Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario
نویسندگان
چکیده
A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefits of two stakeholders, which are DRM Providers and contents Sharer who is a category of consumers. A dynamic and mixed game and its algorithm were proposed, where Sharer’s strategies were whether to employ the trusted computing enabling devices and related components or not, as well as Providers’ strategies included entirely general security, entirely enhanced security and dynamic security policies. We concluded from both game-theoretic analyses and Swarm simulation experiments that the number of acquired sharable digital rights and security cost have a direct effect on Sharer’s choices of the enhanced security policy, and also their different basic sharing modes including partial, modest and extensive sharing, further influence the choice of Providers. Besides, with respect to the mixed sharing mode far more similar to a real contents sharing scenario, Dynamic security strategy is superior to the entirely enhanced security in the context of limited sharable rights and higher security costs, but with the acquisition of much more rights and the decrease of enhanced security overhead, the latter strategy would be optimal and stable as a Nash Equilibrium for stakeholders, in combination with the exploitation of effective business models of contents industry.
منابع مشابه
A Special Section of Intelligent Automation and Soft computing - Soft Computing For Copyright Protection
In today's digital age, the creation, transmission and manipulation of digital media content, such as images, audios and videos, are made simply through digital processing tools that are easily and widely available. As a consequence, piracy that copies, tampers and retransmits the media content is becoming increasingly easier and more popular now. This eventually concurs a great deal of loss to...
متن کاملA Game-Theoretical Approach to Multimedia Social Networks Security
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, s...
متن کاملCombination of real options and game-theoretic approach in investment analysis
Investments in technology create a large amount of capital investments by major companies. Assessing such investment projects is identified as critical to the efficient assignment of resources. Viewing investment projects as real options, this paper expands a method for assessing technology investment decisions in the linkage existence of uncertainty and competition. It combines the game-theore...
متن کاملA Game Theoretic Approach for Greening, Pricing, And Advertising Policies in A Green Supply Chain
In this paper, greening, pricing, and advertising policies in a supply chain will be examined with government intervention. The supply chain has two members. First, a manufacturer seeking to determine the wholesale price and the greening level and second, a retailer that has to determine the advertising cost and the retail price. The government is trying to encourage the manufacturer to green t...
متن کاملA Game Theory Approach for Solving the Knowledge Sharing Problem in Supply Chain
Knowledge management is the process of capturing, developing, sharing, and effectively using organizational knowledge as we known Knowledge management literature emphasizes the importance of knowledge as a valuable asset for SMEs. This paper highlights the efficient sharing of knowledge as a way of creating core competencies in the SMEs that are in civil construction activities. This perspectiv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Intelligent Automation & Soft Computing
دوره 17 شماره
صفحات -
تاریخ انتشار 2011