数字版权管理关键技术及应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字媒体内容保护的对象通常包括文本、图像、音频、视频等媒体介质。数字技术的迅速发展和广泛应用,互联网、电信移动网络等新兴传输方式和手机、机顶盒、电脑等多媒体终端极大地拓展了数字媒体内容的传输范围。由于数字媒体具备易于无损复制、分发等特性,借助数字技术和互联网随意批量复制和发行受知识产权保护的数字媒体产品和内容的现象普遍存在。如果缺乏对数字媒体的版权管理和内容保护将导致严重的负面现象,由此滋生的大量盗版及不规范使用行为不但会对数字媒体产业造成巨大的冲击,而且也会对我们的经济、社会和文化造成多重的伤害。目前,数字版权保护方面的问题已经引起了各国政府、法律、媒体和工业等各方的共同关注。实际的经验和近年来的探讨表明,仅凭法律手段难以保护数字内容的版权,相关技术手段也是极其重要的。本文重点研究DRM系统中域管理、接入认证、密钥管理、权限管理等问题,在深入分析现有技术、标准和系统的基础上,提出了若干新的思想和方案来解决DRM系统的应用问题。论文的研究成果主要有:
     1.提出一种新的域管理模型,使得对外能够隐藏域内的组成情况,并且被授权的设备可以为域购买域许可,许可服务器能够验证该设备为某个域的域成员,当域内出现违法设备时,也可以追查出来。
     2.提出了新的用户域中的DRM设备认证方法,能够满足DRM系统在设备间身份认证上的需要,并设计出两套适合DRM系统的接入认证方案,一个是基于PKI的接入认证方案,另一个为基于身份的接入认证方案。
     3.提出了基于秘密共享技术的DRM密钥管理方法,能够在域内有效设备之间合理共享密钥,同时,能够提高密钥的抗毁性,即使部分密钥部件毁坏,也可以正确恢复密钥。为此,还提出一个基于身份的秘密共享方案,一个基于身份可自证实身份的秘密共享方案。
     4.在家庭网络体系结构的基础上提出一种基于PMI的DRM权限管理方案,该方案通过建立权限—属性链(RO-AO)的方式和RBAC管理机制满足了家庭网络的DRM权限管理需求,并根据家庭网络的实际用户类型设计了分级的角色继承模型。
The object of digital media content protection usually includes text, image, audio, video and other mediums. With the rapid development of digital technologies and the extensive applications, the Internet, mobile networks and other emerging telecommunications modes and mobile phones, set-top boxes, computers and other multimedia terminals have greatly expanded the transmission scope of digital media content.
     As the digital medium have the characteristics of being lossless reproduced and distributed, the phenomenon of using digital technology and the internet freely to reproduce and distribute the digital media products and the content protected by intellectual property is widespread. If there is no digital media copyright management and content protection, which will lead to serious negative phenomena, breeding massive piracy and the non-standard use would not only have enormou effect on digital media industry, but also greatly injure our economics, sociality and culture.
     Currently, digital copyright protection issue has caused a common concern from national governments, law, media and industry, and other parties. Practical experience and the study in recent years show that it is not just legal mean to protect the copyright of digital content, and it is extremely important to adopt related technical measures. This paper focuses on the domain management, access authentication, key management, rights management and other issues in DRM system. On the basis of deep analysis of existing technologies, standards and systems, some new ideas and schemes to solve the application problems of DRM system are proposed. The main research results are as follows:
     1. A new domain management model which can hide components within the domain is proposed, and an authorized devices can purchase the domain license for the domain. License server can verify the device whether it is a member of some certain domain. When an illegal device appeared in the domain, it can also be traced .
     2. A new DRM device authentication method in the user domain to meet the authentication requirement between the devices in a DRM system, as well as two access authentication schemes suitable for DRM system are all proposed. One scheme is based on PKI, and the other is based on identity.
     3. A DRM key management method based on secret sharing technology is proposed. It can achieve the reasonable key sharing between the legal devices. Meanwhile, it can improve the survivability of the keys. Even though some keys are damaged, it can also recover the keys correctly. Hence, an identity-based secret sharing scheme and an identity-based identity proving scheme are also proposed.
     4. A PMI-based DRM scheme on the basis of the architecture of home networks is propose, which can meet the demands of the rights management requirement in home networks by establishing RO-AO chain and the RBAC management mechanism. According to the actual user types in home network, a role hierarchy model is designed.
引文
[1]Rosenblatt W.,Trippe W.,Mooney S.Digital Rights Management:Business and Technology.New York:M &T Books,2002.
    [2]Garnett N.Digital right s management,copyright,and napster.ACM SIGecom Exchanges,2001,2(2):1-5.
    [3]Sander T.Good times for digital right s management ? In:Syverson P.F.ed..Financial Cryptography,Lecture Notes in Computer Science 2339,Berlin:Springer-Verlag,2002,55-65.
    [4]Rump N..Definitions,aspect s,and overview.In:Becker E.et al.Digital Right s Management:Technological,Economic,Legal and Political Aspect s,Lecture Notes in Computer Science 2770,Berlin:Springer2Verlag,2003,3-6.
    [5]Dhamija R.,Wallenberg F..A framework for evaluating digital rights management proposals.In:Proceedings of t he 1st International Mobile IPR Workshop:Right s Management of Information Product s on t he Mobile Internet,Helsinki,Finland,2003,13-21.
    [6]Kwok S.H..Watermark-based copyright protection system security.Communications of t he ACM,2003,46(10):98-101.
    [7]Sibert O.,Bernstein D.,Wie D.V..The DigiBox:A self-protecting container for information commerce.In:Proceedings of the 1st USENIX Workshop on Elect ronic Commerce,NewYork,1995,171-183.
    [8]Liu Q.,Safavi2Naini R.,Sheppard N.P..Digital right s management for content dist ribution.In:Proceedings of t he Australasian Information Security workshop Conference on ACSW Frontiers 2003,Aust ralian Computer Society,Adelaide,Australia,2003,49-58.
    [9]Renato Iannella.Digital Rights Management(DRM) Architectures.D-Lib Magazine,2001,3(6):18-23.
    [10]R Iannella,Digital Rights Management(DRM) Architecture.D-Lib Magazine,2001,7(6):6-11.
    [11]范科峰,莫玮,曹山等,数字版权管理技术及应用研究进展,电子学报,2007,35(6):1139-1147.
    [12]Open Mobile Alliance~(TM),OMA DRM Requirements Candidate Version 2.0,OMA-RD-DRM-V2_0-20040715-C.
    [13]Junseok Lee,Seong Oun Hwang,Sang-Won Jeong,Ki Song Yoon,Chang Soon Park,and Jae-Cheol Ryou,A DRM Framework for Distributing Digital Contents through the Internet,ETRI Journal,Volume 25,Number 6,December 2003,423-436.
    [14]Dongkyoo Shin,Junil Kim,and Dongil Shin,A Study on the Digital Right Management of MPEG-4 Streams for Digital Video Library,ICADL 2003,LNCS 2911,444-455.
    [15]Willem Jonker,Jean-Paul Linnartz,Digital rights management in consumer electronics products,IEEE SIGNAL PROCESSING MAGAZINE,MARCH 2004,82-91.
    [16]ROB H.KOENEN,JACK LACY,MICHAEL MACKAY,STEVE MITCHELL,The Long March to Interoperable Digital Rights Management,PROCEEDINGS OF THE IEEE,VOL.92,NO.6,JUNE 2004,883-897.
    [17]Open Mobile Alliance~(TM),OMA DRM Specification Candidate Version 2.0,OMA-DRM-DRM-V2_0-20041210-C.
    [18]刘建伟,王育民.网络安全—技术与实践.北京:清华大学出版社,2005
    [19]Feng Dengguo.Research on theory and approach of provable security.Journal of Software,2005,16(10):1743-1756.
    [20]Cox I J.Secure Spectrum Watermarking for Images,Audio and Video.NJ:NEC Res Inst.,Princeton,1995.
    [21]钮心忻.信息隐藏与数字水印.北京:北京邮电大学出版社,2004.
    [22]ISO/IEC,21000-5,2004,International Standards Organization.Information Technology Multimedia Framework(MPEG-21) Part 5:Rights Expression Language.
    [23]S Craver,N Memon,B L Yeo,and M M Yeung,Resolving rightful ownerships with invisible watermarking techniques:Limitations,attacks and implications.IEEE Journal on Selected Areas in Communications,1998,16(4):573-586.
    [24]Furon T,Duhamel P.An asymmetric watermarking method.IEEE Transactions on Signal Processing,2003,51(4):981-995.
    [25]S Pereira,J J K O Ruanaidh,and T Pun.Secure Robust digital image watermarking using the lapped orthogonal transform.IS&T/SPIE Electronic Imaging,1999,3657(2):21-30.
    [26]S K Warfield,M Kaus,F A Jolesz,R Kikinis.Adaptive,template moderated,spatially varying statistical classification.Medical Image Analysis,2000,4(1):43-55.
    [27]A J Goldstein,L D Harmon,and A B Lesk.Identification of human faces.Proceedings of the IEEE,1971,59(5):748-760.
    [28]A M Eskicioglu.Multimedia security in group communications:recent progress in key management,authentication,and watermarking.ACM Multimedia Systems Journal,Special Issue on Multimedia Security,2003,9(3):239-248.
    [29]Loyalka S,Hamoodi S Poiseuille Flow of a rarefied gas in a cylindrical tube:Solution of linearized Boltzmann equation.Physics of Fluids A:Fluid Dynamics,1990,2(2):2061-2065.
    [30]S Schneider,R Holloway.Using CSP for Protocol Analysis:The Needham-Schroeder Public-Key Protocol.Royal Holloway:University of London,1996,3.104-110.
    [31]Gut h S..Right s expression languages.In:Becker E.et al.Digital Rights Management: Technological,Economic,Legal and Political Aspect s,Lecture Notes in Computer Science 2770,Berlin:Springer2Verlag,2003,101-112.
    [32]俞银燕,汤帜,数字版权保护技术研究综述,计算机学报,2005,28(12):1957-1968.
    [33]Chong C.N.,Corin R.et al.LicenseScript:A novel digital rights language and it s semantics.In:Proceedings of t he 3rd International Conference on Web Delivering of Music,IEEE Computer Society,Los Alamitos,California,2003,122-129
    [34]李新国.数字内容保护系统中的认证和密钥管理技术研究.西安电子科技大学博士学位论文.2006,24-25.
    [35]G.Naumovich,N.D.Memon.Preventing Piracy,Reverse Engineering,and Tampering.IEEE Computer.2003,36(7).64-71.
    [36]Q.Liu,R.Safavi-Naini,N.P.Sheppard.Digital Rights Management for Content Distribution.Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003.Vol.21.49-58.
    [37]F.R.Jason and J.C.William.DRM,Trusted Computing and Operating System Architecture.Proceedings of the 2005 Australasian Workshop on Grid Computing and E-research.ACSW Frontiers'05.Vol.44.127-136.
    [38]F.Koeune and F.X.Standaert.A Tutorial on Physical Security and Side-Channel Attacks.Foundations of Security Analysis and Design Ⅲ:FOSAD 2004/2005.LNCS 3655.78-108.
    [39]Open Mobile Alliance~(TM),OMA DRM Specification Candidate Version 2.0OMA-DRM-DRM-V2_0-20041210-C.http://www.openmobilealliance.org/.
    [40]Open Mobile Alliance~(TM),OMA DRM Specification,OMA-TS-DRM V2_0-20060303-A 2006.3.3.http://www.openmobilealliance.org/.
    [41]域管理系统、建立本地域的方法和获取本地域许可的方法.申请号:200610098590.1.公开号:CN 1878092.http://search.sipo.gov.crdsipo/zljs/hyjs-jieguo.jsp.
    [42]D.Chaum and E.van Heyst.Group signatures.EUROCRPYT1991,LNCS 547.Berlin:Springer-Verlag,1991:257-265.
    [43]L.Chen,T.Pedersen.New group signature schemes.EUROCRYPT 1994,LNCS 950,Berlin:Springer-Verlag,1995:171-181.
    [44]J.Camenisch,M.Stadler.Efficient group signatures schemes for large groups.CRYPTO 1997,LNCS 1294,Berlin:Springer-Verlag,1997:410-424.
    [45]J.Camenisch,M.Michels.A group signature scheme with improved efficiency.ASIACRYPT 1998,LNCS 1514,Berlin:Springer-Verlag,1998:160-174.
    [46]J.Camenisch,M.Michels.Separability and efficiency of generic group signature.CRYPTO 1999,LNCS 1666,Berlin:Springer-Verlag,1999:413-430.
    [47]J.Camenisch.Efficient anonymous fingerprinting with group signatures.ASIACRYPT 2000, LNCS 1976,Berlin:Springer-Verlag,2000:415-428.
    [48]G.Ateniese,J.Camenisch,M.Joye,G.Tsudik.A practical and provably secure coalition-resistant group signature scheme.CRYPTO 2000,LNCS 1880.Berlin:Springer-Verlag,2000:255-270.
    [49]M.Bellare,D.Micciancio,B.Warinschi.Foundations of group signatures:formal definitions,simplified requirements,and a construction based on general assumption.EUROCRPYT 2003,LNCS 2656.Berlin:Springer-Verlag,2003:614-629.
    [50]D.Boneh,X.Boyen,H.Shacham.Short group signatures.CRYPTO 2004,LNCS 3152.Berlin:Springer-Verlag,2004:41-55.
    [51]D.Boneh,H.Shacham.Group signatures with verifier-local revocation.ACM-CCS 2004.ACM Press,2004:168-177.
    [52]B.Waters.Efficient identity-based encryption without random oracles.EUROCRYPT 2005,LNCS 3494.Berlin:Springer-Verlag,2005:114-127.
    [53]G.Ateniese,J.Camenisch,S.Hohenberger,and B.de Medeiros.Practical group signatures without random oracles.Cryptology ePrint Archive,Report 2005/385,2005.http://eprint.iacr.org/2005/385.pdf.
    [54]A.Kiayias,M.Yung.Group signatures with efficient concurrent join.EUROCRYPT 2005,LNCS 3494,Berlin:Springer-Verlag,2005:198-214.
    [55]L.Nguyen.Accumulators from bilinear pairings and applications.CT-RSA 2005,LNCS 3376,Berlin:Springer-Verlag,2005:275-292.
    [56]J.Groth,R.Ostrovsky,and A.Sahai.Perfect non-interactive zero-knowledge for NP.EUROCRYPT 2006,LNCS 4004.Berlin:Springer-Verlag,2006:339-358.
    [57]X.Boyen,B.Waters.Compact group signatures without random oracle.EUROCRYPT 2006,LNCS 4004.Berlin:Springer-Verlag,2006:427-444.
    [58]C.Delerablee,D.Pointcheval.Dynamic fully anonymous short group signatures.VIETCRYPT 2006,LNCS 4341.Berlin:Springer-Verlag,2006:193-210.
    [59]J.Groth.Simulation-sound NIZK proofs for a practical language and constant size group signatures.ASIACRYPT 2006,LNCS 4284,Berlin:Springer-Verlag,2006:444-459.
    [60]X.Boyen,B.Waters.Full-domain subgroup hiding and constant-size group signatures.PKC 2007,LNCS 4450.Berlin:Springer-Verlag,2007:1-15.
    [61]K.Paterson,J.Schuldt.Efficient identity-based signatures secure in the standard model.ACISP 2006,LNCS 4058.Berlin:Springer-Verlag,2006:207-222.
    [62]D.Boneh,Eu.Goh and K.Nissim.Evaluating 2-DNF formulas on ciphertexts.TCC 2005,LNCS 3378.Berlin:Springer-Verlag,2005:325-341.
    [63]D.Naccache.Secure and practical identity-based encryption.Cryptology ePrint Archive, Report 2005/369,http://eprint.iacr.org/2005/369.pdf.
    [64]P.Sarkar and S.Chatterjee.Trading time for space:towards an efficient IBE scheme with short(er) public parameters in the standard model.ICISC 2005,Berlin:Springer-Verlag,2005:424-440.
    [65]M.Fahrmair,W.Sitou,B.Spanfelner.Privacy Management for Context Transponders.Proceedings of the 2007 Intematioanl Symposium on Applications and the Internet Workshops,2007.
    [66]IEEE Std 802.11-2003.IEEE Standard for Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements-Part 11:Wireless Medium Access Control(MAC) and physical layer(PHY) specifications:Specification for Operation in Additional Regulatory Domains.
    [67]IEEE P802.11i,Draft Supplement to STANDARD FOR Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements-Part 11:Wireless Medium Access Control(MAC) and physical layer(PHY) specifications:Specification for Operation in Additional Regulatory Domains.
    [68]IEEE Std 802.16-2004.IEEE Standard for Local and metropolitan area networks:Part 16:Air Interface for Fixed Broadband Wireless Access Systems.
    [69]IEEE 802.16e-2005.IEEE Standard for Local and metropolitan for Fixed Broadband Wireless Access Systems:Amendment 2:Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands.
    [70]WiMax Forum White Paper:Mobile WiMax-Part 1:A Technical Overview and Performance Evaluation.
    [71]IEEE STD 802.1X,Standards for Local and Metropolitan Area Networks:Port Based Access Control,June 14,2001.
    [72]中华人民共和国国家质量监督检验检疫总局.无线局域网媒体访问(MAC)和物理(PHY)层规范.中国.中华人民共和国国家标准GB 15629.11-2003.2003年5月12日.
    [73]GBl5629.11-2003/XG1-2006《信息技术 系统间远程通信和信息交换 局域网和城域网特定要求 第11部分:无线局域网媒体访问控制和物理层规范 第1号修改单》,中国标准出版社,2006年.
    [74]Arbaugh,W.A,Shankar,N,Wan,Y.C.J,Kan Zhang.Your 802.11 wireless network has no clothes[J].IEEE Wireless Communications,Dec.2002,9(6):44-51.
    [75]Nikita B,Lan G,David W.Intercepting mobile communications:the insecurity of 802.11.Proceedings of the 7th Annual International Conference on Mobile Computing and Networking 2001 Papers.Rome,Italy:ACMCN,2001.
    [76]王育民,刘建伟.通信网的安全——理论与技术.西安:西安电子科技大学出版社,1999.
    [77] A. Shamir. Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology, Crypto'84, LNCS 196, Springer-Verlag, 47-53. 1984.
    [78] Y. Zheng and H. Imai. Compact and Unforgeable Key Establishment over an ATM Network. In Proceedings of IEEE INFOCOM'98, San Francisco. IEEE Press, 411-418. 1998.
    [79] Y. Zheng, Digital Signcryption or How to Achieve Cost (Signature & Encryption) 《Cost (Signature) + Cost (Encryption), Advances in Cryptology - Crypto'97, LNCS 1294, Springer, 1997.165-179.
    [80] Canetti R, Krawczyk H. Analysis of key-exchange protocol and their use for building secure channels. Proceeding of Eurocrypt 2001, LNCS 2045. Berlin, Springer-Verlag, 2001. 453-474.
    [81] Bellare M, Canetti R, Krawczyk H. A modular approach to the design and analysis of authentication and key-exchange protocols, 30th STOC, 1998:419-428.
    [82] Bellare M, Rogaway P. Entity authentication and key distribution. Advances in Cryptology, - CRYPTO'93, Lecture Notes in Computer Science Vol.773, D. Stinsoned, Springer-Verlag, 1994,232-249.
    [83] Canetti R, Krawczyk H. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels (Full Version), http://eprint.iacr.org/2001.
    [84] Canetti R, Krawczyk H. Universally composable notions of key exchange and secure channels. Proceeding of Eurocrypt 2002, LNCS 2332. Berlin, Springer-Verlag, 2002. 337-351.
    [85] Mitchell C.J, Ward M and Wilson P. Key control in key agreement protocols. Electronics Letters, 1998,34:980-981
    [86] Blake-Wilson S, Johnson D and Menezes A. Key exchange protocols and their security analysis. Proceedings of the sixth IMA International Conference on Cryptography and Coding, 1997.
    [87] R. J. Hwang, C. H. Lai, F. F. Su. An efficient signcryption scheme with forward secrecy based on elliptic curve. Applied Mathematics and Computation, 2005,167(1): 870-881.
    [88] R. Housley, Advance Encryption Standard (AES) Key Wrap Algorithm, RFC 3394, September 2002.
    
    [89] SHAMIR A. How to share a secret. Communications of the ACM, 1979,22(11):612—613.
    [90] BLAKLEY G. Safeguarding cryptographic keys. Proc. AFIPS 1979 Natl. Conf., New York: AFIPS press, 1979.313-317.
    [91] HE J, DAWSON E. Multistage secret sharing based on one-way function. Electronics Letters, 1994,30(19): 1591-1592.
    [92] HE J, DAWSON E. Multi secret-sharing scheme based on one-way function. Electronics Letters,1995,31(2):93-95.
    [93]HARN L.Comment:Multistage secret sharing based on one-way function.Electronics Letters,1995,31(4):262.
    [94]HARN L.Efficient sharing(broadcasting) of multiple secret.IEE Proceedings—Computers and Digital Techniques,1995,142(3):237-240.
    [95]CHIEN H.-Y,JAN J.-K.,TSENG Y.-M.A practical(t,n) multi-secret sharing scheme.IEICE Transactions on Fundamentals,2000,E83-A(12):2762-2765.
    [96]YANG C.-C.,CHANG T.-Y,HWANG M.-S.A(t,n) multi-secret sharing scheme.Applied Mathematics and Computation,2004,151(2):483-490.
    [97]PANG L.-J,WANG Y.-M.A new(t,n) multi-secret sharing scheme based on Shamir's secret sharing.Applied Mathematics and Computation,2005,167(2):840-848.
    [98]SHAO J,CAO Z.-F.A new efficient(t,n) verifiable multi-secret sharing(VMSS) based on YCH scheme.Applied Mathematics and Computation,2005,168(1):135-140.
    [99]Pinch R.On-line multiple secret sharing.Electronics Letters,1996,32:1087-1088.
    [100]Ateniese G,Blundo C,Santis AD,et al..Extended capabilities for visual cryptography.Theoretical Computer Science,2001,250(1-2):143-161.
    [101]Sun Hung-Min,Shieh Shiuh-Pyng.Recursive Constructions for Perfect Secret Sharing Schemes.Computers & Mathematics with Applications,1999,37(3):87-96.
    [102]Guo Guo-Ping,Guo Guang-Can.Quantum secret sharing without entanglement.Physics Letters A,2003,310(4):247-251.
    [103]Li Yongmin,Zhang Kuanshou,Peng Kunchi.Multiparty secret sharing of quantum information based on entanglement swapping.Physics Letters A,2004,324(5-6):420-424.
    [104]Chang Ting-Yi,Yang Chou-Chen,Hwang Min-Shiang.A threshold signature scheme for group communications without a shared distribution center.Future Generation Computer Systems,2004,20(6):1013-1021.
    [105]Shamir A.Identity-based Cryptosystems and Signature Schemes.Advances in Cryptology,Crypto'84,LNCS 196,Springer-Verlag,47-53.1984.
    [106]Girault.An identity-based identification scheme based on discrete logarithms modulo a composite number.Proceedings of EUROCRYPT'90,LNCS 473,481-486,1991.
    [107]Girault.Self-certified public keys.Proceedings of EUROCRYPT'91,LNCS 547,490-497,1991.
    [108]Lyon G A.500-241 2002 A Quick-reference List of Organizations and Standards for Digital Rights Management.NIST Special Publication.
    [109]Digital rights management,S.R.SUBRAMANYA AND BYUNG K.YI,IEEE2006
    [110]王美华,范科峰.数字媒体内容版权管理技术标准研究,广播与电视技术,2007年第六期
    [111]Digital Video Broadcasting Project,www.dvb.org,for Authorized Domains see DVBCPT Authorized Domain:Definition/Requirements,opt-018r5,2002.
    [112]Open Mobile Alliance,DRM Architecture,version 2.0,2005.
    [113]R.Vevers and C.Hibbert,Copy Protection and Content Management in the DVB,IBC Conference Publication,p458-466,Amsterdam,IBC2002,15-9-2002.
    [114]S.A.F.A.van den Heuvel,W.Jonker,F.L.A.J.Kamperman,and P.J.Lenoir,Secure Content Management in Authorised Domains,IBC Conference Publication,p467-474,Amsterdam,IBC2002,15-9-2002.
    [115]DRM Standardization in China,WenGao,Huang Tiejun,Europe-China Conference on Intellectual Property in Digital Media,Oct.18,2006 Shanghai
    [116]Milan Petkovic and R.Paul Koster,User-Attributed Rights in DRM,DRMTICS 2005,LNCS 3919,75-89.
    [117]Heeyoul Kim,Digital Rights Management with Right Delegation for Home Networks,ICISC2006,LNCS 4296,233-245.
    [118]李敏,刘胜利,陈克非.家庭网络DRM与典型DRM整合问题的研究,计算机工程,第33卷第2期,2007年1月
    [119]High-bandwidth digital protection system revisionl.I.Digital Content Protection LLC,June 2003.
    [120]Digital Transmission Content Protection Specification Volume 1(Informational Version) 1.3
    [121]中华人民共和国无线局域网国家标准(WAPI):GB15629.11-2003和GB 15629.1102-2003及其实施指南.
    [122]谢冬青,冷健.PKI原理与技术.清华大学出版社.
    [123]冯登国译.公开密钥基础设施概念、标准和实施.人民邮电出版社.
    [124]CHADWICK.D,W.An X.509 role-based privilege management infrastructure.Salford,U.K.:University of Salford,2002.
    [125]谭强,黄蕾.PMI原理及实现初探,计算机工程2002.8
    [126]ITU-T Rec.X.509(2000)|ISO/IEC 9594-8 The Directory:Authentication Framework
    [127]数字电视接收机内容保护技术体系与标准的研究进展,范科峰 赵新华,信息技术与标准化,2006年第1-2期

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700