{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:30:05Z","timestamp":1676820605022},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,5,29]],"date-time":"2009-05-29T00:00:00Z","timestamp":1243555200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1007\/s10207-009-0082-5","type":"journal-article","created":{"date-parts":[[2009,5,28]],"date-time":"2009-05-28T06:43:18Z","timestamp":1243492998000},"page":"263-273","source":"Crossref","is-referenced-by-count":6,"title":["Redistributing time-based rights between consumer devices for content sharing in DRM system"],"prefix":"10.1007","volume":"8","author":[{"given":"Sangho","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sung Je","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,29]]},"reference":[{"key":"82_CR1","doi-asserted-by":"crossref","unstructured":"Cena, G., Bertolotti, I.C., Valenzano, A., Zunino, C.: Analysis of response times in 802.11 industrial networks. In: Proceedings of 2007 5th IEEE International Conference on Industrial Informatics, pp. 195\u2013200 (2007)","DOI":"10.1109\/INDIN.2007.4384755"},{"issue":"3","key":"82_CR2","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B. Chor","year":"2000","unstructured":"Chor B., Fiat A., Naor M., Pinkas B.: Tracing traitors. IEEE Trans. Inf. Theory 46(3), 893\u2013910 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"82_CR3","unstructured":"Diehl, E., Furon, T.: \u00a9watermarking: Closing the analog hole. In: Proceedings of the 2003 IEEE International Conference on Consumer Electronics, pp. 52\u201353 (2003)"},{"key":"82_CR4","unstructured":"ISO\/IEC FDIS 21000-5:2003(E): Information technology: Multimedia framework. Part 5: rights expression language"},{"issue":"6","key":"82_CR5","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/JPROC.2004.827357","volume":"92","author":"R.H. Koenen","year":"2004","unstructured":"Koenen R.H., Lacy J., Mackay M., Mitchell S.: The long march to interoperable digital rights management. Proceedings of the IEEE 92(6), 883\u2013897 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"82_CR6","doi-asserted-by":"crossref","unstructured":"Koster, P., Kamperman, F., Lenoir, P., Vrielink, K.: Identity based DRM: Personal entertainment domain. In: Proceedings of Communications and Multimedia Security, vol. LNCS 3677, pp. 42\u201354 (2005)","DOI":"10.1007\/11552055_5"},{"issue":"6","key":"82_CR7","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","volume":"92","author":"D. Kundur","year":"2004","unstructured":"Kundur D., Karthik K.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 92(6), 918\u2013932 (2004)","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"82_CR8","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1080\/10919390701436390","volume":"17","author":"W. Lee","year":"2007","unstructured":"Lee W., Wu W., Chang C.: A portable DRM scheme using smart cards. J. Organ. Comput. Electron. Commer. 17(3), 247\u2013258 (2007)","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"82_CR9","unstructured":"Marlin Developer Community: Marlin architecture overview (2006). http:\/\/www.marlin-community.com"},{"key":"82_CR10","doi-asserted-by":"crossref","unstructured":"Mulligan, D.K., Han, J., Burstein, A.J.: How DRM-based content delivery systems disrupt expectations of \u201cpersonal use\u201d. In: Proceedings of the 3rd ACM Workshop on Digital Rights Management, October 2003, pp. 77\u201389 (2003)","DOI":"10.1145\/947380.947391"},{"key":"82_CR11","unstructured":"Open Mobile Alliance: DRM rights expression language: Candidate version 2.1 (2007). http:\/\/www.openmobilealliance.org"},{"key":"82_CR12","unstructured":"Open Mobile Alliance: DRM specification: Candidate version 2.1 (2007). http:\/\/www.openmobilealliance.org"},{"key":"82_CR13","unstructured":"OpenSSL Project: http:\/\/www.openssl.org"},{"issue":"2","key":"82_CR14","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MSP.2004.1276115","volume":"21","author":"F. Pestoni","year":"2004","unstructured":"Pestoni F., Lotspiech J.B., Nusser S.: xCP: Peer-to-peer content protection. IEEE Signal Process. Mag. 21(2), 71\u201381 (2004)","journal-title":"IEEE Signal Process. Mag."},{"key":"82_CR15","doi-asserted-by":"crossref","unstructured":"Popescu, B.C., Crispo, B., Tanenbaum, A.S., Kamperman, F.: A DRM security architecture for home networks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 1\u201310 (2004)","DOI":"10.1145\/1029146.1029150"},{"key":"82_CR16","unstructured":"The Digital Media Project: Approved document No. 3: Technical specification: interoperable DRM platform, version 3.0 (2007). http:\/\/www.dmpf.org"},{"key":"82_CR17","unstructured":"The Open Digital Rights Language (ODRL) Initiative: http:\/\/www.odrl.net"},{"key":"82_CR18","unstructured":"Trusted Computing Group: http:\/\/www.trustedcomputinggroup.org\/home"},{"key":"82_CR19","unstructured":"van den Heuvel, S., Jonker, W., Kamperman, F., Lenoir, P.: Secure content management in authorised domains. In: Proceedings of International Broadcasting Conference 2002, pp. 467\u2013474 (2002)"},{"key":"82_CR20","volume-title":"Network Security with OpenSSL","author":"J. Viega","year":"2002","unstructured":"Viega J., Messier M., Chandra P.: Network Security with Open-SSL. O\u2019Reilly & Associates, Inc., Sebastopol, CA, USA (2002)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0082-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0082-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0082-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:24Z","timestamp":1559113284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0082-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,29]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["82"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0082-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,29]]}}}