首页  软件  游戏  图书  电影  电视剧

请输入您要查询的图书:

 

图书 Security Trust and Risk in Digital Rights Management Ecosystem
内容
编辑推荐

 《Security Trust and Risk in Digital Rights Management Ecosystem》主要内容:The monograph has an objective to make an interesting insight on security, trust and risk in DRM ecosystem from interdisciplinary perspective. There are involved with a tradeoff between DRM security and utility,in order to implement an optimal security-utility equilibrium and establish a multi-participant trust for various participants in the contents value chain, by cost-effectively adopting and deploying of security policies and mechanisms. And also, inspired by risk management,we made in-depth investigation on security risk management in contents value chain. Finally,we gave a DRM application case for Digital Home Network and a prototype on copyrighted multimedia contents.

内容推荐

《Security Trust and Risk in Digital Rights Management Ecosystem》内容介绍:The monograph has an objective to make an interesting insight on security, trust and risk in DRM ecosystem from interdisciplinary perspective. The state-of-the-art of DRM technologies is firstly presented, and then the book proposed a tradeoff between DRM security and utility by cost-effectively adopting and deploying of security policies and mechanisms,in order to implement an optimal security-utility equilibrium and establish the multi-stakeholder trust in DRM ecosystem. And also ,the book has an in-depth investigation on security risk management in the copyrighted contents value chain. Finally, a comprehensive multimedia DRM application case for digital home networks was highlighted.

《Security Trust and Risk in Digital Rights Management Ecosystem》is intended for research scientists,engineers,developers and high-level administrators of digital rights management ecosystems and applications, and also for advanced-level students in computer science, information technology and management science.

目录

Preface

Chapter 1 Introduction

1.1 DRM Backgrounds

 1.1.1 DRM Definitions

 1.1.2 A Generic Contents Value Chain Ecosystem

 1.1.3 Three Aspects of DRM Ecosystem

1.2 State-of-The-Art DRM

 1.2.1 Cryptographic Security & Digital Watermarking

 1.2.2 Digital Rights Expression and Usage Control

 1.2.3 User Privacy Protection and Contents Security

 1.2.4 DRM Trust Models

1.3 Research Motivation and Scope

1.4 Monograph Outline

1.5 Conclusion

References

Chapter 2 Enhanced Security Policies for DRM

2.1 Fundamental Security Requirements in DRM

2.2 Trusted Computing and Remote Attestation

 2.2.1 Trusted Computing Background

 2.2.2 Trusted Computing and Its Features

 2.2.3 Remote Attestation

2.3 Ap2RA Model and Secure Protocol

 2.3.1 Privacy Protection and ApaRA Model

 2.3.2 Security Protocol

 2.3.3 Analysis and Comparisons

2.4 Trusted Computing-enabled Digital Rights Sharing

 2..1 Usage Control with Delegation Characteristics

 2.4.2 Fine-Grained Digital Rights Transfer Policy

 2.4.3 Ap2RA-Based Contents Dissemination System

 2.4.4 Trusted Distribution on Transferable Rights

2.5 Digital Rights Negotiation and Contents Security

 2.5.1 Transaction-Based Digital Rights Negotiation

 2.5.2 Contents Verification and Trusted Execution

2.6 Conclusion

References

Chapter 3 Formalized DRM Security-Utility and Game-Thelical Analysis

3.1 Requirements for Trust in DRM

 3.1.1 Essential Trust Relations

 3.1.2 Conceptual Multi-Participant Trust Architecture

3.2 Formalized Game-Theoretical Adoptions of Security Policies

 3.2.1 DRM Security Policies and Properties

 3.2.2 Non-Cooperative Game on Security Polices

 3.2.3 Cooperative Game on Security Polices

3.3 Fuzzy Analytic Hierarchy Process on Utility-Factor Weights

 3.3.1 Analytic Hierarchy Process and Fuzzy Assessment

 3.3.2 Hierarchy Process Structure and Consistency Matrix

 3.3.3 FAHP-Based Weights Assessment

3.4 Conclusion

References

Chapter 4 Basic Security-Utility and Game Analysis in Contents Acquisition Scenario

4.1 DRM Typical Security Policies

 4.1.1 Typical Security Policy Set

 4.1.2 Security Policies Relativity

4.2 Security Utility Analysis

 4.2.1 Payoff Functions of Security Policies Combinations

 4.2.2 Utility-Factors Weights Assessment and Calculation

4.3 Non-Cooperative Game on Typical Policies Set

 4.3.1 A Non-Cooperative Game Model

 4.3.2 Nash Equilibriums and Conditions

 4.3.3 Swarm Simulations and Discussions

4.4 Cooperative Game for Typical Policies

 4.4.1 Security Benefits Super-Additiontivity and Convexity

 4.4.2 Establishment of Multi-Participant Cooperation

4.5 Conclusion

References

Chapter 5 Dynamic Mixed Game Analysis of Security Policies in Contents Sharing Scenario

5.1 Rights Delegation and Transfer for Contents Sharing

5.2 Dynamic and Mixed Game for Contents Sharing

 5.2.1 Rights Sharing Tree and DMG

 5.2.2 An Algorithm for DMG

5.3 Swarm-Based Simulation Experiments

 5.3.1 Basic Simulation Environment and Procedure

 5.3.2 Simulations Experiments on Different Sharing Modes

5.4 Conclusion

References

Chapter 6 DRM Risk Management

6.1 Risk Utility of Security Policy

 6.1.1 Security Risk Management and Utility Category

 6.1.2 Pros and Cons of Qualitative and Quantitative Assessments

 6.1.3 An Analytic Approach to Risk-Controlled Utility

6.2 Risk-Controlled Utility Analysis and Business Model

 6.2.1 Risk Utility of TC-Enabling Security Policy

 6.2.2 Sharing Modes and Maximum Benefits of Contents Purveyor

 6.2.3 Simulation Experiments

 6.2.4 Related Discussions and Business Model

6.3 Conclusion

References

Chapter 7 DRM Application Case for Digital Home Network

7.1 A DRM Usage Control Model for Digital Home Network

 7.1.1 Formalized Role-based, Cross-Domain Usage Control Model for DHN

 7.1.2 Visual Modeling of the RCDUCM for DHN

 7.1.3 An Application Case of the RCDUCM for DHN

7.2 A Novel Approach to Digital Contents Sharing for Digital Home Network

 7.2.1 Background and Motivation

 7.2.2 Classification of Roles and Distribution of Permissions for DHN

 7.2.3 A Novel Approach to Digital Contents Sharing for DHN

 7.2.4 Analysis of Performance and Security

7.3 A Novel DRM Security Scheme and Its Prototype System Implementation

 7.3.1 DRM System Architecture

 7.3.2 DRM System Security Mechanism

 7.3.3 Playback Control Based on Cryptography and License

 7.3.4 Implementation of DRM Prototype System

7.4 Conclusion

References

Chapter 8 Further Works and Open Issue

8.1 Further Works

8.2 Trust Evaluation in Multimedia Social Network

 8.2.1 Introduction

 8.2.2 Advance on Trust Evaluation in Social Networks

8.3 Open Issue and Topics

8.4 Conclusion

References

Appendix A

Appendix B

Acknowledgments

标签
缩略图
书名 Security Trust and Risk in Digital Rights Management Ecosystem
副书名
原作名
作者 Lin Jian//Liu Chao
译者
编者
绘者
出版社 科学出版社
商品编码(ISBN) 9787030343352
开本 16开
页数 219
版次 1
装订 平装
字数
出版时间 2012-01-01
首版时间 2012-01-01
印刷时间 2012-01-01
正文语种
读者对象 研究人员,普通成人
适用范围
发行范围 公开发行
发行模式 实体书
首发网站
连载网址
图书大类
图书小类
重量 0.372
CIP核字
中图分类号
丛书名
印张 13.6875
印次 1
出版地 北京
239
169
10
整理
媒质 图书
用纸 普通纸
是否注音
影印版本 原版
出版商国别 CN
是否套装 单册
著作权合同登记号
版权提供者
定价
印数
出品方
作品荣誉
主角
配角
其他角色
一句话简介
立意
作品视角
所属系列
文章进度
内容简介
作者简介
目录
文摘
安全警示 适度休息有益身心健康,请勿长期沉迷于阅读小说。
随便看

 

兰台网图书档案馆全面收录古今中外各种图书,详细介绍图书的基本信息及目录、摘要等图书资料。

 

Copyright © 2004-2025 xlantai.com All Rights Reserved
更新时间:2025/5/18 14:04:05