Please wait a minute...
New Technology of Library and Information Service  2007, Vol. 2 Issue (9): 34-39    DOI: 10.11925/infotech.1003-3513.2007.09.07
Current Issue | Archive | Adv Search |
Dissemination Control in Digital Rights Management
Sun Hui
(Nanjing University Press, Nanjing 210093,China)
Download: PDF (594 KB)  
Export: BibTeX | EndNote (RIS)      
Abstract  

After analyzing the delegations of rights in Digital Rights Management(DRM), the paper gives the characteristics of the dissemination control and extended usage control model.

Key wordsDigital rights management      EUCON      Delegations of rights      Dissemination control     
Received: 24 July 2007      Published: 25 September 2007
ZTFLH: 

G250.76 

 
     
  TP309

 
Corresponding Authors: Sun Hui     E-mail: sh163@jlonline.com
About author:: Sun Hui

Cite this article:

Sun Hui. Dissemination Control in Digital Rights Management. New Technology of Library and Information Service, 2007, 2(9): 34-39.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2007.09.07     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2007/V2/I9/34

[1] iTUNes 7[EB/OL].[2006-04-24].http://www.apple.com.cn/itunes/overview/
[2] Protecting Microsoft Reader eBooks[EB/OL].[2006-04-26].http://www.microsoft.com/reader/developers/info/das.asp
[3] Roshan K. Thomas, Ravi Sandhu. Towards a Multi-dimensional Characterization of Dissemination Control[C].  In:Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks . POLICY 2004: 197-200.
[4] Cheung S C, Curreem H. Rights Protection for Digital Contents Redistribution over the Internet[C]. In:Proceedings of the 26th Annual International Computer Software and Applications Conference, IEEE Computer Society, 2002:105-110
[5] 汤帜,吴毛力,刘宁胜,等.对数字内容作品的网上交易进行计数的装置系统:中国,CN011404205[P].2003-06-21
[6] 洪帆,段素娟. 多域多应用环境下的访问控制研究[J]. 计算机科学,2006,33(4):281-283
[7] 吕远大,刘文清,周雁舟. 数字版权管理中的角色访问控制模型[J].计算机工程,2006,32(11):180-185
[8] 谷和启. 授权管理基础设施PMI技术与应用[EB/OL].( 2004-07-17 )[2007-06-10]. http://www.infosecurity.org.cn/article/pki/pmi/23446.html
[9] Park J,Sandhu R. Originator control in usage control[C]. In:Proc. 3rd IEEE International Workshop on Policies for Distributed Systems Networks, Monterey, California, 2002: 60-66
[10] Li Z D,Zhan G Q,Ye Y J.Resource Management Continuity With Constraint Inheritance Relation[C]. In:Proceedings of the First International Conference on Availability,Reliability and Security.2006:77-83
[11]Li Z,Ye X. Towards A Dynamic Multi-policy Dissemination Control Model (DMDCON)[J]. SIGMOD Record,2006,35(1):9-13
[12] Sandhu R,Park J. Usage Control: A Vision for Next Generation Access Control[C]. In:Proceedings of the 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security.2003: 17-31
[13] Sandhu R,Park J. The UCONABC Usage Control Model[J]ACM Transaction on Information and System Security, 2004, 7(1): 128-172

[1] Frédéric MARTIN. Dynamic Management of Digital Rights for Long-term Preservation:the Expert System Approach[J]. 现代图书情报技术, 2008, 24(1): 75-82.
[2] Sun Hui. The Architecture of Digital Rights Management[J]. 现代图书情报技术, 2007, 2(12): 45-49.
[3] Jiang Ying. Digital Rights Management Metadata and It’s Applications in Digital Libraries[J]. 现代图书情报技术, 2005, 21(3): 1-6.
[4] Zhang Xiaolin. Digital Rights Management Technologies[J]. 现代图书情报技术, 2001, 17(5): 3-7.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn