The Community for Technology Leaders
2009 International Conference on Computer and Communications Security (2009)
Hong Kong, Hong Kong
Dec. 5, 2009 to Dec. 6, 2009
ISBN: 978-0-7695-3906-5
pp: 55-59
In recent decade, DRM (Digital Rights Management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value chain. An analytic hierarchy structure and its algorithm on the assessment on utility factors' weights for DRM security policies were proposed based on Fuzzy Analytic Hierarchy Process, and then Swarm simulation experiments were further made on the adoptions of typical security policies in combination with the gained weight values. The simulation results show the proposed approach to fuzzy assessments effectively implements rational and optimal decision-making on security policies combinations.
Digital Rights Management, Fuzzy Analytic Hierarchy Process, Decision Theory, Security Policy, Swarm Simulation

L. Zhang, D. Niu, Z. Zhang, Q. Wu and J. Pu, "Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies," 2009 International Conference on Computer and Communications Security(ICCCS), Hong Kong, Hong Kong, 2009, pp. 55-59.
83 ms
(Ver 3.3 (11022016))