{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:30:26Z","timestamp":1724560226728},"reference-count":12,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2007,9,5]],"date-time":"2007-09-05T00:00:00Z","timestamp":1188950400000},"content-version":"vor","delay-in-days":7187,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems & Computers in Japan"],"published-print":{"date-parts":[[1988,1]]},"abstract":"Abstract<\/jats:title>The software service system (SSS) is developed to protect software from unauthorized use and to encourage smooth marketing. The system does not impose any constraints on the users except for the request for the appropriate fees. The user can take the backup copy of the software, and at higher discretion, use the software stored at any position of the file system or computer network. The software can be exchanged not only through the discket but also any medium including the communication link and broadcast. The user can acquire the software on a fee basis from the medium, and may purchase the software, test or cancel if not satisfied. To realize such a free utilization scheme together with the security protection, as well as a very effective market channel aiming at the future, there must be established an automatic strict management of the propriety for the software as well as a carefully designed fee\u2010collecting system. To realize the automatic management of the software, common credit and the permission program are introduced. The implementation of the computer with a propriety management function together with its management operation is discussed.<\/jats:p>","DOI":"10.1002\/scj.4690190504","type":"journal-article","created":{"date-parts":[[2009,11,19]],"date-time":"2009-11-19T21:29:38Z","timestamp":1258666178000},"page":"38-49","source":"Crossref","is-referenced-by-count":1,"title":["The Concept of Software Service System (SSS)"],"prefix":"10.1002","volume":"19","author":[{"given":"Ryoichi","family":"Mori","sequence":"first","affiliation":[]},{"given":"Shuichi","family":"Tashiro","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,9,5]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"crossref","unstructured":"G.B.Purdy G.J.SimmonsandJ.A.Studier A software protection scheme Proc. of the Symp. on Security and Privacy pp.99\u2013103 I.E.E.E. (1982).","DOI":"10.1109\/SP.1982.10012"},{"issue":"4","key":"e_1_2_1_3_2","first-page":"68","article-title":"Combatting software piracy by encryption and key management","volume":"17","author":"Albert D.J.","year":"1984","journal-title":"I.E.E.E. Computer"},{"key":"e_1_2_1_4_2","unstructured":"Proposal For Software Authorization System Standards Ver. 0.30 ADAPSO (Aug.1985)."},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.1984.6370176"},{"issue":"1","key":"e_1_2_1_6_2","first-page":"38","article-title":"Public cryptographic system","volume":"22","author":"Doi","year":"1981","journal-title":"Inf. Proc."},{"key":"e_1_2_1_7_2","unstructured":"Shared System Development Co.A survey of problems in networking (R & D for data protection techniques) pp.19\u201322(Mar.1981)."},{"issue":"8","key":"e_1_2_1_8_2","first-page":"963","article-title":"A means to prevent deciphering RSA cryptography","volume":"66","author":"Katsuno H.","year":"1983","journal-title":"Trans. (D) I.E.C.E., Japan"},{"issue":"1","key":"e_1_2_1_9_2","first-page":"49","article-title":"Software service system","volume":"2","author":"Mori R.","year":"1984","journal-title":"Inf. Comm."},{"issue":"4","key":"e_1_2_1_10_2","first-page":"431","article-title":"Software service system","volume":"67","author":"Mori R.","year":"1984","journal-title":"Proc. I.E.C.E., Japan"},{"key":"e_1_2_1_11_2","unstructured":"R.Mori S.TashiroandKagota Structure and distribution of software in software service system Nat. Conv. Inf. Proc. Soc. Jap. 29th 3D\u20105 (1984)."},{"key":"e_1_2_1_12_2","unstructured":"R.Mori S.TashiroandKagota Cryptography for software service system 31st Nat. Conv. Inf. Proc. Soc. Jap. 8D\u20131 (1985)."},{"key":"e_1_2_1_13_2","unstructured":"S.Tashiro OnoandR.Mori A proposal for prevention of wiretapping and hacking in data communication 31st Nat. Conv. Inf. Proc. Soc. Jap. 8D\u20133 (1985)."}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fscj.4690190504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/scj.4690190504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T11:52:13Z","timestamp":1697975533000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/scj.4690190504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,1]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1988,1]]}},"alternative-id":["10.1002\/scj.4690190504"],"URL":"https:\/\/doi.org\/10.1002\/scj.4690190504","archive":["Portico"],"relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"value":"0882-1666","type":"print"},{"value":"1520-684X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1988,1]]}}}