计算机科学 ›› 2011, Vol. 38 ›› Issue (3): 24-27.

• 计算机网络与信息安全 • 上一篇    下一篇

数字版权管理安全性评测模型研究

李润峰,马兆丰,杨义先,钮心忻   

  1. (北京邮电大学网络与交换技术国家重点实验室信息安全中心 北京100876);(北京邮电大学网络与信息攻防技术教育部重点实验室 北京100876)
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家973项目(2007CB311203),国家自然科学基金(60803157,90812001),国家242项目(2009A105),国家标准制定计划(20080200-T-339),国家质检公益性科研专项(10-126)资助。

Research on Security Evaluation Model of DRM System

LI Run-feng,MA Zhao-feng,YANG Yi-xian,NIU Xin-xin   

  • Online:2018-11-16 Published:2018-11-16

摘要: 根据多种现有的数字版权管理系统的设计和实现方案,提出了构成数字版权管理(Digital Rights Management , DRM)系统的最小子集和典型的系统构成。针对常见的攻击举例,设计了DRM系统安全性评价指标,指标中包含了攻击后防御强度。提出了使用层次分析法来评价DRM系统的安全性模型。在评价安全性时,依据算法、商业秘密、软件防破解能力等安全性基础进行评价。最后,使用提出的指标对现有的两种数字版权管理系统进行了评价,给出了评价的数量指标,并进行了对比评价分析,分析结果验证了评价模型的合理性。

关键词: 数字版权管理,攻击后防御强度,安全性评测,层次分析法

Abstract: According to the design patterns and implementations of many existing digital rights management systems, a minimal set of DRM system and a typical DRM system were designed. Against to the usual attack, some evaluation indices were proposed in this article. One of the indices is defense intensity after attack. AHP is used in the evaluation model of the security of DRM system. To evaluate the security, encrypt algorithm, commercial secret and the ability of anticrack were proposed as foundation of security. In the last part, two existing DRM systems were evaluated using the indices and the quantitative indicators which were given.The result of contrastive experiment indicates that the security evaluation model of DRM system is rational.

Key words: Digital rights management,Defense intensity after attack,Security evaluation,AHP

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!