期刊文献+

基于可信第三方的数据库水印安全协议 被引量:1

Database Watermark Security Protocol Based on Trusted Third Party
在线阅读 下载PDF
导出
摘要 可信第三方通过买卖双方的数字签名来确定他们身份,将买卖双方提供的各自水印信息重构成待嵌入的水印信息,并对待加水印的数据库产品进行合法性验证,再由可信第三方采用水印移动代理技术完成水印的嵌入和检测.运用SVO逻辑对该安全协议进行形式化证明.该协议在保护版权所有者利益的同时,又能有效保护消费者利益. A database watermark protocol is composed of trusted third party(TTP), buyer and seller: TTP makes sure the identities of both buyer and seller through their signatures, reconstructs watermark combining buyer and seller's watermark, and verifies the validity of database product. Then, TTP Sends watermark insertion/detection mobile agent to insert/detect watermark information. Lastly, the protocol is formally proved by SVO logic to protect both seller and buyer's rights.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2007年第3期297-300,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(60573095) 高等学校博士学科专项科研基金资助项目(20050486024)
关键词 安全协议 数据库水印 可信第三方 可证明安全 security protocol database watermark trusted third party(TTP) provable security
作者简介 黄敏(1979-),女,博士生,现从事数据库信息安全方向研究. E-mail:hm172213@sina.com 通讯联系人 E-mail:jhcao@whu.edu.cn
  • 相关文献

参考文献9

  • 1Qiao L,Nahrstedt K.Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights[J].Journal of Visual Communication and Image Representation,1998,9(3):194-210.
  • 2Memon N,Wong P W.A Buyer-Seller Watermark Protocol[J].IEEE Transactions on Image Processing,2001,10(4):643-649.
  • 3周四清,余英林.基于数字水印的消费者权益保护协议研究[J].计算机工程,2002,28(1):73-74. 被引量:6
  • 4Agrawal R,Kiernan J.Watermarking Relational Databases:Framework,Algorithms and Analysis[J].The International Journal on Very Large Data Bases,2003,12(2):157-169.
  • 5Huang Min,Cao Jiaheng,Peng Zhiyong,et al.A New Watermark Mechanism for Relational Data[C]//The 4th International Conference on Computer and Information Technology.Washington DC,USA:IEEE Computer Society,2004:946-950.
  • 6HUANG Min,CAO Jia-heng,PENG Zhi-yong,ZENG Cheng.A New Mechanism Based on Similar Clouds Watermark for Database’s Information Security[J].Wuhan University Journal of Natural Sciences,2004,9(4):415-419. 被引量:4
  • 7黄敏,韩南,周祥,彭煜玮,曹加恒,彭智勇.一种带有纠错机制的数据库水印技术[J].计算机研究与发展,2006,43(z3):276-283. 被引量:2
  • 8卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:118
  • 9Syverson P,Oorschot P.On Unifying Some Cryptographic Protocol Logics[C]//Computer Society Symposium on Research in Security and Privacy.Washington DC,USA:IEEE Computer Scoiety,1994:14-28.

二级参考文献18

  • 1周旭,毕笃彦.基于中国剩余定理的GIS数字水印算法[J].中国图象图形学报(A辑),2004,9(5):611-615. 被引量:10
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1309
  • 3卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 4[1]Min Huang,Jiaheng Cao,Zhiyong Peng,et al.A new watermark mechanism for relational data.The 4th Int'l Conf on Computer and Information Technology (CIT'04),Wuhan,2004
  • 5[2]Hank Wallace.Error detection and correction using the bch code.http://www.aqdi.com/bch.pdf,2001
  • 6[3]Rakesh Agrawal,Jerry Kiernan.Watermarking relational databases.The 28th VLDB Conference,Hong Kong,2002
  • 7[4]Radu Sion,Mikhail Atallah,Sunil Prabhakar.Rights protection for relational data.ACM SIGMOD,San Diego,2003
  • 8[5]Radu Sion,Mikhail Atallah,Sunil Prabhakar.On watermarking numeric sets.The Workshop on Digital Watermarking,Seoul,Korea,2002
  • 9Hartung F,Kutter M.Multimedia Watermarking Techniques.Proceeding of the IEEE, 1999,87(7): 1079-1107
  • 10Brassil T,Low S,Maxemchuk L N.Copyright Protection for the Electronic Distribution of Text Documents. Proc.of the IEEE, 1999,87(7):1181-1196

共引文献126

同被引文献11

  • 1Sion R, Atallah M, Prabhakar S. Rights protection for relational data. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(12): 1509-1525
  • 2Swarup V, Li Y, Jajodia S. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1); 34-45
  • 3Agrawal R, Kiernan J. Watermarking relational databases: Framework, algorithms and analysis. The International Journal on Very Large Data Bases, 2003, 12(2): 157-169
  • 4Guo F, Wang J M, Li D Y. Fingerprinting relational databases//Proceedings of the 2006 ACM Symposium on Applied computing. Dijon, France, 2006: 487-492
  • 5Li Y, Deng R H. Publicly verifiable ownership protection for relational databases//Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM, 2006: 78-89
  • 6Shehab M, Bertino E, Ghafoor A. Watermarking relational databases using optimization-based techniques. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(1): 1041-4347
  • 7Gross-Amblard D. Query-preserving watermarking of relational databases and XML documents//Proceedings of the 2003 ACM Symposium on Principles of Database Systems. San Diego, California, USA, 2003: 191-201
  • 8Housley R, Ford W, Polk W, Solo D. Internet X. 509 public key infrastructure certificate and crl profile. July 2, 2005
  • 9Standard Specifications for Public Key Cryptography, IEEE Std. 2000, 1363-2000
  • 10Schneier B. Applied Cryptography: Protocols, Algorithms and Source Code in C. Hoboken, NJ, USA: Wiley & Sons, 1996

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部