期刊文献+

访问控制和数字版权管理 被引量:2

Access Control and Digital Rights Management
下载PDF
导出
摘要 分析了传统的访问控制模型的缺陷,并从多方面对传统访问控制与作为现代访问控制技术的数字版权管理技术进行了比较,最后给出了一种包含传统的访问控制和数字版权管理的使用控制模型。 This paper discusses the shortcomings of traditional access control models, and compares them to digital rights manageanent (DRM) which is now regarded as a modem access control technology. In the end, a usage control (UCON) model that encompasses traditional access control and digital rights management is put forward.
作者 沈海波
出处 《计算机与现代化》 2005年第9期85-88,共4页 Computer and Modernization
基金 湖北省自然科学基金资助项目(2004ABA055)。
关键词 传统的访问控制 数字版权管理 信任管理 traditional access control digital rights management(DRM) trust management
  • 相关文献

参考文献6

  • 1Ferraiolo D,Sandhu R,et al.Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3):224-274. 被引量:1
  • 2洪帆,何绪斌,徐智勇.基于角色的访问控制[J].小型微型计算机系统,2000,21(2):198-200. 被引量:43
  • 3徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 4Rosenblatt B,Trippe B,Mooney S.Digital Rights Management:Business and Technology [M]. M&T Books, 2002. 被引量:1
  • 5Park J, Sandhu R. Towards usage control models: Beyond traditional access control [A].Proceedings of 7th ACM Symposium on Access Control Models and Technologies[C].June 2002. 57-64. 被引量:1
  • 6Park J, Sandhu R. The UCONABC usage control model [J]. ACM Transactions on Information and System Security (TISSEC), 2004, 7(1):128-174. 被引量:1

二级参考文献23

  • 1Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210. 被引量:1
  • 2Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112. 被引量:1
  • 3Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173. 被引量:1
  • 4Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf. 被引量:1
  • 5Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html. 被引量:1
  • 6Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700. 被引量:1
  • 7Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18. 被引量:1
  • 8Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63. 被引量:1
  • 9Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal, 1997,2(2):127~139. 被引量:1
  • 10Povey, D. Developing electronic trust policies using a risk management model. In: Proceedings of the 1999 CQRE Congress. 1999. 1~16. http://security.dstc.edu.au/staff/povey/papers/CQRE/123.pdf. 被引量:1

共引文献154

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部