摘要 | 第1-7页 |
Abstract | 第7-10页 |
Table of Content | 第10-14页 |
List of Figures | 第14-16页 |
List of Tables | 第16-17页 |
List of Abbreviations | 第17-19页 |
1 Introduction | 第19-39页 |
·Research Motivation and Scope | 第19-20页 |
·State-of-The-Art DRM | 第20-35页 |
·Cryptographic Security & Digital Watermarking | 第21-25页 |
·Cryptographic Techniques and Security Mechanisms | 第21-23页 |
·Digital Watermarking and Copyright Infringement Tracing | 第23-25页 |
·Digital Rights Expression and Usage Control | 第25-28页 |
·Trusted Computing and DRM | 第28-31页 |
·User Privacy Protection and Contents Security | 第31-33页 |
·Consumer Privacy Protection | 第31-32页 |
·Contents Security | 第32-33页 |
·DRM Trust Models | 第33-35页 |
·PKI-Based OMA DRM Trust Model | 第33-34页 |
·Web of Trust in DRM Ecosystem | 第34-35页 |
·Research Objective and Main Contributions | 第35-37页 |
·Thesis Outline | 第37-39页 |
2 Formalized DRM Security-Utility and Game-Theoretical Analysis | 第39-59页 |
·DRM Security and Trust | 第40-45页 |
·A Generic Contents Value Chain Ecosystem | 第40-42页 |
·Requirements for Security and Trust in DRM | 第42-45页 |
·Fundamental Security Requirements | 第42-43页 |
·Essential Trust Relations | 第43-44页 |
·Conceptual Multi-Participant Trust Architecture | 第44-45页 |
·Formalized Game-Theoretical Adoptions of Security Policies | 第45-50页 |
·DRM Security Policies and Properties | 第46-48页 |
·Non-Cooperative Game on Security Polices | 第48-49页 |
·Cooperative Game on Security Polices | 第49-50页 |
·Fuzzy Analytic Hierarchy Process on Utility-Factor Weights | 第50-52页 |
·Analytic Hierarchy Process and Fuzzy Assessment | 第50页 |
·Hierarchy Process Structure and Consistency Matrix | 第50-51页 |
·FAHP-Based Weights Assessment | 第51-52页 |
·Risk Utility of Security Policy | 第52-58页 |
·Security Risk Management and Utility Category | 第52-54页 |
·Pros and Cons of Qualitative and Quantitative Assessments | 第54-55页 |
·An Analytic Approach to Risk-Controlled Uti-lity | 第55-58页 |
·Poisson Probability and VaR-based Calculation on AR~2O | 第56页 |
·EF and UD Estimation by using Fuzzy Triangle Function | 第56-58页 |
·Conclusion | 第58-59页 |
3 Enhanced Security Policies for DRM | 第59-95页 |
·Trusted Computing and Remote Attestation | 第60-64页 |
·Trusted Computing and Its Features | 第60-61页 |
·Remote Attestation | 第61-64页 |
·AP~2RA Model and Secure Protocol | 第64-74页 |
·Privacy Protection and AP~2RA Model | 第64-69页 |
·AP~2RA Model and Components | 第64-66页 |
·AP~2RA-Enabling Xen Platform | 第66-67页 |
·Formalized AP~2RA | 第67-69页 |
·Security Protocol | 第69-72页 |
·Attack Model | 第69-70页 |
·Secure Protocol | 第70-72页 |
·Analysis and Comparisons | 第72-74页 |
·Trusted Computing-enabled Digital Rights Sharing | 第74-90页 |
·Usage Control with Delegation Characteristics | 第74-81页 |
·UCON Framework and Delegation Objective | 第76页 |
·Delegation Properties | 第76-77页 |
·UCOND Formalized Definitions | 第77-81页 |
·Fine-Grained Digital Rights Transfer Policy | 第81-82页 |
·Fundamental Characteristics of Rights Transfer | 第81-82页 |
·Fine-grained rights delegation specification | 第82页 |
·AP~2RA-Based Contents Dissemination System | 第82-85页 |
·Trusted Distribution on Transferable Rights | 第85-90页 |
·DRM Architecture | 第85-87页 |
·RO Trusted Distribution Protocol | 第87-88页 |
·TRO Trusted Distribution and Enforcement Protocol | 第88-90页 |
·Performances Analysis and Comparisons | 第90页 |
·Digital Rights Negotiation and Contents Security | 第90-94页 |
·Transaction-Based Digital Rights Negotiation | 第90-93页 |
·Contents Verification and Trusted Execution | 第93-94页 |
·Conclusion | 第94-95页 |
4 Basic Security-Utility and Game Analysis in Contents Acquisition Scenario | 第95-115页 |
·DRM Typical Security Policies | 第95-98页 |
·Typical Security Policy Set | 第96-97页 |
·Security Policies Relativity | 第97-98页 |
·Security Utility Analysis | 第98-103页 |
·Payoff Functions of Security Policies Combinations | 第99-100页 |
·Util-ity-Factors Weights Assessment and Calculation | 第100-103页 |
·Non-Cooperative Game on Typical Policies Set | 第103-110页 |
·A Non-Cooperative Game Model | 第104-106页 |
·Nash Equilibriums and Conditions | 第106-107页 |
·Swarm Simulations and Discussions | 第107-110页 |
·Cooperative Game for Typical Policies | 第110-113页 |
·Security Benefits Super-Additiontivity and Convexity | 第110-112页 |
·Establishment of Multi-Participant Cooperation | 第112-113页 |
·Conclusion | 第113-115页 |
5 Security Policies Analysis and Risk Assessment in Contents Sharing Scenario | 第115-137页 |
·Rights Delegation and Transfer for Contents Sharing | 第115-117页 |
·Dynamic and Mixed Game for Contents Sharing | 第117-120页 |
·Rights Sharing Tree and DMG | 第117-120页 |
·An Algorithm for DMG | 第120页 |
·Swarm-Based Simulation Experiments | 第120-127页 |
·Basic Simulation Environment and Procedure | 第122页 |
·Simulations Experiments on Different Sharing Modes | 第122-127页 |
·Risk-Controlled Util-ity Analysis and Business Model | 第127-135页 |
·Risk Utility of TC-Enabling Security Policy | 第127-129页 |
·Sharing Modes and Maximum Benefits of Contents Purveyor | 第129-131页 |
·Simulation Experiments | 第131-133页 |
·Related Discussions and Business Model | 第133-135页 |
·Conclusion | 第135-137页 |
6 Conclusions and Future Works | 第137-141页 |
·Conclusive Remarks | 第137-139页 |
·Future Works | 第139-141页 |
Acknowledgements | 第141-143页 |
致谢 | 第143-145页 |
References | 第145-159页 |
Appendix A | 第159-165页 |
Research Works and Published Papers for Ph.D.Degree | 第165-168页 |