{"id":"https://openalex.org/W2079787888","doi":"https://doi.org/10.1093/llc/fqi047","title":"A New Technique for Authenticating Content in Evolving Marked-up Documents","display_name":"A New Technique for Authenticating Content in Evolving Marked-up Documents","publication_year":2005,"publication_date":"2005-11-03","ids":{"openalex":"https://openalex.org/W2079787888","doi":"https://doi.org/10.1093/llc/fqi047","mag":"2079787888"},"language":"en","primary_location":{"id":"doi:10.1093/llc/fqi047","is_oa":false,"landing_page_url":"https://doi.org/10.1093/llc/fqi047","pdf_url":null,"source":{"id":"https://openalex.org/S84784070","display_name":"Literary and Linguistic Computing","issn_l":"0268-1145","issn":["0268-1145","1477-4615"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Literary and Linguistic Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064304062","display_name":"Phillip Berrie","orcid":null},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"P. Berrie","raw_affiliation_strings":["University of New South Wales at ADFA, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales at ADFA, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5064304062"],"corresponding_institution_ids":["https://openalex.org/I31746571","https://openalex.org/I40053085"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3053439,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"1","first_page":"17","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12377","display_name":"Digital Humanities and Scholarship","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1208","display_name":"Literature and Literary Theory"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12377","display_name":"Digital Humanities and Scholarship","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1208","display_name":"Literature and Literary Theory"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.963100016117096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13523","display_name":"Mathematics, Computing, and Information Processing","score":0.9476000070571899,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8733841180801392},{"id":"https://openalex.org/keywords/markup-language","display_name":"Markup language","score":0.6550638675689697},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5457864999771118},{"id":"https://openalex.org/keywords/font","display_name":"Font","score":0.4874172508716583},{"id":"https://openalex.org/keywords/sgml","display_name":"SGML","score":0.47858643531799316},{"id":"https://openalex.org/keywords/transcription","display_name":"Transcription (linguistics)","score":0.4599671959877014},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43465134501457214},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4238545894622803},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4187988042831421},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23617887496948242},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.22868743538856506},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16494593024253845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14456230401992798},{"id":"https://openalex.org/keywords/document-structure-description","display_name":"Document Structure Description","score":0.10937368869781494}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8733841180801392},{"id":"https://openalex.org/C45874996","wikidata":"https://www.wikidata.org/wiki/Q37045","display_name":"Markup language","level":3,"score":0.6550638675689697},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5457864999771118},{"id":"https://openalex.org/C2777737414","wikidata":"https://www.wikidata.org/wiki/Q4868296","display_name":"Font","level":2,"score":0.4874172508716583},{"id":"https://openalex.org/C62701983","wikidata":"https://www.wikidata.org/wiki/Q207819","display_name":"SGML","level":4,"score":0.47858643531799316},{"id":"https://openalex.org/C179926584","wikidata":"https://www.wikidata.org/wiki/Q207714","display_name":"Transcription (linguistics)","level":2,"score":0.4599671959877014},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43465134501457214},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4238545894622803},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4187988042831421},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23617887496948242},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.22868743538856506},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16494593024253845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14456230401992798},{"id":"https://openalex.org/C68699486","wikidata":"https://www.wikidata.org/wiki/Q265904","display_name":"Document Structure Description","level":3,"score":0.10937368869781494},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/llc/fqi047","is_oa":false,"landing_page_url":"https://doi.org/10.1093/llc/fqi047","pdf_url":null,"source":{"id":"https://openalex.org/S84784070","display_name":"Literary and Linguistic Computing","issn_l":"0268-1145","issn":["0268-1145","1477-4615"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Literary and Linguistic Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W14629852"],"related_works":["https://openalex.org/W2044641582","https://openalex.org/W2186877208","https://openalex.org/W2084734328","https://openalex.org/W4232022739","https://openalex.org/W2076638146","https://openalex.org/W2060814800","https://openalex.org/W2768131452","https://openalex.org/W2099020626","https://openalex.org/W12825674","https://openalex.org/W2101294324"],"abstract_inverted_index":{"Accuracy":[0],"of":[1,10,22,31,47,91,95,109,155],"transcription":[2,33],"is":[3,38,59,71,166],"vital":[4],"when":[5],"preparing":[6],"a":[7,32,42,45,80,124,169],"scholarly":[8],"version":[9],"an":[11,107],"existing":[12,119],"document.":[13],"This":[14,77],"process":[15],"has":[16],"not":[17,50],"changed":[18],"with":[19,100,118,176],"the":[20,28,35,69,75,88,92,150,181,184],"advent":[21],"electronic":[23],"editions.":[24],"In":[25,139,188],"fact,":[26],"ensuring":[27],"continued":[29],"accuracy":[30],"in":[34,147],"digital":[36],"realm":[37],"more":[39,125,185],"difficult":[40],"because":[41],"file,":[43],"unlike":[44],"piece":[46],"paper,":[48],"does":[49],"retain":[51],"information":[52],"about":[53],"its":[54],"previous":[55],"states":[56],"and":[57,112,127,133,165],"it":[58,114],"therefore":[60],"possible":[61],"that":[62,85,172],"accidental":[63],"changes":[64],"can":[65,115,174],"go":[66],"undetected":[67],"unless":[68],"content":[70,94],"continually":[72],"checked":[73],"against":[74],"original.":[76],"article":[78],"presents":[79],"new,":[81],"character-set-independent,":[82],"programming":[83],"algorithm":[84,111,144],"allows":[86],"for":[87,131,152,159],"ongoing":[89],"authentication":[90,157],"textual":[93],"files":[96],"being":[97],"marked":[98],"up":[99],"SGML-like":[101],"languages.":[102],"The":[103,137],"study":[104],"also":[105],"describes":[106],"implementation":[108],"this":[110],"how":[113],"be":[116],"used":[117],"software":[120],"tools":[121],"to":[122,149,183],"provide":[123],"efficient":[126],"trusted":[128],"editing":[129,134],"environment":[130],"creating":[132],"marked-up":[135],"files.":[136],"Just":[138,187],"Time":[140,189],"Authentication":[141],"Mechanism":[142],"(JITAM)":[143],"was":[145],"developed":[146],"response":[148],"need":[151],"some":[153],"form":[154],"automated":[156],"mechanism":[158],"projects":[160,178],"already":[161],"employing":[162],"embedded":[163],"markup":[164],"seen":[167],"as":[168],"preparatory":[170],"step":[171],"editors":[173],"take":[175],"their":[177],"before":[179],"making":[180],"leap":[182],"versatile":[186],"Markup":[190],"(JITM)":[191],"system.":[192]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
