用户名: 密码: 验证码:
数据库权益管理模式及应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息技术和网络技术的飞速发展,电子商务和电子政务新业务不断涌现,以高速互联网络、无线移动通信网络和云计算正逐渐应用于人们的工作生活领域,用户通过各种接入方式能够便利地在任何时间、任何地点获取和使用数字资源。数据库作为数字资源的载体,正在成为经济、政务、国防等领域的信息基础设施。数据库中存储的信息经过长期积累和整合蕴含着丰富价值,且通过对数据库中数据的分析研究,有利于开发新的产品,延伸客户的产业链,辅助行业组织做出正确决策,对国家的政治发展和经济建设具有重要意义。
     如今,多样化的数据库产品推动数据库应用领域不断拓宽,成为数据库产业发展的助推器。然而,开放互联网中,授权用户无意或有意地对有价值的数据库资源进行任意的复制和粘贴,以几何级速度进行二次传播,给数据库权益拥有者造成巨大经济损失;非授权用户恶意窃取或删改客户信息和商业情报,廉价地复制和使用数据库资源,侵犯了权利持有人和消费者的权益,挫伤了原创者的积极性;局域网内部,大量涉及机密信息的数据库资源采用电子文档形式进行传输和存储,很容易造成重要内容泄密;数据库开发过程中,为了满足消费者持续增长的需求,越来越多的组织和个体将自己的软硬件维护与升级等服务等数据库业务外包给数据库服务提供者运行,给数据库及其数字资源带来了新的安全问题和权益问题。面对多元化的数据库资源使用环境,相关知识产权保护的主体、客体及权利变得更加丰富和复杂,知识产权保护形式与数据库资源传播和利用之间的矛盾更加尖锐。数据库权益管理成为至关重要的课题。
     目前有关数据库权益管理的研究主要以法律领域的数据库著作权、计算机领域的数字权益管理和数据库安全为主。在法律范畴内,给予了数据库独创性数据库通常意义上的法律保护,给予了不具有独创性数据库“特殊权利”保护。但是,两者均从数据库投资者的利益出发,忽视了社会公众的权益,某种程度上限制了数据库资源的自由流通,甚至会造成垄断。数字权益管理针对特定的数字资源进行权利描述和执行,但是在数据库产品的使用和管理过程中,用户需要频繁地在不同场合使用不同来源、不同格式、不同使用规则的数字资源,现有权利描述模型互操作性不足,阻碍了权益管理系统的互通互联。数据库安全方面的研究过多地考虑在封闭系统中的数据完整性、机密性和可用性,一旦数字资源下载到客户端,就失去了对它的保护,且授权发生在用户使用数据资源之前,对用户活动过程难以监控,缺乏对数据库资源的持久性保护。因此,迫切需要从法律、管理和信息技术等多个领域出发,构建数据库产业良性发展的环境。
     本文综合运用管理学和计算机领域的理论作指导,重点研究数据库权益管理的权利描述、数据库的资源使用控制、数据库的委托授权管理和通用数据库权益管理体系结构等问题,在深入分析现有技术、标准和系统的基础上,提出了若干新的思想和方案来解决数据库权益管理的应用问题。论文工作主要包括五个方面,其中第2点至第5点是本文的创新点:
     1)对数据库权益管理的研究对象进行详细定义,分析数据库权益管理需求及其相关领域国内外研究现状,形成数据库权益管理理论基础。首先给出数据库主体、数据库客体、数据库权益、数据库权益管理等定义,明确本文研究内容和技术路线。然后,在相关文献资料查阅和数据收集基础上,针对知识产权保护、数字权益管理和数据库安全等进行国内外研究进展分析,探讨已经取得的成果和存在的问题,为数据库权益管理研究提供理论基础。
     2)提出数据库的权利描述模型DBRE (Database Right Expression)。明确数据库权利描述的需求,确定数据库权利描述对象的粒度,建立权利管理应用标识来唯一确认数据库对象;抽象出数据库权利描述模型中各个实体及其联系,将约束从条件中独立出来,建立一套针对数据库的通用合理的权益描述规则和方法;建立数字许可证,定义对于某一数据库资源实施访问的特定主体的权利授予,根据已经确认的使用者身份和数据库对象标记,从许可证中解析出当前时刻的合法权利;为不同权利描述语言的许可证之间的映射提供一种解决方案,针对不同数据库资源各自独立许可证组合的要求,满足了组合产品的最终许可证的互操作性问题。
     3)提出基于角色的数据库资源使用控制模型RBUC (Role Based Usage Control)。确保使用控制的决策连续性和属性可变性。明确数据库资源使用控制的需求,根据数据库权利描述模型,扩展使用控制核心模型,设置授权规则、义务、条件和约束等限制,扩展出活动属性,确保数据库资源使用的全过程只有合法授权用户被授予权利和进行活动;将权利授予与权利撤消分离,根据使用决策,可以在使用前、使用中或者使用后撤销不符合规则的权利,解决数据库资源使用过程中决策连续性问题;主体和客体的属性可以根据使用情况而改变,进而影响使用决策,实现属性可变性,避免了主体无限次地使用对客体的权利;纳入了角色管理的思想,增强用户管理和权利分配的灵活性。
     4)在RBUC模型基于角色部分提出委托授权模型,并加入时间限制。设计了角色树及其对应的授权链,解决数据库系统授权过程中分级委托功能;做时间约束的扩展,充分考虑随时间变化而引起模型的动态变化,并增加了角色互斥约束、部分委托约束、依赖委托约束等,支持基于角色使用控制环境下委托授权的限制功能;数据库用户可以通过获得委托角色来使用数据库资源,通过动态授予或撤销委托角色的方法来解决用户数量相对较多而委托角色数量相对较少的矛盾;定义了委托凭证完整地表达委托需求,在此基础上提出了一套委托授权执行规则,实现数据库系统授权管理的灵活性。
     5)提出通用的分层数据库权益管理体系结构模型,设计了面向云计算的数据库权益管理原型系统。明确数据库权益管理系统的需求,构建了分层数据库权益管理体系结构,支持数据库及其数字资源在生产、传播、销售、使用过程中整个生命周期内的合理使用;面向云计算环境构建了基于私有云的数据库权益管理原型系统,解决权益管理系统间互操作性、灵活性和持久保护性问题,以适应用户跨平台跨系统的需求,增强用户的满意度。
     本文针对数据库的权利描述、资源使用控制、委托授权管理、通用体系结构等方面进行研究,解决网络环境下数据库权利描述及其互操作性、使用过程中权利连续性和属性可变性、数据库系统授权管理灵活性等问题,用以保证数据库资源在整个生命周期内的合法使用,平衡数据库产业链中各个权利人的利益和需求,以期对数据库权益管理的理论发展和实际运作有所裨益。
With the rapid development of the information technology and network technology, the new business of electronic commerce and the electronic government are constantly emerging, and high-speed internet, wireless mobile communication network and cloud computing are gradually applied in people's work and life domain. The digital resources can be accessed conveniently through various methods whenever and wherever. As the carrier of digital resources, database is to become the information infrastructure of economic, government, national defense and other areas. Through long-term accumulation and integration, the rich value is contained in databases and the analysis of the data in the database are useful for the development of new products, extending the customer chain, decision making for the industry organization. It is significant for the country's political and economic construction.
     Nowadays, database application fields have been promoted to expand by the diversity of database products, which become boosters of the database industry. However, in an Open Network Environment, the valuable resources in databases are often duplicated and pasted, and then are spread at tremendous speed by the authorized users accidentally or intentionally whose behaviors cause huge economic losses. At the same time, the unauthorized users steal or deleted customer information and business intelligence maliciously, which results in the cheap use and copy of the database. The interests of the right holders and customers are infringed, and the enthusiasms of originators are dampened. In LAN, a large number of confidential database resources are transferred and stored in the form of electronic documents, which provide the chances for the information leak. During the process of the database development, more database services of organizations and individuals on software and hardware are outsourced to the database service provider to meet consumers' growing demand, which lead to new problems of security, rights and interests. Facing the application environment of diversified database resources, the subjects, objects and rights of intellectual property rights protection become more various and complex, and conflicts between the form of intellectual property rights protection and the usage and spread of the database resources become more violent. It is important to conduct research on database rights management.
     In view of existing research field, the law of database copyright, digital rights management and the database security are related to the database rights management. In the legal category, original database is protected by the common law and non-original database is sheltered by "special rights". Both support the interests of investors and ignore the social the public's rights and interests. The free flow of information is limited, and to some degree, the digital-resource markets even be monopolized. Digital rights management provides the digital rights expression and enforcement for certain digital resources. However, during the process of usage and management, the database resources with different sources and different format will be used frequently in different situations following different rules. The existing rights expression model is lack of interoperability, which hinders the communication development of rights management system. The database security focuses on data integrity, confidentiality and usability in a closed system. Once the digital resources have been downloaded to the client, its protection is lost. Furthermore, the permission is authorized before the user acts on the resources. It is hard to monitor the user' behavior and decrease the persistent protection for the database resources. Thus, the urgent need is put forward to construct good development environment for database industry with the comprehensive consideration of the law field, management as well as information technology.
     This paper is directed by the theories of management and computer science. Database rights expression, usage control on digital resources in database, delegation authorization management and layered architecture for database rights management are emphasized. Some new ideas are put forward base on the thorough analysis of existing technology, standard and rights management system as solutions to the application of the database rights management. Main work in this paper is divided into five parts where the points 2 to 5 are the contribution of this research, shown as following:
     1) Definitions to the research objects on database rights management in detail are given, and the theoretic base to database rights management is formed by the analysis of this study in China and abroad the requiremcnt of database rights management. First, the definitions of subject, object, rights and rights management of database are provided, and the purpose of this paper and the technology route are established. Then, based on the related literature reviewing and data collection, the research progress of the law for intellectual property protection, digital rights management and the database security are discussed. The achievements and problems of them have been put forward. the theoretic base to database rights management is provided.
     2) A database rights expression model (DBRE) are proposed, and an idea to solve the interoperability between database rights management is presented. First, the requirements of database rights expression are fixed. Second, both the object size of database rights expression and the database object identification are defined. Third, the entities of database rights expression are abstracted and the relationships between them are described. At the same time, the constraint entity is Isolated from condition entity and a set of reasonable expression rules and methods are established. Forth, digital license as a carrier of rights expression is built which gives the description of the rights and its grant for particular subject to use particular object according to the subject's identity and database objects. The legal right of certain moment can be interpreted. At last, for the mapping between different language licenses, an idea is put forward to solve interoperability and guarantee satisfaction to the decomposition and combination requirements of independent licenses.
     3) A role based usage control model (RBUC) is proposed to realize decision continuity and Attribute mutability. First, the requirements of usage control on database resources are fixed. Second, the core model is extended according to the entities in database rights expression model, based on which the user action attribute is added, to ensure that only authorized users can use the corresponding database resources during the usage. Third, the authorization and the revocation are separated from each other in this model. According to the usage decision, the rights can be revoked before usage, during usage or after usage which settle the problem of decision continuity. The attributes of subjects and objects are allowed to vary before usage, during usage or after usage. These changes affect usage decision in turn to avoid the infinite usage on the objects. Besides above, the idea of role management enhances the flexibility of user management and right distribution.
     4) An idea of authorization delegation is employed and time limit is added in RBUC model to solve the problem of the multi-step delegation. The role tree and the corresponding right spread chain are designed to realize authorization delegation function. Then, to consider dynamic changes caused by the time changes, the time limit as one of constraints is added. At the same time, the exclusive role constraints, the partial delegation constraints and delegation dependencies constraints are used to support the constrained delegation. Database users can use database resources through the delegated role and can be granted or revoked the delegated role dynamically which solve the weakness of a large number of users with a small number of roles. Furthermore, delegation certification is defined to express the requirement of delegation, based on which, a set of complete executive rules are proposed to realize the flexibility of authorization management system for database.
     5) A layered architecture for database rights management system is proposed and a prototype database rights management system is designed facing cloud computing. The requirements of database rights management system are confirmed. With the limitation shared by all current digital rights management systems being pointed out, a four-layer architecture is proposed and layers are defined, which support the reasonable usage of database resources during its whole life cycle such as production, distribution and sales. Facing the cloud computing environment, a prototype database rights management system is built based on private cloud to solve the problems of interoperability, flexibility and persistence between systems and meet the needs of users across the cross-platform and customer satisfaction.
     Research on rights expression, usage control and authorization management for database are studied in this paper to realize the interoperability across systems, decision continuity, attributes variation and the flexibility of authorization management. The legitimate use during the database lifecycle is ensured and the various interests of right holders in industry chain are balanced. The theoretical value and actual value of this paper is expected to bring benefit for future research on database rights management.
引文
[1]Afonso Araujo Neto, Marco Vieira, Henrique Madeira. An Appraisal to Assess the Security of Database Configurations:IEEE Computer Society,2009,73-80
    [2]M. Campidoglio, F. Frattolillo, F. Landolfi. The Copyright Protection Problem:Challenges and Suggestions,2009,522-526
    [3]Chuanfu Chen. Issues on Database Copyright Criteria and their Solutions:IEEE Computer Society,2008,509-512
    [4]谢琳惠.我国数据库产业的现状、问题及对策.中国图书馆学报,2007(5):93-94
    [5]李伟红.数据库相关权益主体的权利与义务分析.:黑龙江大学黑龙江大学,2004
    [6]温芽清.我国数据库产业的发展政策与制度保护.河北经贸大学学报,2009(4):31-34
    [7]Tim Finin, Anupam Joshi, Hillol Karguptaet al. Assured information sharing life cycle. Richardson, Texas, USA:IEEE Press,2009,307-309
    [8]Y. S. Luo, Q. Zhu, J. J. Le. A structure of risk management for digital rights,2007,753-758
    [9]骆轶妹,乐嘉锦,朱勤.三层数据权益管理体系结构的建立.微型电脑应用,2007(04)9-11
    [10]俞银燕,汤帜.数字版权保护技术研究综述.计算机学报,2005(12):1957-1968
    [11]Huang Yi, Ma Xinqiang. A Security Model Based on Database System,2010,4954-4957
    [12]田秀霞,王晓玲,高明等.数据库服务——安全与隐私保护.软件学报,2010(5):991-1006
    [13]朱勤,陈继红,乐嘉锦.基于数字水印的外包数据库查询验证.计算机应用,2008(3):605-608
    [14]M. E. Bordal. Digital Rights Protection - a Great Challenge of the New Millennium. TELSIKS 2005, Serbia and Montenegro, Nis,2005,207-214
    [15]袁晔.数字图书馆信息资源建设中的知识产权保护.上海交通大学学报,2003(S1):283-286
    [16]刘小波.网络环境下科技信息资源共享的内容安全问题研究.现代情报,2010(1):166-169
    [17]F. S. Grodzinsky, M. C. Bottis. Private use as fair use:is it fair? ACM SIGCAS Computers and Society,2007,37 (2):11-24
    [18]Peter J. Denning. Network laws. Communications of the ACM,2004,47 (11):15-20
    [19]E. Watanabe, L. Kitabayashi, T. Takahashiet al. Copyright contents management on the Internet, 2010,401-405
    [20]Pamela Samuelson. DRM{and, or, vs.} the law. Communications of the ACM,2003,46 (4): 41-45
    [21]Huijia Xie. Protecting fair use from digital rights management in china. Alexandria, Virginia, USA:ACM,2007,33-38
    [22]熊琦.著作权法中投资者视为作者的制度安排.法学,2010(9):79-89
    [23]王雅华.数字信息作品著作权保护中的法律问题探讨.图书馆工作与研究,2010(10):24-26
    [24]雷山漫.网络环境下著作权刑法保护研究.法学评论,2010(6):105-112
    [25]李小侠.试析数据库的邻接权保护.北京邮电大学学报(社会科学版),2010(2):24-27
    [26]李星红.论数据库的著作权保护:[硕士学位论文].:对外经济贸易大学,2003
    [27]张静.保护数据库必要性之初探.法制与社会,2010(3):269
    [28]吴晓明.非独创性数据库法律保护方式探析.商业时代,2010(12):90-91
    [29]刘梅.国内外数据库权益保护模式比较研究.图书馆学研究,2009(8):94-97
    [30]张晓琳.数据库的特别权利保护制度研究.图书馆,2009(4):62-64
    [31]王嵘,陈蔚丽.网络环境下数据库知识产权问题及对策.科技管理研究,2008(2):220-221
    [32]俞银燕,汤帜.数字版权保护技术研究综述.计算机学报,2005(12):1957-1968
    [33]裴庆祺,高铭鼎,范科峰.数字电视领域的数字版权保护技术标准综述.信息技术与标准化,2007(4):33-37
    [34]郭德华.国外标准版权保护措施及对我国的启示.世界标准化与质量管理,2005(2):9-11
    [35]Peng Zou, Chaokun Wang, Zhang Liuet al. A cloud based SIM DRM scheme for the mobile internet. Chicago, Illinois, USA:ACM,2010,759-761
    [36]Gregory L. Heileman, Pramod A. Jamkhedkar, Joud Khouryet al. The drm game. Alexandria, Virginia, USA:ACM,2007,54-62
    [37]Pramod A. Jamkhedkar, Gregory L. Heileman, Chris C. Lamb. An interoperable usage management framework. Chicago, Illinois, USA:ACM,2010,73-88
    [38]Yung-Ming Li, Chia-Hao Lin. Pricing digital content with DRM mechanism. Minneapolis, MN, USA:ACM Press,2007,433-440
    [39]Marc Fetscherin. Economics of online music and consumer behavior. Fredericton, New Brunswick, Canada:ACM Press,2006,599-604
    [40]周四清,曾霞.柔性数字版权管理的博弈建模分析.经济前沿,2009(7):58-64
    [41]Radia Perlman, Charlie Kaufman, Ray Perlner. Privacy-preserving DRM. Gaithersburg, Maryland: ACM,2010,69-83
    [42]Jaime Delgado, Eva Rodriguez, Silvia Llorente. User's privacy in applications provided through social networks. Firenze, Italy. ACM,2010,39-44
    [43]黄铁军.AVS数字媒体版权管理标准.中国数字电视,2007(6):46-49
    [44]黄铁军,高文.卫星直播信源编码标准AVS.卫星电视与宽带多媒体,2007(22):43-46
    [45]高文,黄铁军.数字音视频产业的共性基础标准AVS.中国传媒科技,2006(11):33-35
    [46]黄铁军,蓝娟,曲俊华等.广播影视的数字版权管理及其需求.广播与电视技术,2005(8):29-32
    [47]高文,黄铁军.信源编码标准AVS及其在数字电视中的应用.电视技术,2003(11):4-6
    [48]刘清堂,杨宗凯.资源的数字权利保护机制研究.计算机科学,2005(10):80-83
    [49]马兆丰,冯博琴,宋擒豹等.基于动态许可证的信任版权安全认证协议.软件学报,2004(01):131-140
    [50]张茹,杨瑜,张啸.数字版权管理.北京:北京邮电大学出版社,2008
    [51]刘清堂.标准化教育资源版权保护机制研究:[博士学位论文].:华中科技大学,2005
    [52]William Rosenblatt, Stephen Mooney, William Trippe. Digital Rights Management:Business and Technology.
    [53]Donghyun Choi, Sungkyu Cho, Dongho Wonet al. Protection Profile for Connected Interoperable DRM Framework:Springer-Verlag,2009,320-332
    [54]F. Frattolillo, F. Landolfi, F. Marulli. A Novel Approach to DRM Systems:IEEE Computer Society,2009,492-497
    [55]Sanjay Banerjee, Sunil Karforma. A prototype design for DRM based credit card transaction in E-commerce. Ubiquity,2008,2008 (May):1
    [56]Franco Frattolillo, Federica Landolfi. Designing a DRM System:IEEE Computer Society,2008, 221-226
    [57]Frank Hartung, Sinan Kesici, Daniel Catrein. DRM protected dynamic adaptive HTTP streaming. San Jose, CA, USA:ACM,2011,277-282
    [58]Jungsoo Lee. P2P based private broadcasting DRM system. Gangwon-Do, South Korea:IEEE Press,2009,2337-2339
    [59]向宏,周贤林,徐光侠.DRM技术在电子文档安全保护中的研究与应用.计算机时代,2006(11):24-26
    [60]司端锋,王益冬,潘爱民等.多媒体数字版权保护系统的研究与实现.北京大学学报(自然科学版),2005(5):792-799
    [61]汤帜,俞银燕.DRM串起了内容产业链,2005
    [62]徐泽兰,刘清堂,王淑娟.数字权利描述语言互操作研究.计算机工程与设计,2009(24):5570-5572
    [63]Yi Zhang, Xiaoguang Wei, Shu Zhao. Research on ODRL Connecting with Application Scenarios: IEEE Computer Society,2008,261-264
    [64]范晓燕,周季峰.基于权限描述语言的数字版权管理机制.淮阴师范学院学报(自然科学版),2006(2):151-157
    [65]Y. S. Luo, J. Huang, J. J. Le. Rights Expression In Database Rights Management Based On XrML.2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 4, PROCEEDINGS, 2009:333-336
    [66]Joseph Y. Halpern, Vicky Weissman. A formal foundation for XrML. Journal of the ACM (JACM),2008,55 (1):1-42
    [67]Pramod A. Jamkhedkar, Gregory L. Heilema, Ivan Martonez-Ortiz. The problem with rights expression languages. Alexandria, Virginia, USA:ACM Press,2006,59-68
    [68]Nicholas Paul Sheppard, Reihaneh Safavi-Naini. On the operational semantics of rights expression languages. Chicago, Illinois, USA:ACM,2009,17-28
    [69]Yuzhong Qu, Xiang Zhang, Huiying Li. OREL:an ontology-based rights expression language. New York, NY, USA:ACM Press,2004,324-325
    [70]C. N. Chong, R. Corin, S. Etalleet al. LicenseScript:a novel digital rights language and its semantics,2003,122-129
    [71]Tie-Jun Huang, Yong-Liang Liu. Basic considerations on AVS DRM architecture. Journal of Computer Science and Technology,2006,21 (3):366-369
    [72]Xin Wang, Guillermo Lao, Thomas DeMartiniet al. XrML -- extensible rights Markup Language. Fairfax, VA:ACM Press,2002,71-79
    [73]李广磊,沙瀛,牛振东.XrML验证器的设计与实现.现代图书情报技术,2005(3):7-10
    [74]韩立龙,刘清堂,杨宗凯.基于证书修改的数字权限动态描述.计算机应用研究,2009(3):1071-1072
    [75]钟勇,张宏,刘凤玉等.一种基于逻辑框架的数字版权管理机制和实现.计算机研究与发展,2010(2):223-230
    [76]叶松,于志强,唐凌等.AVSDRM标准在IPTV中的应用研究.现代电子技术,2010(3):40-43
    [77]Ton Kalker. DRM Interoperability:IEEE Computer Society,2007, xxiii
    [78]Ton Kalker. On interoperability of DRM. Alexandria, Virginia, USA:ACM Press,2006,45-46
    [79]朱勤,骆轶姝,乐嘉锦.数据库加密与密文数据查询技术综述.东华大学学报(自然科学版),2007(04):543-548
    [80]Pascal Junod, Alexandre Karlov. An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies. Chicago, Illinois, USA:ACM,2010,13-24
    [81]Jeffrey B. Lotspiech. Broadcast encryption versus public key cryptography in content protection systems. Chicago, Illinois, USA:ACM,2009,39-46
    [82]Jungsoo Lee. P2P based private broadcasting DRM system. Gangwon-Do, South Korea:IEEE Press,2009,2337-2339
    [83]Benoit Libert, Jean-Jacques Quisquater, Moti Yung. Key Evolution Systems in Untrusted Update Environments. ACM Transactions on Information and System Security (TISSEC),2010,13 (4): 1-34
    [84]Davide Alessio, Marc Joye. A simple construction for public-key encryption with revocable anonymity:the honest-sender case. Chicago, Illinois, USA:ACM,2009,11-16
    [85]Aggelos Kiayias, Serdar Pehlivanoglu. On the security of a public-key traitor tracing scheme with sublinear ciphertext size. Chicago, Illinois, USA:ACM,2009,1-10
    [86]Edna Milgo. A secure unidirectional proxy re-encryption using identity and secret key exchange. Clemson, South Carolina:ACM,2009,1-5
    [87]Sung Jin Lim, Hae-Min Moon, Yongwha Chunget al. A study on the digital watermarking technique for JPEG 2000. Daejeon, Korea:ACM,2009,95-101
    [88]Tony Thomas, Sabu Emmanuel, Amitabha Daset al. A CRT based watermark for multiparty multilevel DRM architecture. New York, NY, USA:IEEE Press,2009,1010-1013
    [89]ZHU Qin, YANG Ying, LE Jia-jinet al. Watermark Based Copyright Protection of Outsourced Database:IEEE Computer Society,2006,301-308
    [90]Q. Zhu, Y. Yang, J. J. Leet al. Watermark based copyright protection of outsourced database, 2006,301-305
    [91]朱勤.基于数字水印的外包数据库内容保护技术研究:[博士学位论文].:东华大学,2007
    [92]Alapan Arnab, Andrew Hutchison. Fairer usage contracts for DRM. Alexandria, VA, USA:ACM Press,2005,1-7
    [93]John S. Erickson. Fair use, DRM, and trusted computing. Communications of the ACM,2003, 46 (4):34-39
    [94]Edward W. Felten. A skeptical view of DRM and fair use. Communications of the ACM,2003, 46 (4):56-59
    [95]Yu-Yi Chen, Yao-Jen Wang, Cheng-Jie Chen. A Fair-Use DRM System Based on Web Service: IEEE Computer Society,2008,11-16
    [96]Ravi Sandhu, John Campbell. Open issues in database security. Como, Italy:Chapman & Hall, Ltd.,1997,169-173
    [97]David Elliott Bell. Looking Back at the Bell-La Padula Model:IEEE Computer Society,2005, 337-351
    [98]Mingxi Zhang. Strict Integrity Policy of Biba Model with Dynamic Characteristics and its Correctness:IEEE Computer Society,2009,521-525
    [99]Dorothy E. Denning, Teresa F. Lunt, Roger R. Schellet al. The SeaView security model. Oakland, California:IEEE Computer Society,1988,218-233
    [100]王艺超,冯玉,王珊.数据库安全评测系统研究.计算机科学,2005(2):5-8
    [101]时杰.关系数据库细粒度访问控制研究:[博士学位论文].:华中科技大学,2010
    [102]Butler W. Lampson. Protection. ACM SIGOPS Operating Systems Review,1974,8 C1):18-24
    [103]G. Scott Graham, Peter J. Denning. Protection:principles and practice. Atlantic City, New Jersey. ACM,1972,417-429
    [104]Ma Xinqiang, Huang Yi, Li Danning. A Security Model Based on Lattice,2010,4958-4961
    [105]Sushil Jajodia, Ravi Sandhu. Toward a multilevel secure relational data model. ACM SIGMOD Record,1991,20 (2):50-59
    [106]R. S. Sandhu, E. J. Coyne, H. L. Feinsteinet al. Role-based access control:a multi-dimensional view,1994,54-62
    [107]鲁剑锋.访问控制策略的安全与效用优化方法研究.:[博士学位论文].:华中科技大学,2010
    [108]Ravi Sandhu. Rationale for the RBAC96 family of access control models. Gaithersburg, Maryland, United States:ACM Press,1996,9
    [109]Roshan Thomas, Elisa Bertino, Pierangela Samaratiet al. Role-based access control and next-generation security models (panel). Rennselaerville, New York, United States:Chapman & Hall, Ltd.,1996,289-298
    [110]Ravi Sandhu, Venkata Bhamidipati, Edward Coyneet al. The ARBAC97 model for role-based administration of roles:preliminary description and outline. Fairfax, Virginia, United States:ACM Press,1997,41-50
    [111]Ravi Sandhu, Qamar Munawer. The ARB AC99 Model for Administration of Roles.,1999:229
    [112]David F. Ferraiolo, Ravi Sandhu, Serban Gavrilaet al. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC),2001,4(3) 224-274
    [113]N. B. Vasilyevna. An RBAC Design with Discretionary and Mandatory Features,2008,260-263
    [114]曾旷怡,杨家海.访问控制列表的优化问题.软件学报,2007(4):978-986
    [115]李立新,陈伟民,黄尚廉.强制访问控制在基于角色的安全系统中的实现.软件学报,2000(10):1320-1325
    [116]李成锴,Dislab. Nju. Edu. Cn,詹永照等.基于角色的CSCW系统访问控制模型.软件学报,2000(7):931-937
    [117]钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用.软件学报,2000(6):779-784
    [118]邓集波,洪帆.基于任务的访问控制模型.软件学报,2003(1):76-82
    [119]黄建,卿斯汉,温红子.带时间特性的角色访问控制.软件学报,2003(11):1944-1954
    [120]杨秋伟,洪帆,杨木祥等.基于角色访问控制管理模型的安全性分析.软件学报,2006(8):1804-1810
    [121]封富君,李俊山.新型网络环境下的访问控制技术.软件学报,2007(4):955-966
    [122]Xinwen Zhang, Ravi Sandhu, Francesco Parisi-Presicce. Safety analysis of usage control authorization models. Taipei, Taiwan:ACM,2006,243-254
    [123]张志勇,牛丹梅.数字版权管理中数字权利使用控制研究进展.计算机科学,2011(4)48-54
    [124]钟勇,秦小麟,郑吉平等.一种灵活的使用控制授权语言框架研究.计算机学报,2006(8):1408-1418
    [125]钟勇,郭伟刚,林冬梅等.应用于数字内容使用控制的支付模型研究.计算机工程与应用,2009(17):73-79
    [126]崔永泉,洪帆,龙涛等.基于使用控制和上下文的动态网格访问控制模型研究.计算机科学,2008(2):37-41
    [127]崔永泉,洪帆,付才等.多主体多方向的可管理使用控制模型研究.计算机工程与科学,2008(3):130-132
    [128]王兆祥,郭义喜.使用控制模型在DRM中的应用.微计算机信息,2007(3):74-75
    [129]张维勇,梅勃,聂丽平.基于使用控制模型的数字版权管理应用研究.合肥工业大学学报(自然科学版),2008(2):175-178
    [130]李沛武.使用控制授权模型的Petri网描述.计算机工程,2008(3):196-198
    [131]徐长征,王清贤.基于动态属性的域间使用控制模型研究.计算机科学,2009(12):73-75
    [132]石伟丞,谭良,周明天.具有特征判断能力的使用控制模型研究.计算机科学,2010(6)86-90
    [133]熊君玉.电子数据库的法律保护模式探析.法制与社会,2010(31):262-263
    [134]Yuan-Kang Wang, Akiko Seki, Wataru Kameyama. Extended rights vocabulary for authoring tools interoperability. Kunming, Yunnan, China:ACM,2009,238-243
    [135]Kefeng Fan, Subing Zhang, Zhen Yang. A Novel Usage Control Protocol Model for DRM System:IEEE Computer Society,2010,513-516
    [136]Xinwen Zhang, Masayuki Nakae, Michael J. Covingtonet al. Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Transactions on Information and System Security (TISSEC),2008,11 (1):1-36
    [137]Jaehong Park, Ravi Sandhu. Towards usage control models:beyond traditional access control. Monterey, California, USA:ACM Press,2002,57-64
    [138]孙辉,刘健辉.数字权益描述语言比较研究.情报杂志,2008(10):110-112
    [139]屈振新.政务信息系统语义互操作研究:[博士学位论文].:武汉大学,2010
    [140]侯婷.基于DREL标准的数字版权管理系统的研究与设计:[硕士学位论文].:华中科技大学,2008
    [141]王嫒.数字音视频内容权利描述标准的研究与应用:[硕士学位论文].:华中科技大学,2007
    [142]吴砥,金晶,王媛等.学习资源的权利描述和执行机制的研究.计算机工程与科学,2006(10):35-37
    [143]Feng Hui, Shi Wenchang, Liang Zhaohuiet al. On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study,2011,65-70
    [144]Fan Kefeng, Zhang Subing, Yang Zhen. A Novel Usage Control Protocol Model for DRM System,2010,513-516
    [145]王兆祥.基于角色的使用控制模型研究:[硕士学位论文].:解放军信息工程大学,2006
    [146]Y. S. Luo, Kang J. Internal Quality Management in Graduate Student Recruitment Based on Control Theory. Proceedings of the Third International Conference on Education Management Science and Engineering,2010:139-143
    [147]骆轶妹,康健,乐嘉锦等.层次分析法在全日制硕士研究生招生计划分配中的应用.东华大学学报(自然科学版),2010(06):686-690
    [148]骆轶妹,乐嘉锦.论硕士研究生招生的质量管理.纺织教育,2009(12):44-46,59
    [149]黄建,卿斯汉,温红子.带时间特性的角色访问控制.软件学报,2003(11):1944-1954
    [150]刘正涛,毛宇光,王建东等.基于角色的层次受限委托模型.电子科技大学学报,2010(1):114-118
    [151]徐震,李斓,冯登国.基于角色的受限委托模型.软件学报,2005(5):970-978
    [152]徐震.支持多策略的安全数据库系统研究:[博士学位论文].:中国科学院研究生院(软件研究所),2005
    [153]陈志刚,桂劲松,郭迎.基于层次角色委托的服务网格授权执行模型.软件学报,2009(9):2495-2510
    [154]桂劲松,陈志刚,刘安丰等.基于层次角色的受限委托模型及模拟分析.系统仿真学报,2009(03):802-808
    [155]魏永合,王成恩,马明旭.工作流系统中的委托授权机制研究.计算机集成制造系统,2009(1):160-165
    [156]张志勇,黄涛.信任管理中基于角色的委托授权研究进展.计算机应用研究,2008(6):1601-1605
    [157]K. Hasebe, M. Mabuchi. Capability-Role-Based Delegation in Workflow Systems,2010,711-717
    [158]黄建,卿斯汉,温红子.带时间特性的角色访问控制.软件学报,2003(11)
    [159]Elisa Bertino, Piero Andrea Bonatti, Elena Ferrari. TRBAC:A temporal role-based access control model. ACM Transactions on Information and System Security (TISSEC),2001,4 (3): 191-233
    [160]Zhang Dong-Wen, Pei Xing, Qiu Ji-Qinget al. A delegation model for time constraints-based TRBAC,2009,2027-2032
    [161]马晓亭,陈臣.云安全2.0技术体系下数字图书馆信息资源安全威胁与对策研究.现代情报,2011(3):62-66
    [162]张泽华.云计算联盟建模及实现的关键技术研究:[博士学位论文].:云南大学,2010
    [163]F. Salim, N. P. Sheppard, R. Safavi-Naini. A Rights Management Approach to Securing Data Distribution in Coalitions,2010,560-567
    [164]David W. Chadwick, Stijn F. Lievens, Jerry I. den Hartoget al. My Private Cloud Overview:A Trust, Privacy and Security Infrastructure for the Cloud,2011,752-753
    [165]Anil L. Pereira. RBAC for High Performance Computing Systems Integration in Grid Computing and Cloud Computing,2011,914-921
    [166]Ravi Sandhu, Raj Boppana, Ram Krishnanet al. Towards a discipline of mission-aware cloud computing. Chicago, Illinois, USA:ACM,2010,13-18

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700