A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing
暂无分享,去创建一个
[1] Shiguo Lian,et al. Fuzzy Risk Assessments on Security Policies for Digital Rights Management , 2009 .
[2] Lili Zhang,et al. A Novel DRM Security Scheme and its Prototype System Implementation , 2011 .
[3] Lin Yang,et al. Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[4] Bu-Sung Lee,et al. Optimization of Resource Provisioning Cost in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[5] Andrew S. Tanenbaum,et al. A DRM security architecture for home networks , 2004, DRM '04.
[6] Hyunsoo Yoon,et al. Digital Rights Management with Right Delegation for Home Networks , 2006, ICISC.
[7] Zhiyong Zhang,et al. Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .
[8] Niu Xin-xin. Trusted digital rights management protocol supporting for time and space constraint , 2008 .
[9] Ma Jian-feng,et al. Attestation proxy party-supported remote attestation model and its secure protocol , 2009 .
[10] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[11] Zhiyong Zhang. Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.
[12] Jianfeng Ma,et al. Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario , 2011, Intell. Autom. Soft Comput..
[13] Reihaneh Safavi-Naini,et al. Location constraints in digital rights management , 2008, Comput. Commun..
[14] Christoph Sorge,et al. Privacy-Preserving DRM for Cloud Computing , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.