Research Article
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
1: procedure Security.Process(u, i, d) | 2: u#.profile(name, sex, birth, ID.number, phone, address); | 3: i#.info(insurance, category, cover.scope); | 4: d#.info(disease, found, birth, phone.number); | 5: REGISTERu#.profileTOm.Server; | 6: STOREu#.profileINm.Server; | 7: REQUESTu#.KEYTODRM; | 8: GENERATEu#.KEYinDRM; | 9: UPDATEu#.licence.PolicyinDRM; | 10: u#.profile, m.Server([Sig&Encrypt][DRMAgent]); | 11: while r ≠ 0do ▷ | 12: Sig ← Signature(u#.profile) | 13: Enc ← Encrypt(u#.profile) | 14: Ngo ← Negotiation(Sig, Eng) ▷ negotiate between user and Server | 15: K.set ← Fair(key(u#.profile, m.Server)fromDRM | 16: Shr ← Share(K.set) | 17: Crm ← Confirm(K.set | 18: l.Crm ← License.Confirm(DRM, KeyManagement.Service) | 19: end while | 20: return ▷ | 21: end procedure |
|