{"id":"https://openalex.org/W2063703515","doi":"https://doi.org/10.1109/hpcs.2010.5547089","title":"A Digital Rights Management scheme based on rational share content","display_name":"A Digital Rights Management scheme based on rational share content","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2063703515","doi":"https://doi.org/10.1109/hpcs.2010.5547089","mag":"2063703515"},"language":"en","primary_location":{"id":"doi:10.1109/hpcs.2010.5547089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs.2010.5547089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on High Performance Computing &amp; Simulation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004535140","display_name":"Guojun Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guojun Ma","raw_affiliation_strings":["Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","Key Lab of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Key Lab of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100402571","display_name":"Jian Li","orcid":"https://orcid.org/0000-0003-0894-0892"},"institutions":[{"id":"https://openalex.org/I4210098582","display_name":"ZTE (China)","ror":"https://ror.org/00rjhhq63","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210098582"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Jian","raw_affiliation_strings":["ZTE Corporation, China"],"affiliations":[{"raw_affiliation_string":"ZTE Corporation, China","institution_ids":["https://openalex.org/I4210098582"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065373445","display_name":"Qingqi Pei","orcid":"https://orcid.org/0000-0001-7601-5434"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingqi Pei","raw_affiliation_strings":["Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","Key Lab of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Key Lab of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","Key Lab of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Key Lab of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004535140"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.6937,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82655007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"7","issue":null,"first_page":"517","last_page":"520"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11769","display_name":"Copyright and Intellectual Property","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.866725742816925},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.7914923429489136},{"id":"https://openalex.org/keywords/license","display_name":"License","score":0.7185795307159424},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.697147786617279},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6735821962356567},{"id":"https://openalex.org/keywords/content-management","display_name":"Content management","score":0.6199457049369812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5074355006217957},{"id":"https://openalex.org/keywords/digital-rights","display_name":"Digital rights","score":0.43353432416915894},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3653368353843689},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3122479319572449}],"concepts":[{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.866725742816925},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.7914923429489136},{"id":"https://openalex.org/C2780560020","wikidata":"https://www.wikidata.org/wiki/Q79719","display_name":"License","level":2,"score":0.7185795307159424},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.697147786617279},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6735821962356567},{"id":"https://openalex.org/C33039251","wikidata":"https://www.wikidata.org/wiki/Q173373","display_name":"Content management","level":2,"score":0.6199457049369812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5074355006217957},{"id":"https://openalex.org/C2776393157","wikidata":"https://www.wikidata.org/wiki/Q113462","display_name":"Digital rights","level":2,"score":0.43353432416915894},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3653368353843689},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3122479319572449},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcs.2010.5547089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs.2010.5547089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on High Performance Computing &amp; Simulation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2038297126","https://openalex.org/W2081284084","https://openalex.org/W2082402084","https://openalex.org/W2120607849","https://openalex.org/W2140038995","https://openalex.org/W2464416548","https://openalex.org/W6678017958"],"related_works":["https://openalex.org/W4238646005","https://openalex.org/W1972406709","https://openalex.org/W2116616320","https://openalex.org/W2034781334","https://openalex.org/W786245611","https://openalex.org/W2303438967","https://openalex.org/W1911053143","https://openalex.org/W2548502206","https://openalex.org/W2188204921","https://openalex.org/W2135203553"],"abstract_inverted_index":{"In":[0],"the":[1,27,38,56,62,95,102,106,109,113,121,128,134,138,143,159,184],"traditional":[2],"DRM(Digital":[3],"Rights":[4],"Management)":[5],"scheme,":[6,133],"each":[7],"user":[8,139],"must":[9],"buy":[10,120],"a":[11,14,69,75,85],"license":[12],"for":[13],"digital":[15,30,41,63,135,148],"content,":[16,122],"and":[17,67,100,123,166,188,197],"can":[18,35,98,145,181],"not":[19,36,117],"share":[20,110,127,167],"this":[21,33,93],"content":[22,31,42,64,96,114,136,149,189],"with":[23,92],"his":[24,147,153],"friends.":[25],"But,with":[26],"development":[28,39],"of":[29,40,58,61,105,108,152,170,186],"industry,":[32],"model":[34],"promote":[37],"industry":[43],"chain":[44],"effectively,":[45],"people":[46],"have":[47],"come":[48],"to":[49],"realize":[50],"that":[51],"rational":[52,81,177,194],"sharing":[53,195],"could":[54],"raise":[55],"benefit":[57],"multiple":[59],"parties":[60],"industrial":[65],"chain,":[66],"achieve":[68],"all-win":[70],"development.":[71],"This":[72,155],"paper":[73,156],"presents":[74],"new":[76],"DRM":[77],"scheme":[78,172,180],"based":[79,88,162],"on":[80,89,158,163],"share,":[82],"we":[83],"employ":[84],"security":[86,160],"policy":[87,161],"tamper-proof":[90,164],"hardware,":[91],"policy,":[94],"provider":[97,115],"know":[99,118],"control":[101],"upper":[103],"limit":[104],"number":[107],"users,":[111],"but":[112],"do":[116],"who":[119],"how":[124],"many":[125],"users":[126,144,187],"content.":[129],"Meanwhile,":[130],"in":[131,150],"our":[132,171,179],"which":[137],"brought":[140],"is":[141,173],"portable,":[142],"access":[146],"any":[151],"devices.":[154],"focuses":[157],"hardware":[165],"scheme,some":[168],"applications":[169],"discussed":[174],"also.":[175],"With":[176],"applications,":[178],"heighten":[182],"both":[183],"benefits":[185],"providers":[190],"by":[191],"supporting":[192],"flexible":[193],"mechanism":[196],"privacy":[198],"protection.":[199]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
