跳到主要內容

臺灣博碩士論文加值系統

(3.231.230.177) 您好!臺灣時間:2021/08/02 09:31
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:許婉琳
研究生(外文):Wan-lin Hsu
論文名稱:以服務導向架構為基礎之企業數位版權管理研究
論文名稱(外文):A Study on Enterprise Digital Rights Management Based on Service Oriented Architecture
指導教授:廖鴻圖廖鴻圖引用關係郭明煌郭明煌引用關係許素華許素華引用關係
指導教授(外文):Horng-twu LiawMing-huang GuoSuh-hwa Sheu
學位類別:碩士
校院名稱:世新大學
系所名稱:資訊管理學研究所(含碩專班)
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:中文
論文頁數:102
中文關鍵詞:數位版權管理企業數位版權管理服務導向架構
外文關鍵詞:Digital Rights ManagementEnterprise Digital Rights ManagementService Oriented Architecture
相關次數:
  • 被引用被引用:0
  • 點閱點閱:131
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
  拜科技發展快速之賜,數位產品產業日益蓬勃發展;然而對於數位產品的銷售而言,盜版問題一直是很大的打擊。為了解決上述問題,及積極主動的控管數位產品存取與使用權限,所以數位版權管理機制應運而出。
  電子文件是最常被企業使用的數位產品之一,且在成本與環保的考量下,企業對於電子文件的需求日益增加。為了避免這些企業電子文件於交換時的發生洩密情況,適當的文件存取保護機制是必要的。本論文提出以服務導向架構(Service Oriented Architecture, SOA)為環境,適合企業使用的企業數位版權管理(Enterprise Digital Rights Management, E-DRM)。本論文所提之機制將以達到保護企業文件的目的,並在企業互信基礎下,作到跨企業之文件共享。
  Technology were developed rapidly, digital products industry are expanded flourishing. It is still a huge problem about revolt for the sales volume of digital products. Therefore, they adopted Digital Rights Management reducing problem, and it was also controlled their publication positively.
  Electronic documents are the one of digital products that was offend used in enterprise, it thinking about cost and environment, it was necessary to increase the use of electronic documents. Avoiding those electronic documents was distributed on the process of changing, it is necessary to have a suitable protect mechanism of files access. Consequently, this paper proves Enterprise Digital Rights Management based on Service Oriented Architecture. The architecture is applicable to enterprise. And attaining to share files of cross the enterprise in the base of trust.
誌謝 I
摘要 II
Abstract III
目錄 IV
圖目錄 VI
表目錄 VII
第一章 緒論 1
1.1 研究動機 1
1.2 研究目的 2
1.3 研究範圍 3
1.4 論文架構 3
第二章 文獻探討 4
2.1 數位內容 4
2.2 數位版權管理 4
2.2.1 概念 5
2.2.2 規範 5
2.2.3 應用 5
2.2.4 RBAC與DRM比較 6
2.2.5 DRM相關研究介紹 8
2.3 企業數位版權管理 12
2.3.1 企業安全之議題 12
2.3.2 E-DRM起源 14
2.3.3 E-DRM架構 14
2.3.4 E-DRM之需求觀點 16
2.3.5 E-DRM推動之問題 19
2.3.6 E-DRM相關研究介紹 20
2.4 DRM與E-DRM的差異 25
2.5 小結 27
第三章 相關理論與技術 29
3.1 加密方法 29
3.2 RSA 29
3.3 憑證 33
3.4 攻擊手法 34
3.4.1 竊取攻擊 34
3.4.2 偽造攻擊 36
3.5 服務導向架構 37
3.5.1 IBM SOA 38
3.5.2 微軟SOA 39
3.5.3 OASIS SOA 40
第四章 一個適用於SOA架構下的E-DRM機制 47
4.1 系統特色及說明 47
4.2 系統假設 47
4.3 系統架構 48
4.4 系統服務目標及規範 48
4.5 系統各階段說明 52
4.5.1 註冊階段 53
4.5.2 取得平台使用階段 55
4.5.3 取得文件使用階段 57
4.5.4 跨企業取得平台使用階段 60
4.5.5 跨企業取得文件階段 62
4.5.6 新企業加入階段 66
第五章 分析與討論 69
5.1 SOA特性分析 69
5.2 需求分析 70
5.3 企業安全議題之分析 74
5.4 安全性分析 75
5.4.1 情境角色 76
5.4.2 模擬情境 76
5.4.3 情境分析 77
5.5 小結 82
第六章 結論與未來研究 84
6.1 結論 84
6.2 未來研究 86
參考文獻 88
[1] Adam Muhlbauer, Reihaneh Safavi-Naini, and Farzad Salim, Nicholas Paul Sheppard, and Martin Surminen, “Location Constraints in Digital Rights Management,” Computer Communications, Volume: 31, Issue: 6, pp. 1173-1180, 2008.
[2] Alapan Arnab and Andrew Hutchison, “Requirement Analysis of E-DRM Systems,” Information Security South Africa 2005 Conference, 2005, http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/024_Article.pdf.
[3] Alapan Arnab and Andrew Hutchison, “Ticket based Identity System for DRM,” Information Security South Africa 2006 Conference, 2006, http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/19_Paper.pdf.
[4] Bart Bouwman, Sjouke Mauw and Milan Petkovic, “Rights Management for Role-Based Access Control,” Consumer Communications and Networking Conference, pp. 1085-1090, 2008.
[5] Bill Rosenblatt, “DRM for the Enterprise,” 2004, http://www.jupiterwebcasts.com/webinars/0402drm/.
[6] Bill Rosenblatt, “Enterprise Digital Rights Management: Technology Comparison: Authentica Active Rights Management and Microsoft Windows Rights Management Services,” 2005, http://www.giantstepsmts.com/Authentica-RMS%20Whitepaper.pdf.
[7] Bill Rosenblatt, “Fasoo Launches E-DRM Network Appliance,” 2007, http://www.drmwatch.com/enterprise/article.php/3672841.
[8] Bill Rosenblatt, “Modevity Launches New E-DRM Technology,” 2007, http://www.drmwatch.com/enterprise/article.php/3703386.
[9] Bill Rosenblatt, David Guenette, and Bill Trippe, “Enterprise Rights Management: Business Imperatives and Implementation Readiness,” 2008, http://gilbane.com/Research-Reports.html.
[10] Bill Trippe and David R. Guenette, “The Gilbane Report: Editorial Interfaces & Enterprise-enabled Content,” Gilbane, Volume: 9, Number: 7, 2001, http://gilbane.com/gilbane_report.pl/19/Editorial_Interfaces__Enterpriseenabled_Content.html.
[11] Bill Trippe, “The Gilbane Report: eCommerce & Content Management: More Important than Ever,” Gilbane, Volume: 12, Number: 7, 2004, http://gilbane.com/gilbane_report.pl/101/eCommerce__Content_Management_More_Important_than_Ever.html.
[12] Bill Trippe, “The Gilbane Report: What's Next for XML and Enterprise Content Management?,” Gilbane, Volume: 11, Number: 9, 2003, http://gilbane.com/gilbane_report.pl/93/Whats_Next_for_XML_and_Enterprise_Content_Management.html.
[13] Brett Sheppard, “Gilbane E-DRM Conference Wrap-Up,” 2006, http://www.drmwatch.com/enterprise/article.php/3647546.
[14] Brett Sheppard, “The Rights Stuff: The Integration of Enterprise Digital Rights Management into an Enterprise Architecture,” EContent, Volume: 29, Issue: 9, pp. 38-44, 2006.
[15] Carlos Serr�姛, Miguel Dias, and Jaime Delgadom, “Using Service-Oriented Architectures Towards Rights Management Interoperability,” Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, Springer Netherlands, pp. 519-524, 2007.
[16] Chin-Ling Chen, “A Secure and Traceable E-DRM System Based on Mobile Device,” Expert Systems with Applications, Volume: 35, Number: 3, pp. 878-886, 2008.
[17] Daniel Bradley and Audun Josang, “Mesmerize – An Open Framework for Enterprise Security Management,” Second Australasian Information Security Workshop, pp. 37-42, 2004.
[18] E. John Sebes and Mark Stamp, “Enterprise Digital Rights Management: Ready for Prime Time?,” Business Communications Review, Bcr Enterprises Inc, Volume: 34, Issue: 3, pp. 52-55, 2004.
[19] E. John Sebes and Mark Stamp, “Solvable Problems in Enterprise Digital Rights Management,” Information Management & Computer Security, Emerald, Volume: 15, Issue: 1, pp. 33-45, 2007.
[20] Edward William Felten, and John Alex Halderman, “Digital Rights Management, Spyware, and Security,” IEEE Security & Privacy, Volume: 4, Number: 1, pp. 18-23, 2006.
[21] Fernando Marques Figueira Filho, Jo˜ao Porto de Albuquerque, and Paulo L’ıcio de Geus, “A Service-Oriented Framework to Promote Interoperability Among DRM System,” Lecture Notes in Computer Science, Volume: 4267, pp. 124-127, 2006.
[22] Fernando Marques Figueira Filho, Jo˜ao Porto de Albuquerque, Paulo L’ıcio de Geus, and Heiko Krumm “A Policy-Based Framework for Interoperable Digital Content Management,” Consumer Communications and Networking Conference, pp. 945-949, 2007.
[23] Franco Frattolillo and Federica Landolfi, “Designing a DRM System,” The Fourth International Conference on Information Assurance and Security, pp. 221-226, 2008.
[24] Frank Gilbane, “The Gilbane Report: What is Content Management?,” Gilbane, Volume: 8, Number: 8, 2000, http://gilbane.com/gilbane_report.pl/6/What_is_Content_Management.html.
[25] Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. Jason Hinek, “Dual RSA and Its Security Analysis,” IEEE Transactions on Information Theory, Volume: 53, Number: 8, pp. 2922-2933, 2007.
[26] Jaime Delgado, Miguel Dias, and Carlos Serr�姛, “Using Web-Services to Manage and Control Access to Multimedia Content,” International Symposium on Web Services and Applications, pp. 23-28, 2005.
[27] Jens Eckhardt, Martin Lundborg, and Claudia Schlipp, “Digital Rights Management (DRM) and the Development of Mobile Content in Europe,” Computer Law & Security Report, Volume: 23, Issue: 6, pp. 543-549, 2007.
[28] Mathias Thurman, “Enterprise DRM Back to the Fore,” Computerworld, Volume: 40, Issue: 43, pp. 34, 2006.
[29] Matt Bishop and Deborah A. Frincke, “Who Owns Your Computer? [Digital Rights Management],” IEEE Security & Privacy, Volume: 4, Issue: 2, pp. 61-63, 2006.
[30] Michael Lesk, “Digital Rights Management and Individualized Pricing,” IEEE Security & Privacy, Volume: 6, Issue: 3, pp. 76-79, 2008.
[31] Microsoft, “Real World SOA,” 2006, http://download.microsoft.com/download/6/b/9/6b9ea309-0736-4b37-ab58-301895346378/Real_World_SOA_Chinese.doc.
[32] Mike Heck, “Digital Rights for Enterprise Docs,” InfoWorld, Volume: 28, Issue: 36, pp. 40-43, 2006.
[33] Mikko Loytynoja, Timo Koskela, Marko Brockman, and Tapio Seppanen, “Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications,” Proceedings of the Eighth IEEE International Symposium on Multimedia, pp. 139-144, 2006.
[34] OASIS, “OASIS Reference Model for Service Oriented Architecture 1.0,” 2006, http://docs.oasis-open.org/soa-rm/v1.0/soa-rm.pdf.
[35] OASIS, “OASIS Reference Architecture for Service Oriented Architecture 1.0,” 2008, http://docs.oasis-open.org/soa-rm/soa-ra/v1.0/soa-ra-pr-01.pdf.
[36] Pramod Arvind Jamkhedkar, Gregory L. Heileman, “DRM as a Layered System,” Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 11-21, 2004.
[37] Pramod Arvind Jamkhedkar, Gregory L. Heileman, and Iv�鴨 Mart�瀋ez-Ortiz, “Middleware Services for DRM,” Communication Systems Software and Middleware International Conference, pp. 1-8, 2007.
[38] Robert F. Smallwood, “E-DRM Plugs ECM Security Gap,” KM World, Volume: 17, Issue: 4, pp. 1-3, 2008.
[39] Sam Michiels, Kristof Verslype, Wouter Joosen and Bart De Decker, “Towards a Software Architecture for DRM,” Proceedings of the 5th ACM Workshop on Digital Rights Management, pp. 65-74, 2005.
[40] Yang Yu and Tzi-Cker Chiueh, “Enterprise Digital Rights Management: Solutions against Information Theft by Insiders,” 2005, http://www.ecsl.cs.sunysb.edu/tr/TR169.pdf.
[41] 何奇芳,「植基於服務導向架構之資訊系統開發方法論」,暨南大學資訊管理學系碩士論文,2007年。
[42] 姍蒂.卡特,「新商業語言 SOA 與 Web 2.0 (The New Language of Business: SOA & Web 2.0)」,台北:維科圖書有限公司,2007年。
[43] 林長訓,「應用Digital Rights Management及獎勵機制於點對點網路電視之研究」,中央大學資訊管理學系碩士論文,2006年。
[44] 柯尤民,「以應用程式虛擬化技術達成企業軟體版權管理之研究」,中央大學資訊管理學系碩士論文,2007年。
[45] 洪吉維,「從社會資本觀點探討跨組織知識整合機制-以企業數位權限管理系統服務商為例」,台灣科技大學資訊管理學系碩士論文,2008年。
[46] 徐正達,「以影像浮水印為基礎之數位文件的版權管理與保護」,成功大學工程科學系碩士論文,2007年。
[47] 張星吏,「架構一個以角色為金鑰管理基礎的企業數位版權管理系統雛型」,交通大學資訊管理研究所碩士論文,2003年。
[48] 張建騵,「一個適用於行動商務環境的Digital Rights保護機制」,靜宜大學資訊管理學系碩士論文,2006年。
[49] 郭貞伶,「網際網路單一簽入系統結合RBAC授權機制之研究」,世新大學資訊管理學系碩士論文,2006年。
[50] 黃明發,「跨組織服務導向架構整合平台之研究」,政治大學資訊管理學系碩士論文,2006年。
[51] 經濟部工業局,2003數位內容白皮書,2003年,http://www.digitalcontent.org.tw/2003/main.htm。
[52] 經濟部工業局,2007數位內容產業年鑑,2007年,http://proj3.moeaidb.gov.tw/nmipo/upload/publish/2007/index.htm。
[53] 資傳網,OASIS成立SOA技術協會,2007年,http://cpro.com.tw/channel/ecorp/content/index.php?news_id=6946。
[54] 劉淑君,「數位出版品版權發行管理機制」,世新大學資訊管理學系碩士論文,2006年。
[55] 鄭詠,「資訊系統委外專案之跨組織協調機制-以E-DRM系統導入專案為例」,台灣科技大學資訊管理學系碩士論文,2008年。
[56] 賴榮樞,「密碼學與網路安全」,臺北:臺灣培生教育出版股份有限公司,2007年。
[57] 顏志達,「以Wrapper-based為基礎建構數位版權管理系統之研究」,世新大學資訊管理學系碩士論文,2008年。
電子全文 電子全文(網際網路公開日期:20240722)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊