{"id":"https://openalex.org/W2066033674","doi":"https://doi.org/10.1109/hpcs.2010.5547093","title":"Security, trust and risk in Digital Rights Management ecosystem","display_name":"Security, trust and risk in Digital Rights Management ecosystem","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2066033674","doi":"https://doi.org/10.1109/hpcs.2010.5547093","mag":"2066033674"},"language":"en","primary_location":{"id":"doi:10.1109/hpcs.2010.5547093","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs.2010.5547093","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on High Performance Computing &amp; Simulation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100352621","display_name":"Zhiyong Zhang","orcid":"https://orcid.org/0000-0003-3061-7768"},"institutions":[{"id":"https://openalex.org/I167383011","display_name":"Henan University of Science and Technology","ror":"https://ror.org/05d80kz58","country_code":"CN","type":"education","lineage":["https://openalex.org/I167383011"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyong Zhang","raw_affiliation_strings":["Cultural Property Preservation & Digitization Research Center, Henan University of Science and Technology, Luoyang, China"],"affiliations":[{"raw_affiliation_string":"Cultural Property Preservation & Digitization Research Center, Henan University of Science and Technology, Luoyang, China","institution_ids":["https://openalex.org/I167383011"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100352621"],"corresponding_institution_ids":["https://openalex.org/I167383011"],"apc_list":null,"apc_paid":null,"fwci":3.4685,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.93827448,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"20","issue":null,"first_page":"498","last_page":"503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9614999890327454,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.7795035243034363},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.754224956035614},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6179618835449219},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.5958230495452881},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5473220944404602},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5414133667945862},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.5287750959396362},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.4511139690876007},{"id":"https://openalex.org/keywords/digital-rights","display_name":"Digital rights","score":0.44872021675109863},{"id":"https://openalex.org/keywords/digital-ecosystem","display_name":"Digital ecosystem","score":0.429570734500885},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.4292443096637726},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39840757846832275},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3814454674720764},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3260050415992737},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.2528212070465088},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16006720066070557},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07355630397796631}],"concepts":[{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.7795035243034363},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.754224956035614},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6179618835449219},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.5958230495452881},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5473220944404602},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5414133667945862},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.5287750959396362},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.4511139690876007},{"id":"https://openalex.org/C2776393157","wikidata":"https://www.wikidata.org/wiki/Q113462","display_name":"Digital rights","level":2,"score":0.44872021675109863},{"id":"https://openalex.org/C2777527080","wikidata":"https://www.wikidata.org/wiki/Q3557311","display_name":"Digital ecosystem","level":2,"score":0.429570734500885},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.4292443096637726},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39840757846832275},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3814454674720764},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3260050415992737},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2528212070465088},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16006720066070557},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07355630397796631},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcs.2010.5547093","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs.2010.5547093","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on High Performance Computing &amp; Simulation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1549342539","https://openalex.org/W1997396087","https://openalex.org/W2046114553","https://openalex.org/W2052837112","https://openalex.org/W2074487155","https://openalex.org/W2096792690","https://openalex.org/W2098536355","https://openalex.org/W2112705469","https://openalex.org/W2124974593","https://openalex.org/W2154699482","https://openalex.org/W2320304862","https://openalex.org/W2396416117","https://openalex.org/W2535586695","https://openalex.org/W2757971069","https://openalex.org/W3196542988","https://openalex.org/W4245483991","https://openalex.org/W4285719527","https://openalex.org/W6712270065"],"related_works":["https://openalex.org/W2368370947","https://openalex.org/W2372258228","https://openalex.org/W614474658","https://openalex.org/W893028926","https://openalex.org/W2038649891","https://openalex.org/W4238646005","https://openalex.org/W1972406709","https://openalex.org/W786245611","https://openalex.org/W2076224808","https://openalex.org/W2158461439"],"abstract_inverted_index":{"In":[0,24],"the":[1,41,86],"last":[2],"decades,":[3],"Digital":[4],"Rights":[5],"Management":[6],"(DRM)":[7],"technology":[8],"has":[9],"been":[10],"laid":[11],"emphasis":[12],"on":[13,50],"digital":[14,29,73],"contents":[15,42,78],"protection":[16],"and":[17,22,35,54,65,76,111],"related":[18],"security":[19],"policies,":[20],"mechanisms":[21],"implementation.":[23],"order":[25],"to":[26,48,93,104],"effectively":[27],"protect":[28],"assets":[30],"with":[31,100],"copyrights":[32],"against":[33],"piracy":[34],"misuse,":[36],"it":[37],"is":[38],"necessary":[39],"for":[40],"value":[43],"chain":[44],"as":[45,67,83,85,92],"a":[46],"whole":[47],"investigate":[49],"some":[51],"open":[52],"issues":[53],"advances.":[55],"The":[56],"paper":[57],"proposed":[58],"three":[59],"fundamental":[60],"aspects":[61],"regarding":[62],"security,":[63,109],"trust":[64,81],"risk,":[66],"underlies":[68],"DRM":[69,97],"Ecosystem.":[70],"And":[71],"then,":[72],"rights":[74],"negotiation":[75],"multi-level":[77],"verification,":[79],"multi-participant":[80],"framework,":[82],"well":[84],"risk":[87],"management,":[88],"were":[89],"addressed":[90],"so":[91],"uphold":[94],"two":[95],"generic":[96],"application":[98],"scenarios,":[99],"an":[101],"ultimate":[102],"goal":[103],"meet":[105],"key":[106],"requirements":[107],"of":[108],"interoperability":[110],"usability.":[112]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
