学习资源使用控制及版权认定机制研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着教育信息化的进一步发展,学习资源的版权保护问题已经成为了教育资源公共服务体系建设中必须正视和亟待解决的问题。学习资源的数字权利管理是数字版权管理技术在教育领域中的创新应用。通过技术手段的有效辅助和支持,落实版权法和各类授权协议,可对优秀学习资源实施更加合理有效的版权保护,防止对著作权的侵犯,依法保护创作者和合法使用者的权益。
     由于数字版权管理技术本身的一些不足以及教育领域特性带来的新挑战,需研究适合于教育领域的数字权利管理新机制。本文以数字化学习资源为权利保护的研究对象,依托项目组课题研究工作,在查阅大量文献的基础上,对学习资源数字权利管理关键机制进行了深入研究,主要包括:(1)学习资源数字权利管理体系架构和功能结构研究;(2)支持版权管理的学习资源信息模型与内容封装机制研究;(3)学习资源数字权利使用控制机制研究;(4)学习资源作品版权认定及使用跟踪协议研究;(5)学习资源数字权利管理系统实现与应用研究。其中的学习资源数字权利使用控制机制和作品版权认定及使用跟踪协议是本文研究的重点所在。
     本文主要研究工作及所取得的创新成果如下:
     首先,针对现有数字版权管理体系框架多局限于对己授权用户权利的使用控制,缺乏对版权证明和侵权认定等机制描述的问题,基于学习资源生命周期的概念,提出一个学习资源数字权利管理(LRDRM)体系框架。与现有的如OpenDRM、OMA DRM、Imprimatur等体系框架相比,LRDRM框架能够有效覆盖数字化学习资源生命周期全过程,并涵盖了版权证明和侵权认定等必要功能。
     其次,针对现有的内容封装方法对资源内容的嵌套保护缺乏支持的问题,在学习对象元数据和内容封装标准规范的基础上,研究了支持权利管理的可重用学习资源内容封装信息模型和封装方法。与现有的内容封装技术只能针对单一、平面化的内容格式不同,本文提出的内容封装方法,更加适合于复合、异构、可重用的学习资源,能够根据具体安全需求对学习资源文件中的每个资源项进行分别保护,从而为更加灵活的授权提供了安全基础。
     第三,针对现有学习资源访问控制机制中授权多基于传统访问控制策略,存在无法进行细粒度授权、使用控制过程缺乏可持续性等问题,参考Ravi Sandhu等人提出的UCONABC使用控制模型,提出一个基于属性和策略的使用控制模型AP-UCON及相应的执行机制。其创新性体现如下:(1)与传统的访问控制和UCONABC使用控制模型相比,AP-UCON模型增加了权利属性要素,并在条件决策因子中加入了例外(Exception)要素,用于描述合理使用、例外授权等在公共知识领域不可避免的版权获取方式。(2)针对可重用的学习资源在创建阶段的嵌套式封装可能带来的安全策略冲突问题,提出了适用的冲突检测方法和一致性策略创建算法。(3)基于AP-UCON模型,参考引用监控机的思想,提出了AP-UCON引擎机制。该机制采用模块化设计,基于属性和安全策略进行授权决策,能够实现细粒度的动态授权和数字权利的可持续使用控制。
     第四,针对学习资源生命周期内有可能出现的盗版和非法使用等问题,提出针对不同问题的两种解决方案——学习资源作品版权所有者认定(COIP)协议机制和使用跟踪(UTP)协议机制。除了满足安全协议的基本安全目标外,该机制有如下创新性:(1)版权所有者认定协议在资源创建/发布阶段向学习资源作品添加版权水印。该协议引入可信第三方及时间戳机制,保证即使在水印被移除后,仍然能够认定版权归属。(2)使用跟踪协议在资源分发阶段将内容使用者的数字指纹嵌入到学习资源作品的一个拷贝中。该协议采用匿名公-私钥对的方法保证诚实用户的匿名性和叛逆者的可追踪性,同时改进了基于同态加密技术的隐私保护方法带来的效率问题。
     最后,在上述研究的基础上,设计并实现了学习资源数字版权管理系统工具,探讨了安全机制具体实践与应用的方法。论文的研究成果可用于网络教育、数字图书馆、知识管理、电子商务等典型信息内容服务领域,对知识产权合理保护下的网络教育服务平台的开发具有重要的意义。
With the further development of education informationization, the copyright protection issues of digital learning resources have become an urgent problem to be solved. Rights management for learning resources is an innovative application of digital rights management technology. With the help of technological tools, we can put intellectual property laws and various copyright protocols into effect, and also provide much more effective and reasonable protection for quality learning resources. All those could help the copyright holders and the legal users to protect their lawful rights and interests.
     Due to the limitations of the digital rights management technology, along with the new challenges brought by the domain characteristics of education reality, new digital rights management mechanisms for education application area are need to be studied.
     Based on our project research work and amounts of research literature references, this dissertation takes an in-depth research on digital rights management key mechanisms for learning resources, which include:(1) research on learning resources digital rights management architecture framework and functional structure;(2) research on rights management-enabled content information model and secure packaging mechanism for learning resources;(3) research on digital rights usage control mechanism for learning resources;(4) research on copyright identification and usage tracing protocols for learning resources;(5) design and implementation of digital rights management system for learning resources. The research focuses of this dissertation are digital rights usage control mechanism and copyrights identification and usage tracing protocols.
     This dissertation conducts a series of research and has obtained the following innovative achievements:
     First of all, since most of existing digital rights management architecture frameworks focus on the usage control of authorized user's rights, which makes them lack of description and coverage of copyright identification functions. A novel concept of learning resource lifecycle was presented. And based on the concept, the learning resources digital rights management architecture framework and functional structure which can cover the whole learning resource lifecycle are proposed.
     Secondly, since the existing content packaging method barely support nested protection for learning resources, on the basis of learning object metadata (LOM) and content packaging (CP) standards, the rights management-enabled learning resources information model and secure packaging mechanism is studied. Unlike existing content packaging technique, the proposed mechanism can separately provide protection for each content item in a learning resource file. It is much more suitable for compounded, heterogeneous reusable learning resources, and could provide a secure foundation for flexible authorization of digital rights.
     Thirdly, since most of existing learning resources access control mechanisms are based on traditional access control policy which can't provide fine-grained authorization and the usage processes are lack of persistent control, Based on Ravi Sandhu's UCONABC model, an attribute-policy based usage control (AP-UCON) model and its enforcement mechanism is proposed. The innovative achievement are as follows:(1) The "oBligation" factor is combined into the "Condition" decision factor, and the "Exception" factor is introduced into the model to describe the "fair use" use case, which is quite common in education research field;(2) The security policy confliction problems brought by the nested packaging of learning resources in the content creation stage are analyzed, and a consistent policy creation algorithm is presented;(3) Based on the concept of reference monitor, an AP-UCON client engine mechanism is proposed, which is proved to be very useful to perform the authorization decision and digital rights usage control enforcement.
     Then, to resolve the piracy and illegal usage issues of learning resources, a series of learning resource copyright ownership identification (CIOP) and usage tracing (UTP) protocols are proposed. Beyond the basic security objectives of security protocol, the proposed protocol mechanism has the following innovative achievement:(1) In the CIOP protocol, a trusted third party embeds robust copyright watermark into learning resources work in the creation/publishing stage with the help of timestamp scheme, to make sure that even the watermark is removed, the copyright ownership can still be identified and proved;(2) In the UTP protocol, user's digital fingerprint is added to a copy of learning resources work in the distribution stage. To ensure honest user's anonymity and traitor's traceability, a new anonymous public-private key pair is presented and the performance is improved.
     Finally, several digital rights management system tools are designed and implemented based on the researches mentioned above, and the secure mechanisms of those system tools and discussed.
     The research achievements can be used in e-Learning, digital libraries, knowledge management, e-commerce and other information content services areas, and is conducive to the establishment of lifelong education services platform with digital rights management services.
引文
[1]余胜泉.推进技术与教育的双向融合—《教育信息化十年发展规划(2011-2020年)》解读[J].中国电化教育,2012(5):5-14.
    [2]张兴超.数字教室环境中电子书数字版权保护的应用研究[D].华东师范大学.2011.
    [3]陈克勇.我国高校数字资源共享与版权保护[D].浙江大学.2006.
    [4]蔡婕.网络环境下信息共享与版权保护的失衡及其对策研究[D].华中师范大学.2012.
    [5]刘建银,龙柚衫.美国对数字远程教育的版权立法[J].电化教育研究,2004(4):70-74.
    [6]韩缨.云计算环境下网络版权保护问题和应对策略[J].中国出版,2012(10):54-56.
    [7]徐亚东.网络版权利益平衡的实现途径探讨[J].中国出版,2011(13):70-72.
    [8]周丽霞.数字图书馆版权获取研究[D].吉林大学.2011.
    [9]张轶斌.英国开放教育资源项目(UKOER)述评[J].电化教育研究,2011(7):112-120.
    [10]叶冬连,焦建利.国外开放教育资源的比较及启示[J].中国电化教育,2010(10):71-75.
    [11]张春景,刘炜,夏翠娟等.关联数据开放应用协议[J].中国图书馆学报,2012(1):43-48.
    [12]Creative Commons项目主页[EB/OL]. http://creativecommons.org/.
    [13]黄国彬.可适用于我国图书馆的著作权例外立法框架研究[J].中国图书馆学报,2012(3):69-77.
    [14]Danny Bradbury. Decoding digital rights management[J]. Computers & Security,2007 (1): 31-33.
    [15]Wenjun Zeng, Ching-Yung Lin, Heather Yu. Multimedia Security Technologies for Digital Rights Management[M]. Elsevier.2006.
    [16]Windows Media Rights Manager 10 SDK[EB/OL]. http://msdn.microsoft.com/en-us/library/ ms986509.aspx.
    [17]Jan De Clercq. Windows Server 2003 Security Infrastructures[J]. Digital Press.2006.
    [18]Olin Sibert, David Bernstein, David Van Wie. DigiBox:a self-protecting container for information commerce[C]. Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce.1995 (7):1-15.
    [19]IBM'EMMS[CP/OL]. http://www.almaden.ibm.com/cs/madison.html.
    [20]Adobe digital rights management (DRM) solutions [EB/OL]. http://www.adobe.com/manufacturing/resources/drm/.
    [21]北京大学.一种数字文档的加密保护方法及客户端设备:中华人民共和国,No.200710118917[P].公布日:2008年10月8日.
    [22]Undergraduate Students' Perception of Copyright Infringement:A Case Study of the University of Ibadan, Oyo State, Nigeria. Library Philosophy and Practice 2012, http://www.webpages.uidaho.edu/-mbolin/isiakpona.htm.
    [23]田捷.数字版权管理系统机理与关键技术研究[D].华中师范大学.2008.
    [24]Heeyoul Kim, Younho Lee, Yongsu Park. A robust and flexible digital rights management system for home networks [J]. Journal of Systems and Software,2010 (12):2431-2440.
    [25]俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005(20):1957-1968.
    [26]范科峰,莫玮等.数字版权管理技术及应用研究进展[J].电子学报,2007(6):1139-1147.
    [27]John S. Erickson. OpenDRM:A standards framework for digital rights expression, messaging and enforcement[EB/OL]. http://personal.hpl.hp.com/joheri/opendrm_project.htm.
    [28]Nicholas P. Sheppard. On Implementing MPEG-21 Intellectual Property Management and Protection[C]. ACM workshop on Digital Rights Management.2007:10-22.
    [29]OpenIPMP project[EB/OL]. http://sourceforge.net/projects/openipmp/.
    [30]Microsoft PlayReady[EB/OL]. http://www.microsoft.com/playready/.2010.
    [31]OMA Digital Rights Management Specification V2.2[S]. http://www.openmobilealliance.org.2011.
    [32]魏景芝,杨义先,钮心忻OMA DRM技术体系研究综述[J].电子与信息学报,2008(3):746-751.
    [33]X.M. Zhang, Q. Liu, H.Q. Wang, Ontologies for intellectual property rights protection, Expert Systems with Applications, Volume 39, Issue 1, January 2012, Pages 1388-1400
    [34]Chia-Chi Wu, Chia-Chen Lin, Chin-Chen Chang. Digital rights management for multimedia content over 3G mobile networks[J]. Expert Systems with Applications,2010 (10):6787-6797.
    [35]Adobe LiveCycle Rights Management ES2 technology[EB/OL]. http://www.adobe.com/.
    [36]冯雪,俞银燕,汤帜.具有硬件适应性的多设备内容共享与版权保护方法[J].北京大学学报(自然科学版),2011(6):1009-1016.
    [37]Microsoft Digital Rights Management License Protocol Specification[S]. http://msdn.microsoft.com.2008.
    [38]Anil Jain, Umut Uludag. Multimedia Security Technologies for Digital Rights Management[M]. Academic Press.2006.
    [39]Florian Kelbert, Alexander Pretschner. Towards a policy enforcement infrastructure for distributed usage control[C]. The 17th ACM symposium on Access Control Models and Technologies,2012:119-122.
    [40]Prachi Kumari, Alexander Pretschner. Deriving implementation-level policies for usage control enforcement[C]. The 2nd ACM conference on Data and Application Security and Privacy,2012: 83-94.
    [41]Zhiyong Zhang, Qingqi Pei, Jianfeng Ma et al. Security and trust in digital rights management: A survey [J]. International Journal of Network Security,2009 (3):247-263.
    [42]Pramod A. Jamkhedkar, Gregory L. Heileman. A formal conceptual model for rights[C]. The 8th ACM workshop on Digital rights management (DRM'08),2008:29-38.
    [43]Nicholas P. Sheppard, Reihaneh Safavi-Naini. On the operational semantics of rights expression languages[C]. The 9th ACM workshop on Digital rights management,2009:09-10.
    [44]Kunihiko Fujita, Yasuyuki Tsukada. An analysis of interoperability between licenses[C]. the 10th annual ACM workshop on Digital rights management (DRM'10),2010:61-72.
    [45]eXtensible rights Markup Language (XrML) 2.0 Specification[S]. ContentGuard Inc.
    [46]M.Usama, M. Sobh. Software Copy Protection and Licensing based on XrML and PKCS#11[J]. Communications, Computers and Signal Processing,2011 (05):856-861.
    [47]Open Digital Rights Language (ODRL) version 2.0 [EB/OL], http://www.w3.org/community/odrl/.
    [48]Dongyang Xu, Zhi Tang; Yinyan Yu. An extended rights expression model supporting dynamic digital rights management[C]. The 7th International Conference on Information Assurance and Security,2011:186-191.
    [49]Xin Wang, T.DeMartini, B.Wragg. The MPEG-21 Rights Expression Language and Rights Data Dictionary[J]. IEEE Transactions on Multimedia,2005 (3):408-417.
    [50]Xin Wang. MPEG-21 Rights Expression Language:enabling interoperable digital rights management[J]. IEEE Multimedia,2004 (4):84-87.
    [51]Jaime Delgado, Victor Torres, Silvia Llorente et al. Rights Management in Architectures for Distributed Multimedia Content Applications[M]. TRUSTWORTHY INTERNET. Springer Verlag.2011:335-347.
    [52]Alapan Arnab, Andrew Hutchison. Persistent access control:a formal model for drm[C]. The ACM workshop on Digital Rights Management (DRM'07),2007:41-53.
    [53]Pramod A. Jamkhedkar, Gregory L. Heileman. A Formal Conceptual Model for Rights[C]. The 8th ACM Digital Rights Management Workshop.2008:29-38.
    [54]Christopher C. Lamb, Pramod A. Jamkhedkar, Mathew P. Bohnsack et al. A domain specific language for usage management[C]. the 11th annual ACM workshop on Digital rights management,2011:51-62.
    [55]Roberto Garcia, Rosa Gil, Jaime Delgado. A web ontologies framework for digital rights management[J]. Artificial Intelligence and Law,2007 (06):137-154.
    [56]Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen et al. LicenseScript:a logical language for digital rights management[J]. Annals of Telecommunications,2006 (4):284-331.
    [57]Pramod A. Jamkhedkar, Gregory L. Heileman, Christopher C. Lamb. An interoperable usage management framework[C]. The 10th ACM workshop on Digital rights management,2010: 73-88.
    [58]Pramod A. Jamkhedkar, Gregory L. Heileman. Digital rights management architectures[J]. Computers & Electrical Engineering,2009 (2):376-394.
    [59]Nicholas Paul Sheppard, Reihaneh Safavi-Naini. On the operational semantics of rights expression languages[C]. The 9th ACM workshop on Digital rights management,2009:17-28.
    [60]Jaehong Park, Ravi S. Sandhu. The UCONABC usage control model. ACM Transaction on Information System Security[J],2004 (1):128-174.
    [61]Ravi S. Sandhu, Jaehong Park. Usage Control:A Vision for Next Generation Access Control[J]. Computer Network Security,2003:17-31.
    [62]Srijith K.Nair, Andrew S. Tanenbaum, Gabriela Gheorghe et al. Enforcing DRM policies across applications[C]. The 8th ACM workshop on Digital rights management,2008:87-94.
    [63]Alexander Pretschner, Manuel Hilty, Florian Schiitz et al. Usage Control Enforcement:Present and Future[J]. IEEE Security & Privacy,2008 (4):44-53.
    [64]钟勇,秦小麟,刘玉风.一种面向DRM的责任授权模型及其实施框架[J].软件学报,2010(8):2059-2069.
    [65]马兆丰,范科峰,陈铭等.支持时空约束的可信数字版权管理安全许可协议[J].通信学报,2008(10):153-164.
    [66]Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim et al. Location constraints in digital rights management[J]. Computer Communications,2008 (04):1173-1180.
    [67]Pramod A. Jamkhedkar, Gregory L. Heileman. Digital rights management architectures[J]. Computers & Electrical Engineering,2009 (2):376-394.
    [68]张志勇,牛丹梅.数字版权管理中数字权利使用控制研究进展[J].计算机科学,2011(4):48-54.
    [69]Hao-hua Chu, Lintian Qiao, Klara Nahrstedt et al. A secure multicast protocol with copyright protection[J]. ACM SIGCOMM Computer Communication Review,2002 (2):42-60.
    [70]Yacine Gasmi, Ahmad-Reza Sadeghi et al. Flexible and secure enterprise rights management based on trusted virtual domains[C]. The 3rd ACM workshop on Scalable trusted computing, 2008 (10):71-80.
    [71]Chin Ling Chen. A secure and traceable E-DRM system based on mobile device[J]. Expert Systems with Applications,2008 (3):878-886.
    [72]Chung-Ming Ou, C.R. Ou. Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)[J]. Expert Systems with Applications,2011 (9):11048-11054.
    [73]陆宇光.用于版权保护的数字指纹技术的研究[D].苏州大学.2009.
    [74]V. D.To, R.Safavi-Naini, F.Zhang. New traitor tracing schemes using bilinear map[C]. The 3rd ACM workshop on Digital rights management,2003:67-76.
    [75]张学军,周利华,王育民.改进的基于双线性映射叛逆者追踪方案[J].北京邮电大学学报,2006(06):17-20.
    [76]张学军,王东勇,曾智勇等.一种新的具有附加特性的叛逆者追踪方案[J].西安电子科技大学学报(自然科学版),2007(04):274-278.
    [77]吕锡香,张卫东,杨文峰.基于双线性映射的非对称公钥叛逆者追踪[J].计算机工程,2009(02):4-6.
    [78]J. Zhang, W. Kou, K. Fan. Secure buyer-seller watermarking protocol[C]. IEEE Proceedings of Information Security,2006 (1):15-18.
    [79]Raphael C. W. Phan, B. M. Goi, G. S. Poh. Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents[J]. Wireless Personal Communictions,2011 (1): 73-83.
    [80]Tzung Her Chena, Gwoboa Horngb. A lightweight and anonymous copyright-protection protocol[J]. Computer Standards & Interfaces,2007 (02):229-237.
    [81]M. H. Shao. A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party [J]. Trust, Privacy and Security in Digital Business.2007:44-53.
    [82]Kun Jiang, Xiaoming Wang. Anonymous and Traceable Copyright Protection Protocol based on Mobile Devices[J]. Computer Science,2012 (04):71-74.
    [83]N. Memon, P. W. Wong. A buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing,2001 (10):643-649.
    [84]H. S. Ju, H.Kim, D. H. Lee et al. An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control[J]. Information security and cryptology'02,2002:421-432.
    [85]C. L. Lei, P. L. Yu, P. L. Tsai et al. An efficient and anonymous buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing,2004 (13):1618-1626.
    [86]C. N. Fan, M. T. Chen, W. Z. Sun. Buyer-seller watermarking protocols with off-line trusted third parties[J]. International Journal of Ad Hoc and Ubiquitous Computing,2008 (1):36-43.
    [87]Renato Iannella. Digital rights management architectures[J]. D-Lib Magazine,2001 (06):1-6.
    [88]Eric Diehl. A Four-Layer Model for Security of Digital Rights Management [C]. The 8th ACM Workshop on Digital Rights Management (DRM'08),2008 (10):19-27.
    [89]Open Mobile Alliance DRM Architecture Version2.2 [EB/OL]. http://www.openmobilealliance.org/Technical/release_program/docs/DRM/V2_2-20110419-C/O MA-AD-DRM-V2_2-20110419-C.pdf
    [90]Imprimatur Business Model Version 2.1 [EB/OL]. http://www.imprimatur.net/.
    [91]Seong Oun Hwang, Ki Song Yoon, Kyung Pyo Jun et al. Modeling and implementation of digital rights[J]. The Journal of Systems and Software,2004 (3):533-549.
    [92]吴永和.学习资源服务生态环境构建的研究[D].华东师范大学.2009.
    [93]汪保友,胡运发.控制数字信息传播的安全机构[J].小型微型计算机,2003(05):825-830.
    [94]张茹,杨榆,张啸.数字版权管理[M].北京邮电大学出版社.2008.
    [95]Wenjun Zeng, Shawmin Lei. Efficient frequency domain selective scrambling of digital video[J]. IEEE Transactions on Multimedia,2003 (1):118-129.
    [96]Chung-Ping Wu, C.-C. Jay Kuo. Design of Integrated Multimedia Compression and Encryption Systems[J]. IEEE Transactions on multimedia,2005 (10):828-839.
    [97]Susie J. Wee, John G. Apostolopoulos. Secure scalable streaming enabling transcoding without decryption[C]. International Conference on Image Processing'01,2001:437-440.
    [98]袁春,钟玉琢,贺玉文.基于混沌的视频流选择加密算法[J].计算机学报,2004(02):257-263.
    [99]Dublin Core Metadata Element Set (Version 1.1) [S]. http://dublincore.org/documents/dces/.
    [100]Learning Resource Meta-data Specification Version 1.3[S]. http://www. imsproj ect.org/metadata/.
    [101]Microsoft Object Linking and Embedding (OLE) Data Structures[CB/OL]. http://msdn.microsoft.com/en-us/library/dd942265(v=prot.l0).aspx (2012.07).
    [102][RFC 2557]MIME Encapsulation of Aggregate Documents, such as HTML (MHTML)[EB/OL]. http://tools.ietf.org/html/rfc2557/.
    [103]IMS Content Packaging v1.2 Public Draft v2.0 specification[J]. http://www. imsglobal. org/content/packaging/.
    [104]Peter M. Benton. Packing Information for Superdistribution[EB/OL]. http://www.ibm.com/
    [105]李春旺,张晓林.复合数字对象研究[J].情报学报,2004(4):444-451.
    [106]ADL Sharable Content Object Reference Model (SCORM 2004)[S]. http://www.adlnet.org/.
    [107]OASIS eXtensible Access Control Markup Language Specification v2.0. http://xml.coverpages.org/xacml.html.
    [108]Information Technology-Multimedia Framework-Part 5:Rights Expression Language. ISO/IEC FDIS 21000-5:2003(E)[S]. http://mpeg.chiariglione.org/standards/mpeg-21/mpeg-21.htm.
    [109]Xerox Digital Property Rights Language[S]. http://xml.coverpages.org/dprl.html.
    [110]Norm Friesen, Magda Mourad, Robby Robson. Towards a Digital Rights Expression Language Standard for Learning Technology[R]. http://ltsc.ieee.org/wg4/.
    [111]Open Digital Rights Language Specification Version 2.0[S]. http://www.w3.org/community/odrl/.
    [112]颜学雄,王清贤,马恒太.Web服务访问控制模型研究[J].计算机科学,2008(5):38-41.
    [113]Prados Jose, Rodriguez Eva, Delgado Jaime. Interoperability between different rights expression languages and protection mechanisms[C]. First International Conference on Automated Production of Cross Media Content for Multi-channel Distribution,2005,:145-152.
    [114]李凤华,苏铓,史国振,马建峰.访问控制模型研究进展及发展趋势[J].电子学报,2012(4):805-803.
    [115]Xiaolei Qian, Teresa F. Lunt. A MAC Policy Framework for Multilevel Relational Databases[J]. IEEE Transactions on Knowledge and Data Engineering,1996 (1):3-15.
    [116]张妍,陈驰,冯登国.空间矢量数据细粒度强制查询访问控制模型及其高效实现[J].软件学报,2011(8):1872-1883.
    [117]Catherine Jensen McCollum, Judith R. Messing, LouAnna Notargiacomo. Beyond the Pale of MAC and DAC--Defining New Forms of Access Control[C]. IEEE Symposium on Security and Privacy,1990:190-200.
    [118]David F.C. Brewer. Michael J. Nash. The Chinese Wall security policy[C]. IEEE Symposium on Security and Privacy,1989:206-214.
    [119]马俊,王志英,任江春等.一种实现数据主动泄漏防护的扩展中国墙模型[J].软件学报,2012(3):677-687.
    [120]David F. Ferraiolo, Ravi Sandhu, Serban Gavrila et al. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information System Security,2001 (3):224-274.
    [121]Liang Chen. Analyzing and Developing Role-Based Access Control Models[D]. University of London.2011.
    [122]李晓峰,冯登国,陈朝武等.基于属性的访问控制模型[J].通信学报,2008(04):90-98.
    [123]Hung-Chang Lee, Shih-Hsin Chang. RBAC-Matrix-Based EMR Right Management System to Improve HIPAA Compliance[J]. Journal of Medical Systems,2012 (5):2981-2992.
    [124]姚寒冰,胡和平,卢正鼎等.基于角色和上下文的动态网格访问控制研究[J].计算机科学,2006(1):41-44.
    [125]Hanbing Yao, Heping Hu, Baohua Huang et al. Dynamic Role and Context-Based Access Control for Grid Applications[C]. The 6th International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05),2005:404-406.
    [126]E Bertino, AC Squicciarini, I Paloscia et al. Ws-AC:A fine grained access control system for web services[J]. World Wide Web,2006 (2):143-171.
    [127]R.K.Thomas, Ravi Sandhu. Task-based Authorization Controls (TBAC):A Family of Models for Active and Enterprise-oriented Authorization Management[C]. The IFIP WG11.3 Workshop on Database Security,1997:11-13.
    [128]李风华,苏铓,史国振等.访问控制模型研究进展及发展趋势[J].电子学报,2012(4):805-813.
    [129]Mohammad A.Al-Kahtani, R.Sandhu. Rule-Based RBAC with Negative Authorization[C].20th Annual Computer Security Applications Conference,2004:405-415.
    [130]Jaehong Park, Xinwen Zhang, Ravi Sandhu. Attribute Mutability in Usage Control[C]. IFIP International Federation for Information Processing,2004:15-29.
    [131]D.Basin, M.Harvan, F.Klaedtke et al. Monitoring Usage-Control Policies in Distributed Systems[C]. The 18th International Symposium on Temporal Representation and Reasoning, 2011:88-95.
    [132]G. R. Gangadharan, Vincenzo D'Andrea. Managing Copyrights and Moral Rights of Service-Based Software[J]. IEEE Software.2011(2):48-55.
    [133]Huijia Xie. Protecting fair use from digital rights management in china[C]. the 2007 ACM workshop on Digital Rights Management,2007:33-38.
    [134]聂丽平.基于UCON访问控制模型的分析与研究[D].合肥工业大学.2006.
    [135]石文昌,孙玉芳.论引用监控机等若干关键计算机安全思想[J].小型微型计算机系统,2001(6):675-678.
    [136]刘清堂.标准化教育资源版权保护机制研究[D].华中科技大学.2005.
    [137]汪保友,胡运发.控制数字信息传播的安全结构[J].小型微型计算机,2003(5):825-830.
    [138]钟桦,张小华,焦李成.数字水印与图像认证——算法及应用[M].西安电子科技大学出版社.2006.
    [139]宋劲松,周激流,李振华等.解决所有权死锁的一种数字水印算法[J].电子科技大学学报,2011(5):787-790.
    [140]刘立刚.开放环境下的数字版权保护安全协议研究[D].华中科技大学.2006.
    [141]赵学敏,郭宇弘,邹学强等.用于版权管理的数字音频水印算法[J].电子与信息学报,2011(10):2384-2389.
    [142]段贵多,赵希,李建平等.一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究[J].电子学报,2010(04):842-847.
    [143]胡颖.数字作品版权法律公正模型研究[D].华中科技大学.2004.
    [144]卢明樊.保护数字产品版权的数字指纹体制研究[D].上海交通大学.2006.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700