The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyberspace situation awareness (CSA) is the base of cyberspace operations (CO). A right decision of CO is based on the correct awareness of the cyberspace situation. The paper analyzes two classical models, and then takes account of the characteristics of cyberspace operations, finally proposes a hierarchical, multi-perspectives model. The model employs three perspectives and four layers. The model...
China's housing policy has entered the monetization stage and forms a relatively stable housing supply system to meet the housing needs of different income groups. In order to improve the housing needy households especially for low-income families, the construction of indemnificatory housing is sped up. Indemnificatory housing consists of low-rent housing, affordable housing and policy-regulated rental...
Affordable housing system carried out more than ten years, which has made remarkable achievements in the protection of residents' basic housing needs as a core system. In recent years, affordable housing system is also facing quite a lot of controversy. The article analyze the defects of the system based on the formulation to implementation of the system, and learn from the advanced experience of...
In the last decades, Digital Rights Management (DRM) technology has been laid emphasis on digital contents protection and related security policies, mechanisms and implementation. In order to effectively protect digital assets with copyrights?? against piracy and misuse, it is necessary for the contents value chain as a whole to investigate on some open issues and advances. The paper proposed three...
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value...
Digital Rights Management ecosystem is composed of various participants, which adopt different security policies to meet their own security requirements, with a goal to achieve individual optimal benefits. However, from the perspective of the whole DRM-enabling contents industry, a simple adoption of several increasingly enhanced security policies does not necessarily implement an optimal benefit...
A multi-participant trust relationship is essential to implement a successful business transaction in DRM (digital rights management)-enabling digital contents industry. The simple adoption of several increasingly enhanced security policies does not necessarily establish the mutual trust relationship ultimately, and even has a negative effect on the usability and acceptability of DRM system. Therefore,...
A secure and trusted distribution of digital contents is a fundamental requirement for Digital Rights Management (DRM) system, so that the integrity of user terminal platform should be verified prior to contents' distribution in order to assure that the platform is free from a malicious modification and attack. Recent years the emerging trusted computing has better enhanced the necessary functionality,...
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights policy by using DRM agent. First, descriptions of extensible ODRL-based rights transfer policy were presented to complete OMA REL. Then, we introduced a remote attestation mechanism among...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.