[1]
JAMKHEDKAR P A , HEILEMAN G L. Digital rights management architectures[J]. Computers and Electrical Engineering, 2009,35(2):376-394.
[2]
范科峰, 莫玮, 曹山. 数字版权管理技术及应用研究进展[J]. 电子学报, 2007,35(6): 1139-1147.
[3]
SACHAN A, EMMANUEL S, DAS A,et al.Privacy preserving multiparty multilevel DRM architecture[C]// CCNC09: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference. Piscataway, NJ: IEEE Press, 2009: 1128–1132.
[4]
张志勇, 牛丹梅. 数字版权管理中数字权利使用控制研究进展[J]. 计算机科学, 2011,38(4): 48-54.
[5]
林丽, 李艳, 关德军. 数字版权管理系统中安全模型的研究与设计[J]. 通化师范学院学报, 2011,32(10): 14-16.
[6]
张晓林. 数字权益管理技术[J]. 现代图书情报技术, 2001(5): 3-10.
[7]
ZENG WENJUN, LEI S. Efficient frequency domain selective scrambling of digital video[J]. IEEE Transactions on Multimedia, 2003,5(1): 118-129.
[8]
曾婷, 张成昱, 肖燕. 电子图书数字权限管理系统比较研究[J]. 图书馆杂志, 2004, 23(8): 55-60.
[9]
徐新光. 数字版权管理的技术和难题[J]. 广播与电视技术, 2006, 33(12): 75-79.
[10]
CHOR B, FIAT A, NAOR M. Tracing traitors[C]// CRYPTO94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1994: 257-270.
[11]
CHOI S, HAN J, JUN S I. Improvement on TCG attestation and its implication for DRM[C]// ICCSA07: Proceedings of the 2007 International Conference on Computational Science and Its Applications. Berlin: Springer-Verlag, 2007: 912-925.
[12]
ABBADI I M, ALAWNEH M. Replay attack of dynamic rights within an authorised domain[C]// SECURWARE09: Proceedings of the 2009 the Third International Conference on Emerging Security Information, Systems and Technologies. Washington, DC: IEEE Computer Society, 2009:148-154.
[13]
BHATT S, SION R, CARBUNAR B. A personal mobile DRM manager for smartphones[J]. Computers and Security, 2009,28(6):327-340.
[14]
张海鑫, 程丽红, 李顺东. 数字版权管理系统中的使用控制模型[J]. 计算机技术与发展, 2009,19(12): 135-157.
[15]
PARK J, SANDHU R. The UCONABC usage control model[J]. ACM Transactions on Information and System Security, 2004,7(1): 128-147.
[16]
PARK J, SANDHU R. Towards usage control models: Beyond traditional access control[C]// Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2002: 57-64.
[17]
ZHANG X W, PARISI-PRESICCE F, SANDHU R, et al.Formal model and policy specification of usage control [J]. ACM Transactions on Information and System Security, 2005,8(4): 351-387.
[18]
KATT B, ZHANG X W, BREU R. A general obligation model and continuity-enhanced policy enforcement engine for usage control[C]// Proceedings of the 13th ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2008: 123-132.
[19]
SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
[20]
BLACKLEY G R. Safeguarding cryptographic keys[C]// Proceedings of the National Computer Conference. Washington, DC: IEEE Computer Society, 1979: 313-317. |