• 沒有找到結果。

第五章  結論與未來研究

5.2.  未來研究

在未來的研究方向,可將此模型加入更多數位內容的保護管理,並考慮以下 幾個方向來提昇系統的應用層面:

1. 結合學校的教學系統

本研究提出透過角色與數位版權管理來架構一個適用於數位內容之存取 控制模型,在使用者方面透過RBAC獲得良好的管理,檔案物件部份有DRM 的保護,再實際結合學校的教學管理系統,除了具備良好的存取控管與安全 性保障以外,還可以透過系統執行各種課務功能、課程意見反應、追蹤學習 進度、查看學生的學習成果、調查老師的教學滿意度等,增加系統的整體價 值與多元化應用。

2. 加上情境資訊

結合情境認知存取控制,考量數位內容在不同環境間的情境變化、情境 資訊,動態且即使地調整使用者所能存取之數位內容與存取權限,透過結合 角色存取控制與數位版權管理,使數位內容的存取控管更臻完善、更具彈性,

並確保內容提供者的權益。

79

80

除了技術方面運用存取控管來加強數位內容的保護,法律方面智慧財產權的 內容規範也要隨著時代變遷做更新,以符合現今社會風情與未來科技發展,讓數 位內容創作者可以在安全環境中創作出更多的數位作品,或使內容提供者更有意 願將其所擁有的作品數位化,增加交流的機會,以激盪出更好的數位內容成果,

進而促進整體數位內容產業與文藝創作的進步。

參考文獻

[1] Acken, J. M., “How Watermarking Add Value to Digital content,”

Communications of the ACM, Volume 41, Issue 7, July, 1998.

[2] Arnold, M., Schmucker, M., & Wolthusen, S. D., “Techniques and applications of digital watermarking and content protection,” Artech House, 2003.

[3] Barkley, J., “Implementing Role Based Access Control Using Object Technology,” First ACM Workshop on Role Based Access Control, November, 1995.

[4] Carrison, D. R., “Understanding distance education,” London:Routledge Press, 1989.

[5] Coulouris, G., Dollimore, J., & Roberts, M., “Role and Task-based Access Control in the PerDiS Groupware Platform,” Proceedings of the 3rd ACM Workshop on Role-Based Access, 1998.

[6] Ferraiolo, D. F., Barkley, J. F., & Kuhn, D. R., “A Role Based Access Control Model and Reference Implementation within a Corporate Intranet,” ACM Transactions on Information and System Security, Volume 1, Number 2, pp.34-64, 1999.

[7] Duhl, J., & Kevorkian, S., “Understanding DRM Systems,” An IDC Research White Paper, October, 2001.

[8] Ferraiolo, D. F., & Kuhn, D. R., “Role-Based Access Control,” In Proceedings of 15th NIST-NCSC National Computer Security Conference, pp.554-563, October, 1992.

81

[9] Ferraiolo, D. F., Cugini, J. A., & Kuhn, D. R., “Role-Based Access Control (RBAC): Features and Motivations,” Proceedings of 11th Annual Computer Security Application Conference, IEEE Computer Society Press, pp.241-248, December, 1995.

[10] Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R., “A Proposed Standard for Role-Based Access Control,” ACM Transactions on Information and System Security, Volume 4, Number 3, August, 2001.

[11] Giuri, L., & Lglio, P., “A Role-Based Secure Database Design Tool,”

Proceedings 12th Annual Computer Security Applications Conference, December, 1996.

[12] Gustafsson, M., Deligny, B., & Shahmehri, N., “Using NFS to Implement Role-Based Access Control,” Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, June, 1997.

[13] Hao, H. J., “2004 Digital Watermark Competition: The Technical Report,”

Technical Report, IIS Academia Sinica, April, 2004.

[14] Hansen, F., & Oleshchuk, V., “SRBAC: A Spatial Role-Based Access Control Model for Mobile Systems,” Proceedings of Esorics Nordsec, 2003.

[15] Huang, X., Wang, H., Chen, Z., & Lin, J., “A Context, Rule and Role-Based Access Control Model in Enterprise Pervasive Computing Environment,”

Pervasive Computing and Applications, pp.497-502, August, 2006.

82

[16] Joshi, J. B. D., Bertino, E., Latif, U., & Ghafoor, A., “A Generalized Temporal Role-Based Access Control Model,” IEEE Transactions on Knowledge and Data Engineering, Volume 17, Number 1, January, 2005.

[17] Liu, Q., Safavi-Naini, R., & Sheppard, N. P., “Digital Rights Management for Content Distribution,” Australasian Information Security Workshop 2003, 2003.

[18] Michiels, S., Verslype, K., Joosen, W., & Decker, B. D., “Towards a Software Architecture for DRM,” Proceedings of DRM’05(November 2005 Proceedings of the 5th ACM workshop on Digital right management), ISBN: 1-59593-230-5, pp.65-74, November, 2005.

[19] Microsoft Windows Media,

http://www.microsoft.com/windows/windowsmedia/licensing/drmlicensing.aspx [20] Moor, M. G., Cookson, P., & Donaldson, J. (Eds.), “Contemporary issues in

American distance education,” NewYork:Pergamon Press, 1990.

[21] Naldurg, P., & Campbell, R. H., “Dynamic access control: preserving safety and trust for network defense operations,” Proceedings of the eighth ACM symposium on Access control models and technologies, pp.231-237, 2003.

[22] Amon, O., & Simone, F. H., “The Rule Set Based Access Control (RSBAC) Framework for Linux,” http://www.rsbac.org/documentation/, 2004.

[23] Park, B. N., Kim, J. W., & Lee, W., “A License Management Protocol for Protecting User Privacy and Digital Contents in Digital Rights Management System,” IEICE Transactions on Info and System, Volume E88-D No.8, pp.

1958-1965, August, 2005.

83

[24] Park, J. S., Costello, K. P., Neven, T. M., & Diosomito, J. A., “A Composite RBAC Approach for Large, Complex Organizations,” Proceedings of Symposium on Access Control Models and Technologies, June 2-4, 2004.

[25] Rosenberg, M. J., “E-learning: Strategies for delivering knowledge in the digital age,” New York: McGraw-Hill, 2001.

[26] Rosenblatt, B., & Dykstra, G., “Integrating Content Management with Digital Rights Management –Imperatives and Opportunities for Digital Content Lifecycles,” GiantSteps Media Technology Strategies and Dykstra Research, May, 2003.

[27] Sandhu, R., & Bhamidipati, V., “The URA97 Model for Role-Based Administration of User-Role Assignment,” In T. Y. Lin and Xiaolei Qian, editors, Database Security XI: Status and Prospects, North-Holland, 1997.

[28] Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E., “Role-Based Access Control Models,” IEEE Computer, pp.38-47, February, 1996.

[29] Saltzer, J., “Protection and the Control of Information Sharing in Multics,”

Communications of the ACM, Volume 17, Issue 7, pp.388-402, July, 1974.

[30] Sandhu, R., Ferraiolo, D. F., & Kuhn, D. R., “The NIST Model for Role-Based Access Control: Towards a Unified Standard,” In Proceedings of the 5th ACM workshop on Role-based access control, pp.47-63, 2000.

[31] Sandhu, R., & Samarati, P., “Access Control: Principles and Practice,” IEEE Communication Magazine, Volume 32, Issue 9, pp.40-48, September, 1994.

[32] Shen, H., & Dewan, P., “Access Control for Collaborative Environments,”

Proceedings of the ACM Conference on Computer Supported Cooperative Work, pp.51-58, November, 1992.

84

[33] Shin, M. E., & Ahn, G. J., “UML-Based Representation of Role-Based Access Control,” Proceedings IEEE 9th International Workshops, pp.195-200, 2000.

[34] Su, J. K., Hartung, F., & Girod, B., “Digital Watermarking of Text, Image, and Video Documents,” Computers & Graphics, Volume 22, Number 6, pp.687–95, February, 1999.

[35] Wang, B., & Zhang, S., “The Research on Role-Based Access Control Mechanism for Workflow Management System,” Proceedings of Grid and Cooperative Computing, LNCS 3251, pp.729-736, 2004.

[36] Urdan, T. A., & Weggen, C. C., “WR Hambrecht +Co, Corporate e-learning:

exploring a new frontier.” Retrieved January 9, 2006, http://www.astd.org/NR/rdonlyres/hambrecht.pdf

[37] Xu, F., Lin, G., Huang, H., & Xie, L., “Role-based Access Control System for Web Services,” Proceedings of The 4th International Conference on Computer and Information Technology, pp.357-362, 2004.

[38] ASTD 美國教育訓練發展協會:

http://www.astd.org/communities/networks/eLearning/

[39] 日本數位內容協會,「數位內容白書 2002」,2002 年。

[40] 中研院數位典藏技術研發組,「數位權利管理技術簡介」,數位典藏技術規 範會議-數位內容保護技術研討會,第 89-119 頁,2005 年。

[41] 中華電信 MOD, http://mod.cht.com.tw/

[42] 全球高科技產業研究資料庫,「內容素材流通發展現況分析」,財團法人資 訊工業策進會,2003 年。

[43] 邱啟弘,「RBAC 權限控管系統中靜態責任分離機制之研究」,中原大學資 訊工程研究所碩士論文,2003 年。

85

[44] 余美伶、曾柏銜、黃文彬、陳耀輝、林菁,「角色與資料夾為基礎之存取管 控機制-以數位教材系統為例」,

Institute of Information & Computing Machinery

,第八卷,第四期,2005 年。

[45] 李佳穗,「數位學習平台對不同年資之員工學習成果探討-以國內某公司為 例」,銘傳大學管理科學研究所碩士論文,2003 年。

[46] 張伯任,「應用於多媒體數位內容之數位版權管理機制設計研究」,中正大 學資訊工程研究所碩士論文,2003 年。

[47] 陳星吏,「架構一個以角色為金鑰管理基礎的企業數位版權管理系統雛型」,

交通大學資訊管理研究所碩士論文,2003 年。

[48] 黃崇瑋、黃夙賢、柯皓仁、楊維邦,「數位典藏中以詮釋資料為基礎之存取 控制機制」,2003 年數位內容創意加值研討會,2003 年。

[49] 葉乃瑋.賴文智,「數位圖書館與著作權」,書苑季刊,49 期,第 10-22 頁,

取自:http://public1.ntl.gov.tw/publish/suyan/49/10.htm,2003 年。

[50] 葛品宏,「談資訊科技融入教學提昇教學成效」,電腦與網路科技在教育上 的應用研討會,第 193 頁,2002 年。

[51] 葛皇濱,「反盜版與反反盜版的省思」,新竹市青草湖社區大學課程教材 / 社 大 網 咖 : 民 眾 的 資 訊 科 學 , 網 路 文 章 , http://www.bamboo.hc.edu.tw/research_publish/textbook/icafe01/copyleft/copyle ft05.html,2002 年

[52] 遊戲防拷照妖鏡-A-Ray Scanner,

http://www.flag.com.tw/book/cento-5105.asp?bokno=F6643&id=143

[53] 經濟部工業局網路多媒體產業資訊網,「2006 年我國數位學習產業發展措 施具體建議報告」,經濟部工業局,2006 年。

[54] 經濟部數位內容產業推動辦公室,「2003 數位內容產業白皮書」,經濟部 工業局,2003 年。

86

相關文件