售价: ¥119.34 待定配送费
此商品不能使用“一键下单”
前翻 后翻
正在播放... 已暂停   您正在聆听的 Audible 音频版本的样品。
了解更多信息
查看全部 2 张图片

数字版权管理生态系统中的安全、信任与风险 (英语) 平装 – 2012年5月31日

| 天天低价·正品质优
|
分享
广告

显示所有 格式和版本 隐藏其他格式和版本
亚马逊价格
全新品最低价 非全新品最低价
平装, 2012年5月31日
¥119.34
¥119.34
 

click to open popover

无需Kindle设备,下载免费Kindle阅读软件,即可在您的手机、电脑及平板电脑上畅享阅读。

  • iPhone/iPad/Mac
  • Android手机或平板电脑

请输入您的手机号码,获取Kindle阅读软件的下载链接。



基本信息

  • 出版社: 科学出版社有限责任公司; 第1版 (2012年5月31日)
  • 外文书名: Security, Trust and Risk in Digital Rights Management Ecosystem
  • 平装: 228页
  • 语种: 英语
  • 开本: 5
  • ISBN: 7030343352, 9787030343352
  • 条形码: 9787030343352
  • 商品尺寸: 23.8 x 16.4 x 1.4 cm
  • 商品重量: 358 g
  • 品牌: 科学出版社
  • ASIN: B0087NNDXI
  • 用户评分: 分享我的评价
  • 亚马逊热销商品排名: 图书商品里排第1,863,798名 (查看图书商品销售排行榜)
  • 您想告诉我们您发现了更低的价格?

商品描述

编辑推荐

《数字版权管理生态系统中的安全、信任与风险》主要内容:The monograph has an objective to make an interesting insight on security, trust and risk in DRM ecosystem from interdisciplinary perspective. There are involved with a tradeoff between DRM security and utility,in order to implement an optimal security-utility equilibrium and establish a multi-participant trust for various participants in the contents value chain, by cost-effectively adopting and deploying of security policies and mechanisms. And also, inspired by risk management,we made in-depth investigation on security risk management in contents value chain. Finally,we gave a DRM application case for Digital Home Network and a prototype on copyrighted multimedia contents.

目录

Preface
Chapter 1 Introduction
1.1 DRM Backgrounds
1.1.1 DRM Definitions
1.1.2 A Generic Contents Value Chain Ecosystem
1.1.3 Three Aspects of DRM Ecosystem
1.2 State-of-The-Art DRM
1.2.1 Cryptographic Security & Digital Watermarking
1.2.2 Digital Rights Expression and Usage Control
1.2.3 User Privacy Protection and Contents Security
1.2.4 DRM Trust Models
1.3 Research Motivation and Scope
1.4 Monograph Outline
1.5 Conclusion
References
Chapter 2 Enhanced Security Policies for DRM
2.1 Fundamental Security Requirements in DRM
2.2 Trusted Computing and Remote Attestation
2.2.1 Trusted Computing Background
2.2.2 Trusted Computing and Its Features
2.2.3 Remote Attestation
2.3 Ap2RA Model and Secure Protocol
2.3.1 Privacy Protection and ApaRA Model
2.3.2 Security Protocol
2.3.3 Analysis and Comparisons
2.4 Trusted Computing-enabled Digital Rights Sharing
2..1 Usage Control with Delegation Characteristics
2.4.2 Fine-Grained Digital Rights Transfer Policy
2.4.3 Ap2RA-Based Contents Dissemination System
2.4.4 Trusted Distribution on Transferable Rights
2.5 Digital Rights Negotiation and Contents Security
2.5.1 Transaction-Based Digital Rights Negotiation
2.5.2 Contents Verification and Trusted Execution
2.6 Conclusion
References
Chapter 3 Formalized DRM Security-Utility and Game-Thelical Analysis
3.1 Requirements for Trust in DRM
3.1.1 Essential Trust Relations
3.1.2 Conceptual Multi-Participant Trust Architecture
3.2 Formalized Game-Theoretical Adoptions of Security Policies
3.2.1 DRM Security Policies and Properties
3.2.2 Non-Cooperative Game on Security Polices
3.2.3 Cooperative Game on Security Polices
3.3 Fuzzy Analytic Hierarchy Process on Utility-Factor Weights
3.3.1 Analytic Hierarchy Process and Fuzzy Assessment
3.3.2 Hierarchy Process Structure and Consistency Matrix
3.3.3 FAHP-Based Weights Assessment
3.4 Conclusion
References
Chapter 4 Basic Security-Utility and Game Analysis in Contents Acquisition Scenario
4.1 DRM Typical Security Policies
4.1.1 Typical Security Policy Set
4.1.2 Security Policies Relativity
4.2 Security Utility Analysis
4.2.1 Payoff Functions of Security Policies Combinations
4.2.2 Utility-Factors Weights Assessment and Calculation
4.3 Non-Cooperative Game on Typical Policies Set
4.3.1 A Non-Cooperative Game Model
4.3.2 Nash Equilibriums and Conditions
4.3.3 Swarm Simulations and Discussions
4.4 Cooperative Game for Typical Policies
4.4.1 Security Benefits Super-Additiontivity and Convexity
4.4.2 Establishment of Multi-Participant Cooperation
4.5 Conclusion
References
Chapter 5 Dynamic Mixed Game Analysis of Security Policies in Contents Sharing Scenario
5.1 Rights Delegation and Transfer for Contents Sharing
5.2 Dynamic and Mixed Game for Contents Sharing
5.2.1 Rights Sharing Tree and DMG
5.2.2 An Algorithm for DMG
5.3 Swarm-Based Simulation Experiments
5.3.1 Basic Simulation Environment and Procedure
5.3.2 Simulations Experiments on Different Sharing Modes
5.4 Conclusion
References
Chapter 6 DRM Risk Management
6.1 Risk Utility of Security Policy
6.1.1 Security Risk Management and Utility Category
6.1.2 Pros and Cons of Qualitative and Quantitative Assessments
6.1.3 An Analytic Approach to Risk-Controlled Utility
6.2 Risk-Controlled Utility Analysis and Business Model
6.2.1 Risk Utility of TC-Enabling Security Policy
6.2.2 Sharing Modes and Maximum Benefits of Contents Purveyor
6.2.3 Simulation Experiments
6.2.4 Related Discussions and Business Model
6.3 Conclusion
References
Chapter 7 DRM Application Case for Digital Home Network
7.1 A DRM Usage Control Model for Digital Home Network
7.1.1 Formalized Role-based, Cross-Domain Usage Control Model for DHN
7.1.2 Visual Modeling of the RCDUCM for DHN
7.1.3 An Application Case of the RCDUCM for DHN
7.2 A Novel Approach to Digital Contents Sharing for Digital Home Network
7.2.1 Background and Motivation
7.2.2 Classification of Roles and Distribution of Permissions for DHN
7.2.3 A Novel Approach to Digital Contents Sharing for DHN
7.2.4 Analysis of Performance and Security
7.3 A Novel DRM Security Scheme and Its Prototype System Implementation
7.3.1 DRM System Architecture
7.3.2 DRM System Security Mechanism
7.3.3 Playback Control Based on Cryptography and License
7.3.4 Implementation of DRM Prototype System
7.4 Conclusion
References
Chapter 8 Further Works and Open Issue
8.1 Further Works
8.2 Trust Evaluation in Multimedia Social Network
8.2.1 Introduction
8.2.2 Advance on Trust Evaluation in Social Networks
8.3 Open Issue and Topics
8.4 Conclusion
References
Appendix A
Appendix B
Acknowledgments


无顾客评论


评论该商品

与其他买家分享您的想法