Please wait a minute...
New Technology of Library and Information Service  2007, Vol. 2 Issue (9): 40-43    DOI: 10.11925/infotech.1003-3513.2007.09.08
Current Issue | Archive | Adv Search |
Research and Application of Credibility-based Resource Dissemination in UCON
Wang Fei   Wang Fengying
(College of Computer Science and Technology, Shandong University of Technology, Zibo 255049,China)
Export: BibTeX | EndNote (RIS)      

Based on credibility and usage control (UCON), this paper researches the access control in digital resource dissemination. Combining application of traditional access control, trust management and digital rights management (DRM) covered by UCON, this paper realizes the control system of resource dissemination for online reading in the open network environment. And also a formal description for this system is given.

Key wordsCredibility      Usage control      Resource dissemination tree      DRM policy     
Received: 20 July 2007      Published: 25 September 2007


Corresponding Authors: Wang Fei     E-mail:
About author:: Wang Fei,Wang Fengying

Cite this article:

Wang Fei,Wang Fengying. Research and Application of Credibility-based Resource Dissemination in UCON. New Technology of Library and Information Service, 2007, 2(9): 40-43.

URL:     OR

[1] Park J,Sandhu R. Towards Usage Control Models:Beyond Traditional Access Control[C]. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, 2002: 57-64.
[2] Park J,Sandhu R. Usage Control: A Vision for Next Generation Access Control[C]. In: Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2003:17-31.
[3] Park J,Sandhu R. The UCONABC Usage Control Model[J]. ACM Transactions on Information and System Security, 2004, 7(1):128-174.
[4] 王斐, 王凤英. UCONRD: Usage Control 资源分发模型[J].山东科技大学学报(齐鲁研究生论坛), 2007, 26(109):243-245.
[5] Park J,Sandhu R. Originator Control in Usage Control[C].In: Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks,2002:60-66.
[6] Li Z D,Ye X J. Towards a Dynamic Multi-Policy Dissemination Control Model (DMDCON)[J]. ACM SIGMOD Record, 2006,35(1):33-38.
[7] 唐文, 陈钟. 基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.
[8] 唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.
[9] 袁磊.使用控制模型的研究[J].计算机工程,2005,31(12):146-148.
[10] 愈银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1966.

[1] Li Baozhen,Wang Ya,Zhou Ke. Measuring Credibility of Social Media Contents Based on Bayesian Theory[J]. 数据分析与知识发现, 2017, 1(6): 83-92.
[2] Wang Zhongqun,Wu Dongsheng,Jiang Sheng,Huang Subin. Ranking Credibility of Online Product Reviews Based on Feature-Opinion Pair[J]. 数据分析与知识发现, 2017, 1(10): 32-42.
[3] Hao Mei, Yang Xiaoyuan. Credibility Research on Chinese Online Customer Reviews[J]. 现代图书情报技术, 2015, 31(2): 55-63.
[4] Li Gang, Ye Guanghui. Research on Credibility Evaluation Mechanism of Experts Retrieval Under User's Control[J]. 现代图书情报技术, 2014, 30(7): 107-113.
[5] Nie Hui, Wang Jiajia. Review of Product Review Spams Detection[J]. 现代图书情报技术, 2014, 30(2): 63-71.
[6] Meng Meiren, Ding Shengchun. Research on the Credibility of Online Chinese Product Reviews[J]. 现代图书情报技术, 2013, 29(9): 60-66.
[7] Shen Wang, Guo Jia, Li He. Research on Information Quality and Credibility Evaluation in Online Community——Based on User Perspective[J]. 现代图书情报技术, 2013, 29(1): 69-74.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938