期刊文献+

数据安全视角下Iaas模式云服务商版权责任研究--以阿里云版权侵权案为例 被引量:4

Research on Copyright Liability of Cloud Server Provider in Iaas Mode from the Perspective of Data Security——A Case of Copyright Infringement of Alibaba Cloud
在线阅读 下载PDF
导出
摘要 用户租用云服务商的服务器存储数据(Iaas模式)侵犯版权时,云服务商是否适用“避风港”规则并承担版权侵权责任?阿里云案一审判决及一些学者认为适用,但二审判决及一些学者认为不适用。云服务商没有提供“信息存储空间”,如果让云提供商按照“避风港”规则审查、删除数据,否则承担间接侵权责任,将会影响数据安全,加重云服务商的责任,阻碍大数据及云计算技术的进一步发展。只有在确保数据安全及遵循利益平衡原则下,采用并完善诉前禁令制度,规定云服务商协助禁令执行,缩小云服务商的间接侵权责任范围,才能维护云服务商、版权人和用户的三方利益。 When users infringe copyright in renting servers provided by cloud computing service providers to save data(Iaas Mode),whether service providers should apply to“safe haven”rule and bear copyright infringement liability?The first trial of Alibaba Cloud case and a number of scholars believe that is applicable,while second judgment and some scholars oppose it.When service provider does not provide“information storage space”,it also bears indirect liability,which will affect the data security,increase responsibility of cloud computing server providers,and hinder the further development of Big Data and Cloud computing technology.Only in the situation of insuring data security and following the principle of benefit balance,adopting and improving the system of temporary restraining order,stipulating service providers to assist the execution of restraining order,reducing the scope of indirect infringement liability of server providers,consequently the tripartite interests of service providers,copyright owners and users can be maintained.
作者 王渊 Wang Yuan(School of Law,Lanzhou University,Lanzhou 730000,China)
机构地区 兰州大学法学院
出处 《中国科技论坛》 CSSCI 北大核心 2020年第8期60-66,共7页 Forum on Science and Technology in China
基金 2018年度教育部人文社会科学研究项目“恶意知识产权侵权警告立法规制的最简方案研究”(18XJA820002) 兰州大学“双一流”引导专项:拔尖创新人才培养(561319901)。
关键词 数据安全 Iaas模式 云服务商 版权责任 Data security Laas mode Cloud server provider Copyright infringement liability
  • 相关文献

参考文献4

二级参考文献33

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1174

同被引文献68

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部