期刊文献+

数字内容全生命周期保护模型研究 被引量:1

Research on Digital Content Whole Lifecycle Protection Model
在线阅读 下载PDF
导出
摘要 针对现有保护技术不能满足数字内容全生命周期保护的问题,提出数字内容全生命周期保护的概念及保护模型,用"壳"封装数字内容形成壳式保护对象(BCO),监管和保护数字内容生命周期的每个阶段。讨论BCO的逻辑结构、物理结构及物理耦合形式,结合应用实例描述基于PKC的关键Web服务,通过实例验证保护模型的合理性。 Aiming at the problem that current protecting technology has not provide the lifecycle security for the digital contents,this paper puts forward the Content Lifecycle Protection(CLP) concept and the corresponding protection model,which mainly employs 'Box' to wrap content into BCO so that box can supervise and protect inside content during each phase of lifecycle.By analyzing the elements in BCO,it presents BCO logical structure,physical structure and physical coupling structures respectively.The application experiment is implemented and key Web services based on PKC are described in detail,which proves the model's reasonability.
作者 薛梅 袁仲雄
出处 《计算机工程》 CAS CSCD 北大核心 2011年第23期33-36,39,共5页 Computer Engineering
关键词 内容安全 全生命周期保护 保护模型 安全规则 WEB服务 壳式对象 content security whole lifecycle protection protection model security rule Web service box object
  • 相关文献

参考文献11

  • 1Extensible Access Control Markup Language(XACML)[EB/OL]. (2010-12-14). http://docs.oasis-open.org/xacml/2.0/XACML-2.0- OS-NORMATIVE.zip.
  • 2OASIS Rights Language Technical Committee[EB/OL]. (2010-09- 17). http://www.oasis-open.org/committees/rights/.
  • 3MPEG-21, Part 5: Rights Expression Language(REL)[EB/OL]. (2010-11-08). http://mpeg.telecomitalialab.com/standards/mpeg- 21/mpeg-21 .btm.
  • 4MPEG-21, Part 6: Rights Data Dictionary(RDD)[EB/OL]. (2009- 12-25). http://mpeg.telecomitalialab.com/standards/mpeg-2/mpeg- 21.Htm.
  • 5Open eBook Forum(OeBF)[EB/OL]. (2010-07-15). http://www. openebook.org/specifications/rrwgcoordinated.htm.
  • 6ContentGuard Extensible Rights Markup Language(XrML) [EB/OL]. (2010-04-13). http://www.xrml.org/.
  • 7Open Digital Rights Language(ODRL)[EB/OL]. (2010-10-24). http://www.w3.orgfl'R/odrl/.
  • 8InterTrust DigiBox[EB/OL]. (2010-07-11). http://www.intertrust. corrt/main/technology/index,html.
  • 9IBM Cryptolopes[EB/OL]. (2010-09-23). http://www.research.ibm,com/people/k/kaplan/cryptolope-docs/crypap.html.
  • 10郭玉彬,奚建清.Web service的事务协调框架研究与实现[J].计算机工程与应用,2009,45(36):22-25. 被引量:3

二级参考文献18

  • 1OASIS. Web services security : SOAP message security1. 0 ( WS- Security 2004) [ EB/OL]. http://docs, oasis -open. org/wssd 2004/01/oasis-200401-wss-soap-message-security-1. 0. pdf, 2004- 03 -01/2008 -02 -19.
  • 2David C Chou, KiriU Yurov. Security development in Web services environment [ J ]. Computer Standards & Interfaces, 2005 ( 27 ) : 233-240.
  • 3Chen Shi-ping, Yah Bo, John Zic, et al. Evaluation and modeling of Web services performance [ C ]. ICWS 06, IEEE International Conference on Web Services ( ICWS 06 ) ,2006 : 231-238.
  • 4Liu Hui, Lin Xin, Lu Li-ming. Modeling response time of SOAP over http [ C ]. ICWS 05, Proceeding of the IEEE International Conference on Web Services (ICWS05) ,2005,673-679.
  • 5Tang Ke-zhe, Chen Shi-ping, David levy, et al. A performance e- valuation of Web services security [ C ]. EDOC 06, Proceeding of the 10^th International Enterprise Distributed Object Computing Conference (EDOC06) ,2006,67-74.
  • 6Chen Shi-ping, Zic John, Tang Ke-zhe, et al. Performance evaluation and modcling of Web services security [ C ]. ICWS 07, IEEE International Conference on Web Services ( ICWS 07 ), 2007,431- 438.
  • 7Liu Hong-bin, Shrideep Pallickara, Geoffrey Fox. Performance of web services security[C]. In:Proceedings of the 13th Annual 13th Mardi Gras Conference, Baton Rouge, USA,2005,191-198.
  • 8Moss J E B.Nested transactions:An introduction[M]//Concurrency Control and Reliability in Distributed Svstems.New York:Van Nostrand Reinhold, 1987 : 395-425.
  • 9Zhao Wen-bing,Moser L E,Malliar-Smith P M.A reservation-based coordination protocol for Web services[C]//Proceedings of 2005 IEEE International Conference on Web Services,2005.
  • 10Schmit B A,Dustdar S.Towards transactional Web services[C]//Seventh IEEE International Conference on E-Commerce Technology, Workshops, 2005.

共引文献2

同被引文献6

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部