期刊文献+

数字版权管理安全性评测模型研究 被引量:3

Research on Security Evaluation Model of DRM System
下载PDF
导出
摘要 根据多种现有的数字版权管理系统的设计和实现方案,提出了构成数字版权管理(Digital Rights Manage-ment,DRM)系统的最小子集和典型的系统构成。针对常见的攻击举例,设计了DRM系统安全性评价指标,指标中包含了攻击后防御强度。提出了使用层次分析法来评价DRM系统的安全性模型。在评价安全性时,依据算法、商业秘密、软件防破解能力等安全性基础进行评价。最后,使用提出的指标对现有的两种数字版权管理系统进行了评价,给出了评价的数量指标,并进行了对比评价分析,分析结果验证了评价模型的合理性。 According to the design patterns and implementations of many existing digital rights management systems,a minimal set of DRM system and a typical DRM system were designed.Against to the usual attack,some evaluation indices were proposed in this article.One of the indices is defense intensity after attack.AHP is used in the evaluation mo-del of the security of DRM system.To evaluate the security,encrypt algorithm,commercial secret and the ability of anti-crack were proposed as foundation of security.In the last part,two existing DRM systems were evaluated using the indices and the quantitative indicators which were given.The result of contrastive experiment indicates that the security evaluation model of DRM system is rational.
出处 《计算机科学》 CSCD 北大核心 2011年第3期24-27,56,共5页 Computer Science
基金 国家973项目(2007CB311203) 国家自然科学基金(60803157 90812001) 国家242项目(2009A105) 国家标准制定计划(20080200-T-339) 国家质检公益性科研专项(10-126)资助
关键词 数字版权管理 攻击后防御强度 安全性评测 层次分析法 Digital rights management Defense intensity after attack Security evaluation AHP
  • 相关文献

参考文献12

二级参考文献87

  • 1彭海清,冯涛,童登金.家庭网络的关键技术、业务及标准化[J].电信科学,2004,20(11):5-9. 被引量:8
  • 2俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 3Claudine Conrado, Milan Petkovic', Willem Jonker.Privacy-Preserving Digital Rights Management[C].In : SDM 2004, Springer-Verlag, 2004. 被引量:1
  • 4J Feigenment,M J Freedman,T Sander et al.Privacy Engineering for Digital Right Management Systems[C].In:Proceeding of the ACM Workshop on Security and Privacy in Digital Rights Management, 2001. 被引量:1
  • 5Keun Wang Lee,JaePyo Park,KwangHyoung Lee et al.The Design of a DRM System Using PKI and a Licensing Agent[C].In:IEIP International for Information Prosessing,2004. 被引量:1
  • 6Tobias Hauser,Christian Wenz.DRM Under Attack:Weaknesses in Existing Systems[C].In : Digital Right Management, Spirnger-Verlag 2003,LNCS 2770,2003:206-223. 被引量:1
  • 7Kwon Ⅱ Lee,Kouichi Sakurai,Jun Seok Lee et al.A DRM Framework for Secure Distribution of Mobile Contents[C].In:The International Conference on Information Networking 2004,Springer-Verlag,2004. 被引量:1
  • 8Digital Rights Management White Paper[R].Sonera Plaze Ltd MediaLab, 2002-03. 被引量:1
  • 9[美]CarLisleAdamsSteveLloyd 冯登国(译).公开密钥基础设施-概念,标准和实施[M].人民邮电出版社,2001.. 被引量:1
  • 10Lin E T, Eskicioglu A M, Lagendijk R L, et al. Digital Video Content Protection[J]. Advances in Video Coding and Delivery, 2005,93(1) : 171-182. 被引量:1

共引文献179

同被引文献21

  • 1阎希光.可信计算的研究及其发展[J].信息安全与通信保密,2006,28(11):18-20. 被引量:6
  • 2王斐,王凤英.基于使用控制的资源分发模型[J].山东理工大学学报(自然科学版),2007,21(4):31-34. 被引量:1
  • 3Jaehong Park,Ravi Sandhu.The UCONABC usage control model. ACM Transactions on Information and System Security . 2004 被引量:1
  • 4Xinwen Zhang,Jean-Pierre Seifert.Security Enforcement Model for Distributed Usage Control. Proceedings 2nd IEEE International Conference on Sensor Networks,Ubiquitous,and Trustworthy Computing (SUTC) . 2008 被引量:1
  • 5Jaehong Park,Xinwen Zhang,Ravi Snadhu.Arrtibute mutability in usage control. Proceedings of 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security . 2004 被引量:1
  • 6Ravi Sandhu,Jaehong Park.Usage control:A vision for next generation access control. Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security . 2003 被引量:1
  • 7Park J,Sandhu R.Towards usage control models: Beyond traditional access control. Proceedings of the 7th ACM Symposium on Access Control Models and technologies (SACMATr02) . 2002 被引量:1
  • 8Fan Chu-ni,Chen Ming-te,Sun Wei-zhe. Buyer-seller watermarking protocols with off-line trusted parties[A].Secul:Kaoksiurg,2007.1035-1040. 被引量:1
  • 9Phan R C-W,Gni B-M,Poh G-S. Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents[J].Wireless Pers Corrnun,2011.73-83. 被引量:1
  • 10Chen Chin-ling. A secure and traceable E-DRM system based on mobile device[J].Expert Systems with Applications,2008.878-886. 被引量:1

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部