• Article
  • | |
  • Metrics
  • |
  • Reference [23]
  • |
  • Related [20]
  • |
  • Cited by [2]
  • | |
  • Comments
    Abstract:

    Due to the absence of actual obligation description and implementation abilities in existing DRM (digital rights management) mechanism, this paper presents an obligation authorization model and its implementation framework that can be applied in DRM. The model is based on distributed temporal logic and Active-U-Datalog rules, which empowers the model to express event-driven, time-driven, obligation compensation and other semantics of obligation descriptions, and also give the model a favorable feasibility of implementation. The semantics and syntax of the model are analyzed and explained. And the implementation mechanism of the model is discussed. Finally, the implementation, application and expressiveness of the model are showed and illustrated. The model improves the flexibility and capability of usage control of data in DRM system.

    Reference
    [1] Sandhu R, Park J. Usage control: a vision for next generation access control. In: Gorodetski V, Popyack L, Skormin V, eds. Proc. of the MMM-ACNS-2003. LNCS 2776, Heidelberg: Springer-Verlag, 2003. 17?31.
    [2] Jajodia S, Samarati P, Sapino ML, Subrahmanian VS. Flexible support for multiple access control policies. ACM Trans. on Database System, 2001,26(2):214?260. [doi: 10.1145/383891.383894]
    [3] Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. on Database Systems, 1998,23(3):231?285. [doi: 10.1145/293910.293151]
    [4] Cholewka DG, Botha RA, Eloff JHP. A context-sensitive access control model and prototype implementation. In: Qing SH, Eloff JHP, eds. Proc. of the IFIP TC11 15th Annual Working Conf. on Information Security for Global Information Infrastructures. Deventer: Kluwer Academic Publisher, 2000. 341?350.
    [5] Pucella R, Weissman V. Reasoning about dynamic policies. In: Walukiewicz I, ed. Proc. of the FoSSaCS 2004. LNCS 2987, Heidelberg: Springer-Verlag, 2004. 453?467.
    [6] Bettini C, Jajodia S, Wang XS, Wijesekera D. Provisions and obligations in policy management and security applications. In: Bernstein PA, Loannidis YE, Ramakrishnan R, eds. Proc. of the 28th Int’l Conf. on Very Large Data Bases. Hong Kong: Morgan Kaufmann Publishers, 2002. 502?513.
    [7] Hilty M, Basin D, Pretschner A. On obligations. In: Capitani VS, Syverson P, Gollmann D, eds. Proc. of the 10th European Symp. on Research in Computer Security. LNCS 3679, Heidelberg: Springer-Verlag, 2005. 98?117.
    [8] Irwin K, Yu T, Winsborough WH. On the modeling and analysis of obligations. In: Rebecca NW, Sabrian CV, Vitaly S, eds. Proc. of the 13th ACM Conf. on Computer and Communication Security. New York: ACM Press, 2006. 134?143.
    [9] Dougherty DJ, Fisler K, Krishnamurthi S. Obligations and their interaction with programs. In: Joachim B, Javier L, eds. Proc. of the 12th European Symp. on Research In Computer Security. LNCS 4734, Heidelberg: Springer-Verlag, 2007. 375?389.
    [10] Barth A, Datta A, Mitchell JC, Nissenbaum H. Privacy and contextual integrity: Framework and application. In: Proc. of the 27th IEEE Symp. on Security and Privacy. New York: IEEE Press, 2006. 184?198.
    [11] Hilty M, Pretschner A, Basin D, Schaefer C, Walter T. A policy language for distributed usage control. In: Joachim B, Javier L, eds. Proc. of the 12th European Symp. on Research in Computer Security. LNCS 4734, Heidelberg: Springer-Verlag, 2007. 531?546.
    [12] Daoampi N, Dulay N, Lupu E, Sloman M. The ponder policy specification language. In: Broy M, Jahnichen S, eds. Proc. of the Policy 2001. LNCS 1995, Heidelberg: Springer-Verlag, 2001. 18?39.
    [13] Lobo J, Bhatia R, Naqvi S. A policy description language. In: Proc. of the 16th National Conf. on Artificial Intelligence. Menlo Park: American Association for Artificial Intelligence, 1999. 291?298.
    [14] Gama P, Ferreira P. Obligation policies: An enforcement platform. In: Proc. of the 6th IEEE Int’l Workshop on Policies for Distributed Systems and Networks. New York: IEEE Press, 2005. 203?212.
    [15] Sailer M, Morciniec M. Monitoring and execution for contract compliance. Technical Report, HPL-2001-261R1, Bristol: Hewlett Packard Laboratories, 2001. http://www.hpl.hp.com/techreports/2001/HPL-2001-261R1.html
    [16] Skene J, Skene A, Crampton J, Emmerich W. The monitorability of service-level agreements for application-service provision. In: Proc. of the 6th Int’l Workshop on Software and Performance. New York: ACM Press, 2007. 3?14.
    [17] Zhong Y, Qin XL, Liu FY. Logical implementation mechanism for ODRL rights expression language. Computer Science, 2009, 36(4):133?139 (in Chinese with English abstract).
    [18] Bertino E, Catania B, Gervasi V, Raffaetà A. Active-U-Datalog: Integrating active rules in a logical update languages. In: Decker H, Freitag B, Kifer M, Voronkov A, eds. Proc. of the Int’l Seminar on Logic Databases and the Meaning of Change. LNCS 1472, Heidelberg: Springer-Verlag, 1998. 107?133.
    [19] Zhong Y, Qin XL, Zheng JP, Lin DM. A flexible usage control authorization language framework. Chinese Journal of Computers, 2006,29(8):1408?1418 (in Chinese with English abstract).
    [20] Mont MC. Dealing with privacy obligations in enterprises. Technical Report, HPL-2004-109, Bristol: Hewlett Packard Laboratories, 2004. http://www.hpl.hp.com/techreports/2004/HPL-2004-109.pdf
    [21] Chong CN, Ren B, Doumen J, Etalle S, Hartel PH, Corin R. License protection with a tamper-resistant token. In: Chae HL, Moti Y, eds. Proc. of the 5th Int’l Workshop Information Security Applications. LNCS 3325, Heidelberg: Springer-Verlag, 2004. 223?227.
    附中文参考文献: [17] 钟勇,秦小膦,刘凤玉.ODRL权利描述语言逻辑实施机制研究.计算机科学,2009,36(4):133?139.
    [19] 钟勇,秦小麟,郑吉平,林冬梅.一种灵活的使用控制授权语言框架.计算机学报,2006,29(8):1408?1418.
Get Citation

钟 勇,秦小麟,刘凤玉.一种面向DRM的责任授权模型及其实施框架.软件学报,2010,21(8):2059-2069

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:October 08,2008
  • Revised:April 27,2009
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063