Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario

نویسندگان

  • Zhiyong Zhang
  • Qingqi Pei
  • Jianfeng Ma
  • Lin Yang
چکیده

A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefits of two stakeholders, which are DRM Providers and contents Sharer who is a category of consumers. A dynamic and mixed game and its algorithm were proposed, where Sharer’s strategies were whether to employ the trusted computing enabling devices and related components or not, as well as Providers’ strategies included entirely general security, entirely enhanced security and dynamic security policies. We concluded from both game-theoretic analyses and Swarm simulation experiments that the number of acquired sharable digital rights and security cost have a direct effect on Sharer’s choices of the enhanced security policy, and also their different basic sharing modes including partial, modest and extensive sharing, further influence the choice of Providers. Besides, with respect to the mixed sharing mode far more similar to a real contents sharing scenario, Dynamic security strategy is superior to the entirely enhanced security in the context of limited sharable rights and higher security costs, but with the acquisition of much more rights and the decrease of enhanced security overhead, the latter strategy would be optimal and stable as a Nash Equilibrium for stakeholders, in combination with the exploitation of effective business models of contents industry.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Special Section of Intelligent Automation and Soft computing - Soft Computing For Copyright Protection

In today's digital age, the creation, transmission and manipulation of digital media content, such as images, audios and videos, are made simply through digital processing tools that are easily and widely available. As a consequence, piracy that copies, tampers and retransmits the media content is becoming increasingly easier and more popular now. This eventually concurs a great deal of loss to...

متن کامل

A Game-Theoretical Approach to Multimedia Social Networks Security

The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, s...

متن کامل

Combination of real options and game-theoretic approach in investment analysis

Investments in technology create a large amount of capital investments by major companies. Assessing such investment projects is identified as critical to the efficient assignment of resources. Viewing investment projects as real options, this paper expands a method for assessing technology investment decisions in the linkage existence of uncertainty and competition. It combines the game-theore...

متن کامل

A Game Theoretic Approach for Greening, Pricing, And Advertising Policies in A Green Supply Chain

In this paper, greening, pricing, and advertising policies in a supply chain will be examined with government intervention. The supply chain has two members. First, a manufacturer seeking to determine the wholesale price and the greening level and second, a retailer that has to determine the advertising cost and the retail price. The government is trying to encourage the manufacturer to green t...

متن کامل

A Game Theory Approach for Solving the Knowledge Sharing Problem in Supply Chain

Knowledge management is the process of capturing, developing, sharing, and effectively using organizational knowledge as we known Knowledge management literature emphasizes the importance of knowledge as a valuable asset for SMEs. This paper highlights the efficient sharing of knowledge as a way of creating core competencies in the SMEs that are in civil construction activities. This perspectiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Intelligent Automation & Soft Computing

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2011