Based on field survey in Ya'ergou Village,Yuanzhou District,Guyuan City,the Ningxia Hui Autonomous Region,we analyze the status quo of the transfer of land contractual management rights in this village,and study t...Based on field survey in Ya'ergou Village,Yuanzhou District,Guyuan City,the Ningxia Hui Autonomous Region,we analyze the status quo of the transfer of land contractual management rights in this village,and study the basic information,form,characteristics,and problems concerning the transfer of land contractual management rights in this nationality village.Then corresponding countermeasures are put forward for promoting the transfer of land contractual management rights in ethnic village as follows:strengthening the publicity of the policy in order to improve farmers' ideological understanding;raising the rent in order to promote the transfer of the land contractual management rights;diverting the governmental investment to the talented people within village;consolidating management and resolving disputes in the transfer timely and effectively.展开更多
With the approval of the State Council, State Economicand Trade Commission, Ministry of Foreign Trade and EconomicCooperation and Ministry of Internal Trade recently issued theCircular Regarding Some Relevant Issues i...With the approval of the State Council, State Economicand Trade Commission, Ministry of Foreign Trade and EconomicCooperation and Ministry of Internal Trade recently issued theCircular Regarding Some Relevant Issues in Granting Import andExport Management Rights to Commercial and Material SupplyEnterprises. It means that work ofgranting import and exportmanagement rights has from a trial been led onto the right path ofexamination and approval. The principle of examination and ap-proval, conditions, and the procedure of reporting to a higher in-stitution shall still be in conformity with the relevant regulationsprescribed in Decree No.76 (1993) of the State Council.In November 1993, the State Council approved and trans-mitted Opinions on Experiment of Granting Import and ExportManagement Rights to Some Commercial and Material Enterprisesby State Economic and Trade Commision, Ministry of ForeignTrade and Economic Cooperation and Ministry of Internal Trade.Totaling 206 commercial (including grain and supply and sale)and material supply enterprises are put to trial and granted展开更多
Henan is a large agricultural province and one of China’s major grain-producing areas. Agricultural land transfer and large-scale operations will have a profound impact on regional economic development and food secur...Henan is a large agricultural province and one of China’s major grain-producing areas. Agricultural land transfer and large-scale operations will have a profound impact on regional economic development and food security. This is a case study taken in Xiwan village in Qinyang city, Henan. This paper builds a transferring pricing model using land use rights assessment and characteristic correction of land contract and management rights. Results show that the transferring price of land contract and management rights should include the economic price, social price and corrected price. The use of a price model should focus on the distinction of theory and practical application. If there is no change in agricultural project,the actual transferring price should be the sum of the economic price and social security price. If there is a change in agricultural projects,such as cropland into cash crops,the actual transferring price should be the sum of the economic price, social price and corrected price. Because of the complexity of income distribution following the transfer, transferring gains should follow a rational distribution in the outflow side, inflow side, managers and land owner. The government should establish reasonable and orderly contracted management of land circulation transferring and use this to build a land transferring price system.展开更多
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased direc...The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased directly from the market,and about,1,000 locallyproduced electronic titles.The locally produced titles are notavailable in the market but require local digitization andnegotiation with publishers with regard to the right to use(RTU)them so as to meet the learning needs of the OUHKcommunity.Nearl...展开更多
EDITOR'S NOTE: Human rights protection in prisons is an important part of China's National Human Rights Action Plan and the human rights conditions in prisons constitute an important hallmark of the human rights pr...EDITOR'S NOTE: Human rights protection in prisons is an important part of China's National Human Rights Action Plan and the human rights conditions in prisons constitute an important hallmark of the human rights protection level of the country. In order to get to know more about human rights protection in this special area, this reporter paid a visit to the No. 4 Prison in Henan Province, central China.展开更多
The affirmation registration and certification of land contracted management right are the essential conditions for the effective promotion of land management right circulation and the development of agricultural mode...The affirmation registration and certification of land contracted management right are the essential conditions for the effective promotion of land management right circulation and the development of agricultural moderate scale management. However, the following problems are found in the process of the pilot work: insufficient propaganda work, inconsistent recognition of affirmation registration work, low enthusiasm of grass-roots work; lack of unified regulations, each company working on their own; requiring large amount of manpower and resources for rural land contracted management rights, and severe shortage of national and municipal inputs; incomplete land ownership information and lack of marks between land plots, leading to resolving difficulty of the disputes; urgent need of strengthening subsequent work, untimely adjustment of related policies. Therefore, it needs to intensify propaganda, so that farmers can know the land right confirmation registration and certifi- cation, and recognize its importance; unify the introduction of job specification and results storage standard, making it convenient for the unified use of the results unified; set up special funds, and make experiments first in the areas with better economic conditions; establish arbitral institutions for land ownership disputes; earnestly make great effort to the supporting and subsequent work for right confirmation registration, and give full play to the role of land registration results.展开更多
The status quo and significance of contract and management right transfer of rural land are analyzed,and major problems existed in contract and management right transfer of rural land in Anhui Province are studied,con...The status quo and significance of contract and management right transfer of rural land are analyzed,and major problems existed in contract and management right transfer of rural land in Anhui Province are studied,containing unsound transfer market,insufficient flow demand motion,single transfer form,non-standard register,right determination and certificate issuing. On this basis,several policies and suggestions are proposed,such as combining practical use with suitable use of land right determination and certificate issuing,establishing multilayer rural social security system and expanding land management range.展开更多
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, ...This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption registration for content fair distribution, of the model are all provided. The scheme also provides distribution and evidence for using the copyright of digital content fairly and effectively. Finally, analysis shows the proposed model has both high security and good performance.展开更多
We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent ...We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given.展开更多
Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violat...Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violated w ay is one of most important issues to take into account. In this paper, a novel and efficient authorization and authentication Digital Rights Management (DRM) s chema is proposed firstly for secure multimedia delivery, then based on the sche ma, a real-time digital signature algorithm built on Elliptic Curve Cryptograph y (ECC) is adopted for fast authentication and verification of licensing managem ent, thus secure multimedia delivery via TCP/RTP can efficiently work with real -time transaction response and high Quality of Service (QoS) . Performance eval uations manifest the proposed schema is secure, available for real-time media s tream authentication and authorization without much effected of QoS. The propose d schema is not only available for Client/Server media service but can be easily extended to P2P and broadcasting network for trusted rights management.展开更多
From the perspective of civil subject theory,law of value,comparative law and history of laws,the thesis expounds that the contract on the transfer of the contractual right of rural lands is in nature a civil contract...From the perspective of civil subject theory,law of value,comparative law and history of laws,the thesis expounds that the contract on the transfer of the contractual right of rural lands is in nature a civil contract instead of an administrative one.Then it explores the defects in the contract from the viewpoint of legal value goal,contract law and legal sociology,that is,the relevant provisions in Rural Land Contract Law and Explanations of Supreme People's Court about the Issues concerning the Laws Applicable to the Trial of Cases of Disputes over Rural Land Contracting go against the principle of free contracting and run counter to the legal value goal of justice,so they do not achieve good implementing effect.Finally,the thesis demonstrates and makes some practical legislative proposals to perfect the contract system for circulation of the right to operate constructed rural lands,aiming at improving the circulation rate through perfecting the contract of the right to rural land contractual management,solving the disputes in rural lands circulation and safeguarding the legitimate rights of the farmers.展开更多
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in...In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.展开更多
The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before s...The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient.展开更多
Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout ...Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout the world. We discuss the effect of existing copyright treaties and various proposals, such as compulsory licensing and the public lending fight that would allow access to copyrighted works without requiring permission of their owners. We argue that these schemes are ineffective for purposes of the UDL. Instead, making use of the international consensus that copyright does not protect facts, information or processes, we propose to scan works digitally to extract their intellectual content, and then generate by machine synthetic works that capture this content, and then translate the generated works automatically into multiple languages and distribute them free of copyright restriction.展开更多
In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by th...In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management(DRM)scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem.展开更多
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto...Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical.展开更多
Recently, the enterprises which had joined Japanese textile standard of self-regulation standards(that is white list management system) had been officially announced. Including Qingdao GuiHua knitting limited company,...Recently, the enterprises which had joined Japanese textile standard of self-regulation standards(that is white list management system) had been officially announced. Including Qingdao GuiHua knitting limited company, there are 32 companies accessed to white list qualification.展开更多
Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random numb...Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random number generator-based approaches, for example, logistics maps, are comparatively promising approachs, but are vulnerable to attacks by nonlinear dynamic forecasting. A composite chaotic cryptography scheme was developed to encrypt the compressed video with the logistics map with a Z(2311) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography. The scheme maintained real-time performance and flexibility of the chaotic sequence cryptography. The scheme also in-tegrated asymmetrical public-key cryptography and encryption and identity authentification of control pa-rameters at the initialization phase. Encryption is performed in a layered scheme based on the importance of the data in a compressed video stream. The composite chaotic cryptography scheme has the advantage that the value and updating frequency of the control parameters can be changed online to satisfy the net-work requirements and the processor capability, as well as the security requirements. Cryptanalysis shows that the scheme guarantees robust security,provides good real-time performance,and has flexible im-plementation. Statistical evaluations and tests verify that the scheme is effective.展开更多
文摘Based on field survey in Ya'ergou Village,Yuanzhou District,Guyuan City,the Ningxia Hui Autonomous Region,we analyze the status quo of the transfer of land contractual management rights in this village,and study the basic information,form,characteristics,and problems concerning the transfer of land contractual management rights in this nationality village.Then corresponding countermeasures are put forward for promoting the transfer of land contractual management rights in ethnic village as follows:strengthening the publicity of the policy in order to improve farmers' ideological understanding;raising the rent in order to promote the transfer of the land contractual management rights;diverting the governmental investment to the talented people within village;consolidating management and resolving disputes in the transfer timely and effectively.
文摘With the approval of the State Council, State Economicand Trade Commission, Ministry of Foreign Trade and EconomicCooperation and Ministry of Internal Trade recently issued theCircular Regarding Some Relevant Issues in Granting Import andExport Management Rights to Commercial and Material SupplyEnterprises. It means that work ofgranting import and exportmanagement rights has from a trial been led onto the right path ofexamination and approval. The principle of examination and ap-proval, conditions, and the procedure of reporting to a higher in-stitution shall still be in conformity with the relevant regulationsprescribed in Decree No.76 (1993) of the State Council.In November 1993, the State Council approved and trans-mitted Opinions on Experiment of Granting Import and ExportManagement Rights to Some Commercial and Material Enterprisesby State Economic and Trade Commision, Ministry of ForeignTrade and Economic Cooperation and Ministry of Internal Trade.Totaling 206 commercial (including grain and supply and sale)and material supply enterprises are put to trial and granted
基金Natural Sciences Foundation of China (No. 41130748)Key Knowledge Innovation Project of the CAS (No. KZCX2-EW-304)
文摘Henan is a large agricultural province and one of China’s major grain-producing areas. Agricultural land transfer and large-scale operations will have a profound impact on regional economic development and food security. This is a case study taken in Xiwan village in Qinyang city, Henan. This paper builds a transferring pricing model using land use rights assessment and characteristic correction of land contract and management rights. Results show that the transferring price of land contract and management rights should include the economic price, social price and corrected price. The use of a price model should focus on the distinction of theory and practical application. If there is no change in agricultural project,the actual transferring price should be the sum of the economic price and social security price. If there is a change in agricultural projects,such as cropland into cash crops,the actual transferring price should be the sum of the economic price, social price and corrected price. Because of the complexity of income distribution following the transfer, transferring gains should follow a rational distribution in the outflow side, inflow side, managers and land owner. The government should establish reasonable and orderly contracted management of land circulation transferring and use this to build a land transferring price system.
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
文摘The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It currently houses 7,300+electronictexts,including free electronic titles,electronic titlespurchased directly from the market,and about,1,000 locallyproduced electronic titles.The locally produced titles are notavailable in the market but require local digitization andnegotiation with publishers with regard to the right to use(RTU)them so as to meet the learning needs of the OUHKcommunity.Nearl...
文摘EDITOR'S NOTE: Human rights protection in prisons is an important part of China's National Human Rights Action Plan and the human rights conditions in prisons constitute an important hallmark of the human rights protection level of the country. In order to get to know more about human rights protection in this special area, this reporter paid a visit to the No. 4 Prison in Henan Province, central China.
文摘The affirmation registration and certification of land contracted management right are the essential conditions for the effective promotion of land management right circulation and the development of agricultural moderate scale management. However, the following problems are found in the process of the pilot work: insufficient propaganda work, inconsistent recognition of affirmation registration work, low enthusiasm of grass-roots work; lack of unified regulations, each company working on their own; requiring large amount of manpower and resources for rural land contracted management rights, and severe shortage of national and municipal inputs; incomplete land ownership information and lack of marks between land plots, leading to resolving difficulty of the disputes; urgent need of strengthening subsequent work, untimely adjustment of related policies. Therefore, it needs to intensify propaganda, so that farmers can know the land right confirmation registration and certifi- cation, and recognize its importance; unify the introduction of job specification and results storage standard, making it convenient for the unified use of the results unified; set up special funds, and make experiments first in the areas with better economic conditions; establish arbitral institutions for land ownership disputes; earnestly make great effort to the supporting and subsequent work for right confirmation registration, and give full play to the role of land registration results.
文摘The status quo and significance of contract and management right transfer of rural land are analyzed,and major problems existed in contract and management right transfer of rural land in Anhui Province are studied,containing unsound transfer market,insufficient flow demand motion,single transfer form,non-standard register,right determination and certificate issuing. On this basis,several policies and suggestions are proposed,such as combining practical use with suitable use of land right determination and certificate issuing,establishing multilayer rural social security system and expanding land management range.
基金Supported by Scientific Research Common Programof Beijing Municipal Commission of Education( KM200610772008)the Graduate Innovation Fund of Xidian University(05001)
文摘This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption registration for content fair distribution, of the model are all provided. The scheme also provides distribution and evidence for using the copyright of digital content fairly and effectively. Finally, analysis shows the proposed model has both high security and good performance.
基金the National Natural Science Foundation of China (60502024)the Electronic Development Fund of Ministry of Informa-tion Industry of China ([2007]329)the Natural Science Foundation of Hubei Province (2005ABA267)
文摘We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given.
文摘Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violated w ay is one of most important issues to take into account. In this paper, a novel and efficient authorization and authentication Digital Rights Management (DRM) s chema is proposed firstly for secure multimedia delivery, then based on the sche ma, a real-time digital signature algorithm built on Elliptic Curve Cryptograph y (ECC) is adopted for fast authentication and verification of licensing managem ent, thus secure multimedia delivery via TCP/RTP can efficiently work with real -time transaction response and high Quality of Service (QoS) . Performance eval uations manifest the proposed schema is secure, available for real-time media s tream authentication and authorization without much effected of QoS. The propose d schema is not only available for Client/Server media service but can be easily extended to P2P and broadcasting network for trusted rights management.
基金Supported by the Research Project of Humanities and Social Sciencesat Universities(08KN020) launched by Guizhou Provincial Education Department
文摘From the perspective of civil subject theory,law of value,comparative law and history of laws,the thesis expounds that the contract on the transfer of the contractual right of rural lands is in nature a civil contract instead of an administrative one.Then it explores the defects in the contract from the viewpoint of legal value goal,contract law and legal sociology,that is,the relevant provisions in Rural Land Contract Law and Explanations of Supreme People's Court about the Issues concerning the Laws Applicable to the Trial of Cases of Disputes over Rural Land Contracting go against the principle of free contracting and run counter to the legal value goal of justice,so they do not achieve good implementing effect.Finally,the thesis demonstrates and makes some practical legislative proposals to perfect the contract system for circulation of the right to operate constructed rural lands,aiming at improving the circulation rate through perfecting the contract of the right to rural land contractual management,solving the disputes in rural lands circulation and safeguarding the legitimate rights of the farmers.
基金ACKNOWLEDGEMENTS This work has been supported by the National Natural Science Foundation of China under Grant No. 61272519, 61121061.
文摘In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.
基金supported by the National Natural Science Foundation of China(60803157,90812001,61272519)
文摘The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient.
文摘Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout the world. We discuss the effect of existing copyright treaties and various proposals, such as compulsory licensing and the public lending fight that would allow access to copyrighted works without requiring permission of their owners. We argue that these schemes are ineffective for purposes of the UDL. Instead, making use of the international consensus that copyright does not protect facts, information or processes, we propose to scan works digitally to extract their intellectual content, and then generate by machine synthetic works that capture this content, and then translate the generated works automatically into multiple languages and distribute them free of copyright restriction.
基金the National Science Council(No.NSC102-2221-E-327-013-MY3)
文摘In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management(DRM)scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem.
基金supported by the National Key Research and Development Program of China (2017YFB0802000)the National Natural Science Foundations of China (61672412,61972457)the National Cryptography Development Fund of China (MMJJ20170104, MMJJ20180219)。
文摘Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical.
文摘Recently, the enterprises which had joined Japanese textile standard of self-regulation standards(that is white list management system) had been officially announced. Including Qingdao GuiHua knitting limited company, there are 32 companies accessed to white list qualification.
基金Supported by the National Key Research Technology Project of the Ministry of Information Industry of China
文摘Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random number generator-based approaches, for example, logistics maps, are comparatively promising approachs, but are vulnerable to attacks by nonlinear dynamic forecasting. A composite chaotic cryptography scheme was developed to encrypt the compressed video with the logistics map with a Z(2311) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography. The scheme maintained real-time performance and flexibility of the chaotic sequence cryptography. The scheme also in-tegrated asymmetrical public-key cryptography and encryption and identity authentification of control pa-rameters at the initialization phase. Encryption is performed in a layered scheme based on the importance of the data in a compressed video stream. The composite chaotic cryptography scheme has the advantage that the value and updating frequency of the control parameters can be changed online to satisfy the net-work requirements and the processor capability, as well as the security requirements. Cryptanalysis shows that the scheme guarantees robust security,provides good real-time performance,and has flexible im-plementation. Statistical evaluations and tests verify that the scheme is effective.