期刊文献+

P2P环境下支持版权交易的DRM模型

A DRM Model to Resell the Ownership of Copyright for P2P Networks
在线阅读 下载PDF
导出
摘要 对等网络因其具有分布式、自组织、带宽利用率高等特点,在分布式文件分发、多媒体传输、网络流媒体服务方面有着广阔的应用前景,成为研究领域的一个热点。但是由于对等网络分布式的结构特点,必须引入版权保护机制对多媒体文件版权进行保护。文章提出了一种P2P环境下支持版权交易的DRM模型,为解决对等网络下的版权交易问题提出了一个可行的方案。 P2P network for its characteristics of distributed, self-organization, higher bandwidth utilization, has a broad application prospects in file distribution, multimedia transmission, Internet streaming media business and so on, and has become a hot spot of research field. However, because of the structural characteristics of the distributed, it is necessary to introduce copyright protection of multimedia files, with people's increasing demand in copyright trading; we propose a digital right management model (DRM) to resell the ownership of copyright for P2P networks, as a feasible solution to the problem proposed above.
出处 《信息化研究》 2011年第6期34-36,40,共4页 INFORMATIZATION RESEARCH
基金 国家自然科学基金(60973139 61003039 61003236) 江苏省科技支撑计划(工业)项目(BE2010197 BE 2010198) 江苏省高校自然科学基础研究项目(10KJB520013.10KJB520014)资助
关键词 对等网络 数字版权保护 一次性代理签名 版权二次交易 P2P network digital right management model(DRM) one-time proxy signature copyrights reselling
  • 相关文献

参考文献7

  • 1Rosenblatt B, Trippe B, Mooney S. Digital rights management: business and technology[ M]. New York: M&T Books, 2009: 446 - 498.
  • 2Mauthe A. Thomas P. Professional content management sys- tems: handling digital media assets[ M]. New York: Wiley, 2004:223 - 254.
  • 3Koenen R H, Lacy J, Mackay M. The long march to interopera- ble digital rights management [ J]. Proceedings of IEEE, 2007, 92(6) : 883 - 897.
  • 4钟勇,秦小麟,刘凤玉.一种面向DRM的责任授权模型及其实施框架[J].软件学报,2010,21(8):2059-2069. 被引量:8
  • 5Mir Mohammad Azad. Digital rights management[ J]. Interna- tional Journal of Computer Science and Network Security, 2010, 10(11) :25 -33.
  • 6FUXiao-tong XIAOHong XIAOGuo-zhen.Cryptanalysis of the One-Time Proxy Signature Scheme Used in Mobile Agents[J].Wuhan University Journal of Natural Sciences,2005,10(1):183-185. 被引量:1
  • 7Adi Shamit. How to share a secret [J]. ACM, 1979, 22( 11): 612 -613.

二级参考文献5

  • 1钟勇,秦小麟,郑吉平,林冬梅.一种灵活的使用控制授权语言框架研究[J].计算机学报,2006,29(8):1408-1418. 被引量:15
  • 2Yi L J,Bai G Q,Xiao G Z.Proxy Multi-Signature Scheme[].Electronics Letters.2000
  • 3Mambo M,Usuda K,Okamoto E.Proxy Signature: Delegation of the Power to Sign Messages[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.1996
  • 4Mambo M,Okamoto E.Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.1997
  • 5钟勇,秦小麟,刘凤玉.ODRL权利描述语言逻辑实施机制研究[J].计算机科学,2009,36(4):133-139. 被引量:7

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部