张志勇
个性化签名
- 姓名:张志勇
- 目前身份:
- 担任导师情况:
- 学位:
-
学术头衔:
- 职称:-
-
学科领域:
计算机科学技术
- 研究兴趣:
张志勇(1975-),毕业于计算机网络与信息安全教育部重点实验室(西安电子科技大学),计算机系统结构专业工学博士,西安交通大学博士后。IEEE & Computer Society 会员、ACM会员,中国计算机学会计算机应用专业委员会委员,中国人工智能学会智能数字内容安全专业委员会委员,全国音频、视频及多媒体系统与设备标准化技术委员会数字版权保护专家组成员。河南科技大学电子信息工程学院计算机系主任,副教授,硕士生导师。
长期从事信息系统安全与软计算领域的科学研究与教学工作。近年来,主要参与完成国家自然科学基金资助项目、教育部重点科技项目等4项,并作为主要起草人完成全国音频、视频及多媒体系统与设备标准化技术委员会、全国信息安全标准化技术委员会主持的3项信息技术国家标准规范。以第一作者在国际期刊、国内一级学报、IEEE/ACM/IFIP主办的国际学术会议等发表论文30余篇,其中SCI/EI/ISTP检索18篇。获得河南省科技进步奖三等奖1项,省教育厅及洛阳市一、二等奖4项。目前主持在研国家自然科学基金资助项目(与西安电子科技大学合作申请研究)及河南省科技厅重点科技攻关项目。
多个国际学术期刊及国内一级学报的审稿人,即“Intelligent Automation & Soft Computing (U.S.)”,"Applied Soft Computing (Elsevier)", "International Journal of Network Security (Taiwan)",《电子学报》、《通信学报》、《系统仿真学报》、《控制与决策》、《西安电子科技大学学报》、《北京工业大学学报》、《计算机科学》、《小型微型计算机系统》、《计算机应用》、《计算机应用研究》等。并在多个国际学术会议中担任Workshop/Special Invited Session的主席/联合主席,即IAS-2009-IS15,CIS-DRM2009,HPCS SS-TUN-MM2010,ICGEC-2010-IS06,MINES2010-SS2,以及多个国际程序委员会委员,即MINES2009 & MINES2010, HPCS2010, ACSA2010, MediaCom2010, ICGEC2010, IPTC2010, UTC2010, ICWOC2010, ICCASM2010, iTAP2010。
-
主页访问
2155
-
关注数
0
-
成果阅读
349
-
成果数
9
张志勇
,-0001,():
-1年11月30日
-
50浏览
-
0点赞
-
0收藏
-
0分享
-
142下载
-
0评论
-
引用
【期刊论文】Fuzzy Risk Assessments on Security Policies for Digital Rights Management
张志勇, Zhiyong Zhang;¤, Shiguo Lian, Qingqi Pei, Jiexin Pu
,-0001,():
-1年11月30日
In multimedia consuming, Digital Rights Management (DRM) is the important means to con¯rm the bene¯ts of both digital contents/services providers and consumers. To keep the DRM system running in order, risk management should be adopted, which identi¯es and assesses the DRM system's security level. Now, the legitimate sharing of copyrighted digital content is still an open issue, which faces severe risks of propertied assets circumvention and copyright infringe-ments. In this paper, we try to highlight a multi-disciplinary method for all-around examinations on risks to digital assets in the contents sharing scenario. The method is a qualitative and quantitative fuzzy risk assessment, which is used for estimating a novel concept called Risk-Controlled Utility (RCU) in DRM. Then, we emphasize on an application case of the emerging trusted computing policy, and analyze the in°uences of di®erent content sharing modes. Finally, we address a business model with some simulation results. The comparison with other methods shows that the fusion of qualitative and quantitative styles can not only evaluate the RCU with uncertain risk events e®ectively, but also provide accurate assessment data for the security policies of DRM.
Digital Rights Management, Risk Management, Fuzzy Risk Assess-ment, Security Policy, Trusted Computing, Qualitative and Quantitative Analysis
-
39浏览
-
0点赞
-
0收藏
-
0分享
-
196下载
-
0评论
-
引用
张志勇, ZHIYONG ZHANG, , QINGQI PEI, JIANFENG MA, AND LIN YANG
Intelligent Automation and Soft Computing, Vol. 17, No.X, pp. 1-13, 2011,-0001,():
-1年11月30日
A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefits of two stakeholders, which are DRM Providers and contents Sharer who is a category of consumers. A dynamic and mixed game and its algorithm were proposed, where Sharer's strategies were whether to employ the trusted computing enabling devices and related components or not, as well as Providers' strategies included entirely general security, entirely enhanced security and dynamic security policies. We concluded from both game-theoretic analyses and Swarm simulation experiments that the number of acquired sharable digital rights and security cost have a direct effect on Sharer's choices of the enhanced security policy, and also their different basic sharing modes including partial, modest and extensive sharing, further influence the choice of Providers. Besides, with respect to the mixed sharing mode far more similar to a real contents sharing scenario, Dynamic security strategy is superior to the entirely enhanced security in the context of limited sharable rights and higher security costs, but with the acquisition of much more rights and the decrease of enhanced security overhead, the latter strategy would be optimal and stable as a Nash Equilibrium for stakeholders, in combination with the exploitation of effective business models of contents industry.
Digital Rights Management, Game Theory, Trusted Computing, Algorithm, Simulation
-
37浏览
-
0点赞
-
0收藏
-
0分享
-
157下载
-
0评论
-
引用
【期刊论文】Security and Trust in Digital Rights Management: A Survey
张志勇, Zhiyong Zhang, , Qingqi Pei, Jianfeng Ma, and Lin Yang
International Journal of Network Security, Vol. 9, No.3, PP. 247-263, Nov. 2009,-0001,():
-1年11月30日
A successful transaction of digital contents is primar-ily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents value chain ecosystem. We first analyzed basic value chain architectures in existence, together with some fundamen-tal security and trust requirements. And then, a state-of-the-art anatomy of the security and trust related to DRM was presented from different stakeholder' perspectives. Next, some challenges for multi-party mutual trust, not just inclined to any of participants, were proposed based on the holistic consideration of the digital contents/rights protection and the benefits balance. Finally, a conclusion was drawn that the rights-benefits-centric DRM ecosys-tem and the resulting trust relationship are crucial for the survivability of the contents industry.
Digital content industry,, digital rights man-agement,, security,, trust
-
29浏览
-
0点赞
-
0收藏
-
0分享
-
244下载
-
0评论
-
引用
【期刊论文】A CSCW-Enabling Integrated Access Control Model and its Application
张志勇, Zhiyong Zhanga, Tao Huangb, Qingtao Wuc and Jiexin Pud
Advanced Materials Research Vols. 108-111 (2010) pp 426-435,-0001,():
-1年11月30日
Nowadays open and distributed Computer Supported Cooperative Work (CSCW) systems are faced with security challenges due to large numbers of cooperative users, and a mass of valued data resources need to be protected against unauthorized usage, disseminations and share. To this end, role-based collaboration framework and access control approaches have been a focus in recent years, but there lack of a holistic and comprehensive model and visual modeling. We proposed and formalized a CSCW-enabling access control model integrating generic centralized authorization and distributed authority delegation, called IACM (Integrated Access Control Model) for CSCW, based on the cooperative roles and their owned activities. And then, the visual modeling was represented with static and dynamic characteristics, with a goal to narrow the gap of the formalized model and application level. Finally, an application in the collaboration system for equipments manufacture designing was implemented to improve security of the role-based centralized authorization management by using the authorization constraint rules, and to enhance the collaborative capability based on the user-side delegation mechanism, effectively guaranteeing CSCW system security and authorization management efficiency.
Computer Supported Cooperative Work, Access Control, Authorization, Formalism, Visual Modeling
-
35浏览
-
0点赞
-
0收藏
-
0分享
-
133下载
-
0评论
-
引用
张志勇, Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang, Kefeng Fan
,-0001,():
-1年11月30日
Digital Rights Management ecosystem is composed of various participants, which adopt different security policies to meet their own security requirements, with a goal to achieve individual optimal benefits. However, from the perspective of the whole DRM-enabling contents industry, a simple adoption of several increasingly enhanced security policies does not necessarily implement an optimal benefit balance among participants. A game-theoretic analysis of adoptions of security policies was emphasized based on a proposed General DRM value chain ecosystem without the loss of generality. First, we formalized security policies and fundamental properties that include internal relativity and external one, together with multiparty game on adoptions of security policies. Also, a cooperative game among digital Contents Provider, Rights/Service Provider and digital Devices Provider, as well as a non-cooperative game between Providers and Consumers were presented. Final, a stable core allocation of benefits and Nash Equilibriums were found out, respectively. It is clearly concluded that the cooperative game has important super-addivitity and convexity, thus simultaneous adoptions of security policies with external relativity being helpful to achieve Pareto Optimality by using a pre-established cooperative relation; and that Pareto Optimality also exists between Providers and Consumer with the increase of users’ purchase transactions when both have a repeated game.
Digtial Rights Management, Security Policy, Game Theory, Nash Equilibrium, Core Allocation
-
50浏览
-
0点赞
-
0收藏
-
0分享
-
173下载
-
0评论
-
引用
【期刊论文】Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies
张志勇, Zhiyong Zhang, Jiexin Pu, Qingtao Wu, Lili Zhang, Danmei Niu
,-0001,():
-1年11月30日
In recent decade, DRM (Digital Rights Management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value chain. An analytic hierarchy structure and its algorithm on the assessment on utility factors’ weights for DRM security policies were proposed based on Fuzzy Analytic Hierarchy Process, and then Swarm simulation experiments were further made on the adoptions of typical security policies in combination with the gained weight values. The simulation results show the proposed approach to fuzzy assessments effectively implements rational and optimal decision-making on security policies combinations.
Digital Rights Management, Fuzzy Analytic Hierarchy Process, Decision Theory, Security Policy, Swarm Simulation
-
39浏览
-
0点赞
-
0收藏
-
0分享
-
141下载
-
0评论
-
引用
张志勇, , 裴庆祺, 杨林, 马建峰
西安电子科技大学学报(自然科学版),2009,36(1):58~63,-0001,():
-1年11月30日
针对现有的远程证明模型中存在的终端平台基本配置细节与安全属性特征等隐私的保护问题,提出了一种具有委托模式的支持验证代理方的远程证明模型(AP2RA)及其安全协议引入可信第3方接受验证方的委托,实施终端软硬件的完整性和安全性证明,并可信地报告平台当前状态的布尔值,改进了基于验证双方的远程证明模式,有效地保护了被验证方的平台隐私与已有的方案相比,该方案能够抵抗被验证方消息重放攻击和共谋攻击,以及追踪对验证代理方(APP)发起攻击的终端平台,适用于可信网络中的资源分发与信息共享等环境。
可信计算, 远程证明, 隐私保护, 安全协议
-
29浏览
-
0点赞
-
0收藏
-
0分享
-
87下载
-
0评论
-
引用
张志勇, , 叶传奇, 范科峰, 张丽丽, 牛丹梅
通信学报,2009,30(10):126~131,-0001,():
-1年11月30日
从不同等级安全与效用分析的新角度,提出了基于模糊层次分析法的DRM安全策略效用评估及其博弈论选取。通过构建安全策略的层次分析结构,采用模糊判断一致矩阵,分析可选安全组件与服务在安全策略中的权重关系,并将所得权重用于计算DRM安全策略组合的实际效用以及进而实现博弈论选取,得出多方安全效用的Nash均衡,即最优均衡安全策略组合及其存在条件。一组典型安全策略的实例分析表明,博弈结果存在2组不同的安全策略组合,内容与服务提供商可根据数字内容购买用户数及平均购买量等应用情形来有效部署DRM系统,从而获得数字版权保护与各方实际收益的均衡。
数字版权管理, 模糊层次分析法, 安全策略, 博弈论, 纳什均衡
-
41浏览
-
0点赞
-
0收藏
-
0分享
-
107下载
-
0评论
-
引用