| 摘要 | 第1-7页 |
| Abstract | 第7-10页 |
| Table of Content | 第10-14页 |
| List of Figures | 第14-16页 |
| List of Tables | 第16-17页 |
| List of Abbreviations | 第17-19页 |
| 1 Introduction | 第19-39页 |
| ·Research Motivation and Scope | 第19-20页 |
| ·State-of-The-Art DRM | 第20-35页 |
| ·Cryptographic Security & Digital Watermarking | 第21-25页 |
| ·Cryptographic Techniques and Security Mechanisms | 第21-23页 |
| ·Digital Watermarking and Copyright Infringement Tracing | 第23-25页 |
| ·Digital Rights Expression and Usage Control | 第25-28页 |
| ·Trusted Computing and DRM | 第28-31页 |
| ·User Privacy Protection and Contents Security | 第31-33页 |
| ·Consumer Privacy Protection | 第31-32页 |
| ·Contents Security | 第32-33页 |
| ·DRM Trust Models | 第33-35页 |
| ·PKI-Based OMA DRM Trust Model | 第33-34页 |
| ·Web of Trust in DRM Ecosystem | 第34-35页 |
| ·Research Objective and Main Contributions | 第35-37页 |
| ·Thesis Outline | 第37-39页 |
| 2 Formalized DRM Security-Utility and Game-Theoretical Analysis | 第39-59页 |
| ·DRM Security and Trust | 第40-45页 |
| ·A Generic Contents Value Chain Ecosystem | 第40-42页 |
| ·Requirements for Security and Trust in DRM | 第42-45页 |
| ·Fundamental Security Requirements | 第42-43页 |
| ·Essential Trust Relations | 第43-44页 |
| ·Conceptual Multi-Participant Trust Architecture | 第44-45页 |
| ·Formalized Game-Theoretical Adoptions of Security Policies | 第45-50页 |
| ·DRM Security Policies and Properties | 第46-48页 |
| ·Non-Cooperative Game on Security Polices | 第48-49页 |
| ·Cooperative Game on Security Polices | 第49-50页 |
| ·Fuzzy Analytic Hierarchy Process on Utility-Factor Weights | 第50-52页 |
| ·Analytic Hierarchy Process and Fuzzy Assessment | 第50页 |
| ·Hierarchy Process Structure and Consistency Matrix | 第50-51页 |
| ·FAHP-Based Weights Assessment | 第51-52页 |
| ·Risk Utility of Security Policy | 第52-58页 |
| ·Security Risk Management and Utility Category | 第52-54页 |
| ·Pros and Cons of Qualitative and Quantitative Assessments | 第54-55页 |
| ·An Analytic Approach to Risk-Controlled Uti-lity | 第55-58页 |
| ·Poisson Probability and VaR-based Calculation on AR~2O | 第56页 |
| ·EF and UD Estimation by using Fuzzy Triangle Function | 第56-58页 |
| ·Conclusion | 第58-59页 |
| 3 Enhanced Security Policies for DRM | 第59-95页 |
| ·Trusted Computing and Remote Attestation | 第60-64页 |
| ·Trusted Computing and Its Features | 第60-61页 |
| ·Remote Attestation | 第61-64页 |
| ·AP~2RA Model and Secure Protocol | 第64-74页 |
| ·Privacy Protection and AP~2RA Model | 第64-69页 |
| ·AP~2RA Model and Components | 第64-66页 |
| ·AP~2RA-Enabling Xen Platform | 第66-67页 |
| ·Formalized AP~2RA | 第67-69页 |
| ·Security Protocol | 第69-72页 |
| ·Attack Model | 第69-70页 |
| ·Secure Protocol | 第70-72页 |
| ·Analysis and Comparisons | 第72-74页 |
| ·Trusted Computing-enabled Digital Rights Sharing | 第74-90页 |
| ·Usage Control with Delegation Characteristics | 第74-81页 |
| ·UCON Framework and Delegation Objective | 第76页 |
| ·Delegation Properties | 第76-77页 |
| ·UCOND Formalized Definitions | 第77-81页 |
| ·Fine-Grained Digital Rights Transfer Policy | 第81-82页 |
| ·Fundamental Characteristics of Rights Transfer | 第81-82页 |
| ·Fine-grained rights delegation specification | 第82页 |
| ·AP~2RA-Based Contents Dissemination System | 第82-85页 |
| ·Trusted Distribution on Transferable Rights | 第85-90页 |
| ·DRM Architecture | 第85-87页 |
| ·RO Trusted Distribution Protocol | 第87-88页 |
| ·TRO Trusted Distribution and Enforcement Protocol | 第88-90页 |
| ·Performances Analysis and Comparisons | 第90页 |
| ·Digital Rights Negotiation and Contents Security | 第90-94页 |
| ·Transaction-Based Digital Rights Negotiation | 第90-93页 |
| ·Contents Verification and Trusted Execution | 第93-94页 |
| ·Conclusion | 第94-95页 |
| 4 Basic Security-Utility and Game Analysis in Contents Acquisition Scenario | 第95-115页 |
| ·DRM Typical Security Policies | 第95-98页 |
| ·Typical Security Policy Set | 第96-97页 |
| ·Security Policies Relativity | 第97-98页 |
| ·Security Utility Analysis | 第98-103页 |
| ·Payoff Functions of Security Policies Combinations | 第99-100页 |
| ·Util-ity-Factors Weights Assessment and Calculation | 第100-103页 |
| ·Non-Cooperative Game on Typical Policies Set | 第103-110页 |
| ·A Non-Cooperative Game Model | 第104-106页 |
| ·Nash Equilibriums and Conditions | 第106-107页 |
| ·Swarm Simulations and Discussions | 第107-110页 |
| ·Cooperative Game for Typical Policies | 第110-113页 |
| ·Security Benefits Super-Additiontivity and Convexity | 第110-112页 |
| ·Establishment of Multi-Participant Cooperation | 第112-113页 |
| ·Conclusion | 第113-115页 |
| 5 Security Policies Analysis and Risk Assessment in Contents Sharing Scenario | 第115-137页 |
| ·Rights Delegation and Transfer for Contents Sharing | 第115-117页 |
| ·Dynamic and Mixed Game for Contents Sharing | 第117-120页 |
| ·Rights Sharing Tree and DMG | 第117-120页 |
| ·An Algorithm for DMG | 第120页 |
| ·Swarm-Based Simulation Experiments | 第120-127页 |
| ·Basic Simulation Environment and Procedure | 第122页 |
| ·Simulations Experiments on Different Sharing Modes | 第122-127页 |
| ·Risk-Controlled Util-ity Analysis and Business Model | 第127-135页 |
| ·Risk Utility of TC-Enabling Security Policy | 第127-129页 |
| ·Sharing Modes and Maximum Benefits of Contents Purveyor | 第129-131页 |
| ·Simulation Experiments | 第131-133页 |
| ·Related Discussions and Business Model | 第133-135页 |
| ·Conclusion | 第135-137页 |
| 6 Conclusions and Future Works | 第137-141页 |
| ·Conclusive Remarks | 第137-139页 |
| ·Future Works | 第139-141页 |
| Acknowledgements | 第141-143页 |
| 致谢 | 第143-145页 |
| References | 第145-159页 |
| Appendix A | 第159-165页 |
| Research Works and Published Papers for Ph.D.Degree | 第165-168页 |