Computer Science ›› 2011, Vol. 38 ›› Issue (3): 24-27.

Previous Articles     Next Articles

Research on Security Evaluation Model of DRM System

LI Run-feng,MA Zhao-feng,YANG Yi-xian,NIU Xin-xin   

  • Online:2018-11-16 Published:2018-11-16

Abstract: According to the design patterns and implementations of many existing digital rights management systems, a minimal set of DRM system and a typical DRM system were designed. Against to the usual attack, some evaluation indices were proposed in this article. One of the indices is defense intensity after attack. AHP is used in the evaluation model of the security of DRM system. To evaluate the security, encrypt algorithm, commercial secret and the ability of anticrack were proposed as foundation of security. In the last part, two existing DRM systems were evaluated using the indices and the quantitative indicators which were given.The result of contrastive experiment indicates that the security evaluation model of DRM system is rational.

Key words: Digital rights management,Defense intensity after attack,Security evaluation,AHP

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!