多应用环境下的访问控制研究[J]. 计算机科学,2006,33(4):281-283
[7] 吕远大,刘文清,周雁舟. 数字版权管理中的角色访问控制模型[J].计算机工程,2006,32(11):180-185
[8] 谷和启. 授权管理基础设施PMI技术与应用[EB/OL].( 2004-07-17 )[2007-06-10]. http://www.infosecurity.org.cn/article/pki/pmi/23446.html
[9] Park J,Sandhu R. Originator control in usage control[C]. In:Proc. 3rd IEEE International Workshop on Policies for Distributed Systems Networks, Monterey, California, 2002: 60-66
[10] Li Z D,Zhan G Q,Ye Y J.Resource Management Continuity With Constraint Inheritance Relation[C]. In:Proceedings of the First International Conference on Availability,Reliability and Security.2006:77-83
[11]Li Z,Ye X. Towards A Dynamic Multi-policy Dissemination Control Model (DMDCON)[J]. SIGMOD Record,2006,35(1):9-13
[12] Sandhu R,Park J. Usage Control: A Vision for Next Generation Access Control[C]. In:Proceedings of the 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security.2003: 17-31
[13] Sandhu R,Park J. The UCONABC Usage Control Model[J]ACM Transaction on Information and System Security, 2004, 7(1): 128-172 |