您当前所在位置: 首页 > 学者
在线提示

恭喜!关注成功

在线提示

确认取消关注该学者?

邀请同行关闭

只需输入对方姓名和电子邮箱,就可以邀请你的同行加入中国科技论文在线。

真实姓名:

电子邮件:

尊敬的

我诚挚的邀请你加入中国科技论文在线,点击

链接,进入网站进行注册。

添加个性化留言

已为您找到该学者9条结果 成果回收站

上传时间

2010年04月28日

【期刊论文】支持验证代理方的远程证明模型及其安全协议

张志勇, , 裴庆祺, 杨林, 马建峰

西安电子科技大学学报(自然科学版),2009,36(1):58~63,-0001,():

-1年11月30日

摘要

针对现有的远程证明模型中存在的终端平台基本配置细节与安全属性特征等隐私的保护问题,提出了一种具有委托模式的支持验证代理方的远程证明模型(AP2RA)及其安全协议引入可信第3方接受验证方的委托,实施终端软硬件的完整性和安全性证明,并可信地报告平台当前状态的布尔值,改进了基于验证双方的远程证明模式,有效地保护了被验证方的平台隐私与已有的方案相比,该方案能够抵抗被验证方消息重放攻击和共谋攻击,以及追踪对验证代理方(APP)发起攻击的终端平台,适用于可信网络中的资源分发与信息共享等环境。

可信计算, 远程证明, 隐私保护, 安全协议

上传时间

2010年04月28日

【期刊论文】Security and Trust in Digital Rights Management: A Survey

张志勇, Zhiyong Zhang, , Qingqi Pei, Jianfeng Ma, and Lin Yang

International Journal of Network Security, Vol. 9, No.3, PP. 247-263, Nov. 2009,-0001,():

-1年11月30日

摘要

A successful transaction of digital contents is primar-ily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents value chain ecosystem. We first analyzed basic value chain architectures in existence, together with some fundamen-tal security and trust requirements. And then, a state-of-the-art anatomy of the security and trust related to DRM was presented from different stakeholder' perspectives. Next, some challenges for multi-party mutual trust, not just inclined to any of participants, were proposed based on the holistic consideration of the digital contents/rights protection and the benefits balance. Finally, a conclusion was drawn that the rights-benefits-centric DRM ecosys-tem and the resulting trust relationship are crucial for the survivability of the contents industry.

Digital content industry,, digital rights man-agement,, security,, trust

上传时间

2010年04月28日

【期刊论文】GAME-THEORETIC ANALYSES AND SIMULATIONS OF ADOPTIONS OF SECURITY POLICIES FOR DRM IN CONTENTS SHARING SCENARIO

张志勇, ZHIYONG ZHANG, , QINGQI PEI, JIANFENG MA, AND LIN YANG

Intelligent Automation and Soft Computing, Vol. 17, No.X, pp. 1-13, 2011,-0001,():

-1年11月30日

摘要

A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefits of two stakeholders, which are DRM Providers and contents Sharer who is a category of consumers. A dynamic and mixed game and its algorithm were proposed, where Sharer's strategies were whether to employ the trusted computing enabling devices and related components or not, as well as Providers' strategies included entirely general security, entirely enhanced security and dynamic security policies. We concluded from both game-theoretic analyses and Swarm simulation experiments that the number of acquired sharable digital rights and security cost have a direct effect on Sharer's choices of the enhanced security policy, and also their different basic sharing modes including partial, modest and extensive sharing, further influence the choice of Providers. Besides, with respect to the mixed sharing mode far more similar to a real contents sharing scenario, Dynamic security strategy is superior to the entirely enhanced security in the context of limited sharable rights and higher security costs, but with the acquisition of much more rights and the decrease of enhanced security overhead, the latter strategy would be optimal and stable as a Nash Equilibrium for stakeholders, in combination with the exploitation of effective business models of contents industry.

Digital Rights Management, Game Theory, Trusted Computing, Algorithm, Simulation

上传时间

2010年04月28日

【期刊论文】Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies

张志勇, Zhiyong Zhang, Jiexin Pu, Qingtao Wu, Lili Zhang, Danmei Niu

,-0001,():

-1年11月30日

摘要

In recent decade, DRM (Digital Rights Management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value chain. An analytic hierarchy structure and its algorithm on the assessment on utility factors’ weights for DRM security policies were proposed based on Fuzzy Analytic Hierarchy Process, and then Swarm simulation experiments were further made on the adoptions of typical security policies in combination with the gained weight values. The simulation results show the proposed approach to fuzzy assessments effectively implements rational and optimal decision-making on security policies combinations.

Digital Rights Management, Fuzzy Analytic Hierarchy Process, Decision Theory, Security Policy, Swarm Simulation

上传时间

2010年04月28日

【期刊论文】Fuzzy Risk Assessments on Security Policies for Digital Rights Management

张志勇, Zhiyong Zhang;¤, Shiguo Lian, Qingqi Pei, Jiexin Pu

,-0001,():

-1年11月30日

摘要

In multimedia consuming, Digital Rights Management (DRM) is the important means to con¯rm the bene¯ts of both digital contents/services providers and consumers. To keep the DRM system running in order, risk management should be adopted, which identi¯es and assesses the DRM system's security level. Now, the legitimate sharing of copyrighted digital content is still an open issue, which faces severe risks of propertied assets circumvention and copyright infringe-ments. In this paper, we try to highlight a multi-disciplinary method for all-around examinations on risks to digital assets in the contents sharing scenario. The method is a qualitative and quantitative fuzzy risk assessment, which is used for estimating a novel concept called Risk-Controlled Utility (RCU) in DRM. Then, we emphasize on an application case of the emerging trusted computing policy, and analyze the in°uences of di®erent content sharing modes. Finally, we address a business model with some simulation results. The comparison with other methods shows that the fusion of qualitative and quantitative styles can not only evaluate the RCU with uncertain risk events e®ectively, but also provide accurate assessment data for the security policies of DRM.

Digital Rights Management, Risk Management, Fuzzy Risk Assess-ment, Security Policy, Trusted Computing, Qualitative and Quantitative Analysis

合作学者

  • 张志勇 邀请

    河南科技大学,河南

    尚未开通主页