0去购物车结算
购物车中还没有商品,赶紧选购吧!
当前位置: 图书分类 > 社科/经管/语言/法律 > 法学 > Security, Trust and Risk in Digital Rights Managent Ecosystem

浏览历史

Security, Trust and Risk in Digital Rights Managent Ecosystem


联系编辑
 
标题:
 
内容:
 
联系方式:
 
  
Security, Trust and Risk in Digital Rights Managent Ecosystem
  • 书号:9787030343352
    作者:张志勇
  • 外文书名:Security,Trust and Risk in Digital rights Management Ecosystem
  • 装帧:平装
    开本:B5
  • 页数:228
    字数:300
    语种:eng
  • 出版社:科学出版社
    出版时间:2015-12-02
  • 所属分类:D91 法学各部门
  • 定价: ¥108.00元
    售价: ¥85.32元
  • 图书介质:
    按需印刷 电子书

  • 购买数量: 件  缺货,请选择其他介质图书!
  • 商品总价:

相同系列
全选

内容介绍

样章试读

用户评论

全部咨询

  The monograph has an objective to make an interesting insight on security,trust and risk in DRM ecosystem from interdisciplinary perspective. The state-of-the-art of DRM technologies is firstly presented,and then the book proposed a tradeoff between DRM security and utility by cost-effectively adopting and deploying of security policies and mechanisms,in order to implement an optimal security-utility equilibrium and establish the multi-stakeholder trust in DRM ecosystem. And also,the book has an in-depth investigation on security risk management in the copyrighted contents value chain. Finally,a comprehensive multimedia DRM application case for digital home networks was highlighted.   This monograph is intended for research scientists,engineers,developers and high-level administrators of digital rights management ecosystems and applications,and also for advanced-level students in computer science,information technology and management science.
样章试读
  • 暂时还没有任何用户评论
总计 0 个记录,共 1 页。 第一页 上一页 下一页 最末页

全部咨询(共0条问答)

  • 暂时还没有任何用户咨询内容
总计 0 个记录,共 1 页。 第一页 上一页 下一页 最末页
用户名: 匿名用户
E-mail:
咨询内容:

目录

  • Preface
    Chapter 1 Introduction
    1.1 DRM Backgrounds
    1.1.1 DRM Definitions
    1.1.2 A Generic Contents Value Chain Ecosystem
    1.1.3 Three Aspects of DRM Ecosystem
    1.2 State-of-The-Art DRM
    1.2.1 Cryptographic Security & Digital Watermarking
    1.2.2 Digital Rights Expression and Usage Control
    1.2.3 User Privacy Protection and Contents Security
    1.2.4 DRM Trust Models
    1.3 Research Motivation and Scope
    1.4 Monograph Outline
    1.5 Conclusion
    References
    Chapter 2 Enhanced Security Policies for DRM
    2.1 Fundamental Security Requirements in DRM
    2.2 Trusted Computing and Remote Attestation
    2.2.1 Trusted Computing Background
    2.2.2 Trusted Computing and Its Features
    2.2.3 Remote Attestation
    2.3 AP^2 RA Model and Secure Protocol
    2.3.1 Privacy Protection and AP2 RA Model
    2.3.2 Security Protocol
    2.3.3 Analysis and Comparisons
    2.4 Trusted Computing-enabled Digital Rights Sharing
    2.4.1 Usage Control with Delegation Characteristics
    2.4.2 Fine-Grained Digital Rights Transfer Policy
    2.4.3 AP^2RA-Based Contents Dissemination System
    2.4.4 Trusted Distribution on Transferable Rights
    2.5 Digital Rights Negotiation and Contents Security
    2.5.1 Transaction-Based Digital Rights Negotiation
    2.5.2 Contents Verification and Trusted Execution
    2.6 Conclusion
    References
    Chapter 3 Formalized DRM Security-Utility and Game-Theoretical Analysis
    3.1 Requirements for Trust in DRM
    3.1.1 Essential Trust Relations
    3.1.2 Conceptual Multi-Participant Trust Architecture
    3.2 Formalized Game-Theoretical Adoptions of Security Policies
    3.2.1 DRM Security Policies and Properties
    3.2.2 Non-Cooperative Game on Security Polices
    3.2.3 Cooperative Game on Security Polices
    3.3 Fuzzy Analytic Hierarchy Process on Utility-Factor Weights
    3.3.1 Analytic Hierarchy Process and Fuzzy Assessment
    3.3.2 Hierarchy Process Structure and Consistency Matrix
    3.3.3 FAHP-Based Weights Assessment
    3.4 Conclusion
    References
    Chapter 4 Basic Security-Utility and Game Analysis in Contents Acquisition Scenario
    4.1 DRM Typical Security Policies
    4.1.1 Typical Security Policy Set
    4.1.2 Security Policies Relativity
    4.2 Security Utility Analysis
    4.2.1 Payoff Functions of Security Policies Combinations
    4.2.2 Utility-Factors Weights Assessment and Calculation
    4.3 Non-Cooperative Game on Typical Policies Set
    4.3.1 A Non-Cooperative Game Model
    4.3.2 Nash Equilibriums and Conditions
    4.3.3 Swarm Simulations and Discussions
    4.4 Cooperative Game for Typical Policies
    4.4.1 Security Benefits Super-Additiontivity and Convexity
    4.4.2 Establishment of Multi-Participant Cooperation
    4.5 Conclusion
    References
    Chapter 5 Dynamic Mixed Game Analysis of Security Policies in Contents Sharing Scenario
    5.1 Rights Delegation and Transfer for Contents Sharing
    5.2 Dynamic and Mixed Game for Contents Sharing
    5.2.1 Rights Sharing Tree and DMG
    5.2.2 An Algorithm for DMG
    5.3 Swarm-Based Simulation Experiments
    5.3.1 Basic Simulation Environment and Procedure
    5.3.2 Simulations Experiments on Different Sharing Modes
    5.4 Conclusion
    References
    Chapter 6 DRM Risk Management
    6.1 Risk Utility of Security Policy
    6.1.1 Security Risk Management and Utility Category
    6.1.2 Pros and Cons of Qualitative and Quantitative Assessments
    6.1.3 An Analytic Approach to Risk-Controlled Utility
    6.2 Risk-Controlled Utility Analysis and Business Model
    6.2.1 Risk Utility of TC-Enabling Security Policy
    6.2.2 Sharing Modes and Maximum Benefits of Contents Purveyor
    6.2.3 Simulation Experiments
    6.2.4 Related Discussions and Business Model
    6.3 Conclusion
    References
    Chapter 7 DRM Application Case for Digital Home Network
    7.1 A DRM Usage Control Model for Digital Home Network
    7.1.1 Formalized Role-based,Cross-Domain Usage Control Model for DHN
    7.1.2 Visual Modeling of the RCDUCM for DHN
    7.1.3 An Application Case of the RCDUCM for DHN
    7.2 A Novel Approach to Digital Contents Sharing for Digital Home Network
    7.2.1 Background and Motivation
    7.2.2 Classification of Roles and Distribution of Permissions for DHN
    7.2.3 A Novel Approach to Digital Contents Sharing for DHN
    7.2.4 Analysis of Performance and Security
    7.3 A Novel DRM Security Scheme and Its Prototype System Implementation
    7.3.1 DRM System Architecture
    7.3.2 DRM System Security Mechanism
    7.3.3 Playback Control Based on Cryptography and License
    7.3.4 Implementation of DRM Prototype System
    7.4 Conclusion
    References
    Chapter 8 Further Works and Open Issue
    8.1 Further Works
    8.2 Trust Evaluation in Multimedia Social Network
    8.2.1 Introduction
    8.2.2 Advance on Trust Evaluation in Social Networks
    8.3 Open Issue and Topics
    8.4 Conclusion
    References
    Appendix A
    Appendix B
    Acknowledgments
帮助中心
公司简介
联系我们
常见问题
新手上路
发票制度
积分说明
购物指南
配送方式
配送时间及费用
配送查询说明
配送范围
快递查询
售后服务
退换货说明
退换货流程
投诉或建议
版权声明
经营资质
营业执照
出版社经营许可证