{"id":"https://openalex.org/W1973726463","doi":"https://doi.org/10.1145/1314276.1314280","title":"On implementing mpeg-21 intellectual property management and protection","display_name":"On implementing mpeg-21 intellectual property management and protection","publication_year":2007,"publication_date":"2007-10-29","ids":{"openalex":"https://openalex.org/W1973726463","doi":"https://doi.org/10.1145/1314276.1314280","mag":"1973726463"},"language":"en","primary_location":{"id":"doi:10.1145/1314276.1314280","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1314276.1314280","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 ACM workshop on Digital Rights Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036433709","display_name":"Nicholas Paul Sheppard","orcid":null},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Nicholas Paul Sheppard","raw_affiliation_strings":["The University of Wollongong, Australia","The University of Wollongong , Australia"],"affiliations":[{"raw_affiliation_string":"The University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"The University of Wollongong , Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5036433709"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":null,"apc_paid":null,"fwci":4.9786,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.94963303,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"10","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11769","display_name":"Copyright and Intellectual Property","score":0.942300021648407,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.900600016117096,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7492830753326416},{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.7354544997215271},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.726451575756073},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5839993953704834},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.46744048595428467},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.45561274886131287},{"id":"https://openalex.org/keywords/digital-rights","display_name":"Digital rights","score":0.43411242961883545},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.42175811529159546},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4124164581298828},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.2928195893764496},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14093124866485596},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08992123603820801}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7492830753326416},{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.7354544997215271},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.726451575756073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5839993953704834},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.46744048595428467},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.45561274886131287},{"id":"https://openalex.org/C2776393157","wikidata":"https://www.wikidata.org/wiki/Q113462","display_name":"Digital rights","level":2,"score":0.43411242961883545},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.42175811529159546},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4124164581298828},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.2928195893764496},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14093124866485596},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08992123603820801},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1314276.1314280","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1314276.1314280","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 ACM workshop on Digital Rights Management","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-1586","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/infopapers/580","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"presentation"},{"id":"pmh:oai:figshare.com:article/27802254","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/27802254","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W46681494","https://openalex.org/W69692118","https://openalex.org/W1481328777","https://openalex.org/W1484688560","https://openalex.org/W1560906482","https://openalex.org/W1600399702","https://openalex.org/W1625130424","https://openalex.org/W1757679576","https://openalex.org/W1969799644","https://openalex.org/W1975141633","https://openalex.org/W1979119302","https://openalex.org/W1990790540","https://openalex.org/W2014065603","https://openalex.org/W2021488614","https://openalex.org/W2029941734","https://openalex.org/W2049969153","https://openalex.org/W2067251724","https://openalex.org/W2071438669","https://openalex.org/W2081578468","https://openalex.org/W2112789998","https://openalex.org/W2117616933","https://openalex.org/W3159712608","https://openalex.org/W4230171413"],"related_works":["https://openalex.org/W2161993807","https://openalex.org/W2004497706","https://openalex.org/W2185464333","https://openalex.org/W1562323537","https://openalex.org/W2076224808","https://openalex.org/W2421825467","https://openalex.org/W2098827397","https://openalex.org/W2169821870","https://openalex.org/W2975243589","https://openalex.org/W2163764535"],"abstract_inverted_index":{"The":[0],"MPEG-21":[1,30,56],"Intellectual":[2],"Property":[3],"Management":[4],"and":[5,14,55,94,117],"Protection":[6],"(\"IPMP\")":[7],"Components":[8],"specify":[9,48],"a":[10,87,95],"framework":[11],"for":[12],"inter-operable":[13],"renewable":[15],"digital":[16,26],"rights":[17,27],"management":[18,28],"based":[19,73],"on":[20,74],"IPMP":[21,43,53,65,71],"tools":[22,54,72],"that":[23,85,122],"implement":[24],"proprietary":[25,42],"features.":[29],"defines":[31],"the":[32,49,64,75,100],"mechanism":[33],"by":[34],"which":[35,52],"protected":[36],"multimedia":[37],"objects":[38],"are":[39],"associated":[40],"with":[41],"tools,":[44],"but":[45],"does":[46],"not":[47],"interface":[50,69],"through":[51],"terminals":[57],"communicate.This":[58],"paper":[59],"describes":[60],"an":[61,68,92],"implementation":[62,106],"of":[63,82,102],"components":[66],"including":[67],"to":[70,89,99,110],"MPEG":[76],"Rights":[77],"Expression":[78],"Language;":[79],"dynamic":[80],"construction":[81],"authorisation":[83,103],"proofs":[84],"permit":[86],"principal":[88],"carry":[90],"out":[91],"action;":[93],"cryptographic":[96],"architecture":[97],"bound":[98],"existence":[101],"proofs.":[104],"This":[105],"has":[107],"been":[108],"applied":[109],"scenarios":[111],"in":[112,127],"copyright":[113],"protection,":[114,120],"privacy":[115],"protection":[116],"corporate":[118],"document":[119],"suggesting":[121],"``IPMP''":[123],"may":[124],"be":[125],"useful":[126],"applications":[128],"other":[129],"than":[130],"intellectual":[131],"property.":[132]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
