{"id":"https://openalex.org/W3161688457","doi":"https://doi.org/10.1145/3448734.3450776","title":"A Decentralized Copyright Protection Method Supporting Validity Period Control","display_name":"A Decentralized Copyright Protection Method Supporting Validity Period Control","publication_year":2021,"publication_date":"2021-01-28","ids":{"openalex":"https://openalex.org/W3161688457","doi":"https://doi.org/10.1145/3448734.3450776","mag":"3161688457"},"language":"en","primary_location":{"id":"doi:10.1145/3448734.3450776","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3448734.3450776","pdf_url":null,"source":{"id":"https://openalex.org/S4306531993","display_name":"The 2nd International Conference on Computing and Data Science","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2nd International Conference on Computing and Data Science","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101119142","display_name":"Bo Geng","orcid":null},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Geng","raw_affiliation_strings":["Beijing Information Science &amp; Technology University"],"affiliations":[{"raw_affiliation_string":"Beijing Information Science &amp; Technology University","institution_ids":["https://openalex.org/I78675632"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100773104","display_name":"Ning Li","orcid":"https://orcid.org/0000-0001-7394-0640"},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Li","raw_affiliation_strings":["Beijing Information Science &amp; Technology University"],"affiliations":[{"raw_affiliation_string":"Beijing Information Science &amp; Technology University","institution_ids":["https://openalex.org/I78675632"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008564522","display_name":"Feng Xue","orcid":"https://orcid.org/0000-0003-2828-1476"},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xue Feng","raw_affiliation_strings":["Beijing Information Science &amp; Technology University"],"affiliations":[{"raw_affiliation_string":"Beijing Information Science &amp; Technology University","institution_ids":["https://openalex.org/I78675632"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020192481","display_name":"Yunmei Shi","orcid":"https://orcid.org/0000-0002-3051-4796"},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunmei Shi","raw_affiliation_strings":["Beijing Information Science &amp; Technology University"],"affiliations":[{"raw_affiliation_string":"Beijing Information Science &amp; Technology University","institution_ids":["https://openalex.org/I78675632"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101119142"],"corresponding_institution_ids":["https://openalex.org/I78675632"],"apc_list":null,"apc_paid":null,"fwci":0.2836,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.42956817,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"000","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9593999981880188,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.762435793876648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.573544979095459},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.5661829710006714},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5652382969856262},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.47795557975769043},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.46976515650749207},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.46771353483200073},{"id":"https://openalex.org/keywords/decentralization","display_name":"Decentralization","score":0.4633496403694153},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.46107104420661926},{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.4241063594818115},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4174790382385254},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.3163934051990509},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.19895318150520325},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18447065353393555}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.762435793876648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.573544979095459},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.5661829710006714},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5652382969856262},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.47795557975769043},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.46976515650749207},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.46771353483200073},{"id":"https://openalex.org/C136810230","wikidata":"https://www.wikidata.org/wiki/Q188961","display_name":"Decentralization","level":2,"score":0.4633496403694153},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.46107104420661926},{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.4241063594818115},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4174790382385254},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.3163934051990509},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.19895318150520325},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18447065353393555},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3448734.3450776","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3448734.3450776","pdf_url":null,"source":{"id":"https://openalex.org/S4306531993","display_name":"The 2nd International Conference on Computing and Data Science","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2nd International Conference on Computing and Data Science","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W563169923","https://openalex.org/W2330979440","https://openalex.org/W2378031653","https://openalex.org/W2385846220","https://openalex.org/W2402534533","https://openalex.org/W2605738864","https://openalex.org/W2728144168","https://openalex.org/W2729223247","https://openalex.org/W2783232377","https://openalex.org/W2789968173","https://openalex.org/W2809497446","https://openalex.org/W2883500013","https://openalex.org/W2911804265","https://openalex.org/W2946811983","https://openalex.org/W2971941632","https://openalex.org/W2998274282","https://openalex.org/W3004205740","https://openalex.org/W3009597200","https://openalex.org/W3013838279","https://openalex.org/W4214929722","https://openalex.org/W4233370869","https://openalex.org/W4300127641","https://openalex.org/W4391092847","https://openalex.org/W6758003682","https://openalex.org/W7065037751"],"related_works":["https://openalex.org/W4384009623","https://openalex.org/W1998008603","https://openalex.org/W1562323537","https://openalex.org/W1972536982","https://openalex.org/W1972406709","https://openalex.org/W2736718217","https://openalex.org/W4238646005","https://openalex.org/W2063703515","https://openalex.org/W2089395279","https://openalex.org/W2082791829"],"abstract_inverted_index":{"In":[0],"response":[1],"to":[2,36,75,89,119,157],"the":[3,20,38,45,50,57,80,99,111,122,130],"requirements":[4],"of":[5,52,59,63,95,132],"digital":[6,12,39,90,133],"copyright":[7,25,40,145,150],"protection":[8,26,41,146],"measures":[9],"that":[10,28,138],"ensure":[11],"content":[13,91,102],"security":[14,131],"and":[15,65,93,104],"support":[16,148],"validity":[17,30,69,151],"period":[18,31,70,152],"management,":[19],"paper":[21],"introduces":[22],"a":[23,68],"decentralized":[24,144],"solution":[27,140],"incorporates":[29],"control.":[32],"Firstly,":[33],"we":[34],"propose":[35],"establish":[37],"architecture":[42],"based":[43,109],"on":[44,110,124],"consortium":[46],"blockchain,":[47],"which":[48,114,154],"ensures":[49],"authenticity":[51],"transaction":[53],"information":[54],"by":[55,82],"leveraging":[56],"merits":[58],"blockchain":[60],"in":[61,79,161],"terms":[62],"decentralization":[64],"immutability.":[66],"Secondly,":[67],"control":[71,94],"model":[72],"is":[73,155],"proposed":[74],"solve":[76],"current":[77],"issues":[78],"field":[81],"applying":[83],"InterPlanetary":[84],"File":[85],"System":[86],"address":[87],"mapping":[88],"storage":[92],"mapped":[96],"addresses.":[97],"As":[98],"last":[100],"step,":[101],"distribution":[103],"usage":[105],"protocols":[106],"are":[107],"designed":[108],"above":[112],"methods,":[113],"adopt":[115],"asymmetric":[116],"encryption":[117],"methods":[118],"help":[120],"eliminate":[121],"reliance":[123],"third-party":[125],"key":[126],"management":[127],"while":[128],"ensuring":[129],"contents.":[134],"Experimental":[135],"results":[136],"prove":[137],"our":[139],"can":[141],"realize":[142],"effective":[143],"with":[147],"for":[149],"control,":[153],"expected":[156],"have":[158],"good":[159],"prospects":[160],"real-world":[162],"applications.":[163]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
