Title :
Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies
Author :
Zhang, Zhiyong ; Pu, Jiexin ; Wu, Qingtao ; Zhang, Lili ; Niu, Danmei
Author_Institution :
Electron. Inf. Eng. Coll., Henan Univ. of Sci. & Technol., Luoyang, China
Abstract :
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value chain. An analytic hierarchy structure and its algorithm on the assessment on utility factors´ weights for DRM security policies were proposed based on fuzzy analytic hierarchy process, and then swarm simulation experiments were further made on the adoptions of typical security policies in combination with the gained weight values. The simulation results show the proposed approach to fuzzy assessments effectively implements rational and optimal decision-making on security policies combinations.
Keywords :
digital rights management; fuzzy set theory; DRM security policies; contents value chain; digital rights management; fuzzy analytic hierarchy structure; fuzzy utility-factor assessments; optimal decision-making; swarm simulation; swarm simulations; Computational efficiency; Computer security; Digital signatures; Elliptic curve cryptography; Elliptic curves; Galois fields; NIST; Protection; Public key cryptography; Sun; Decision Theory; Digital Rights Management; Fuzzy Analytic Hierarchy Process; Security Policy; Swarm Simulation;
Conference_Titel :
Computer and Communications Security, 2009. ICCCS '09. International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-0-7695-3906-5
Electronic_ISBN :
978-1-4244-5408-2
DOI :
10.1109/ICCCS.2009.23