{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:44:33Z","timestamp":1725486273301},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540433248"},{"type":"electronic","value":"9783540458760"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45876-x_43","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T22:28:28Z","timestamp":1181168908000},"page":"701-711","source":"Crossref","is-referenced-by-count":2,"title":["TDB: A Database System for Digital Rights Management"],"prefix":"10.1007","author":[{"given":"Radek","family":"Vingralek","sequence":"first","affiliation":[]},{"given":"Umesh","family":"Maheshwari","sequence":"additional","affiliation":[]},{"given":"William","family":"Shapiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,14]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"D. Aucsmith. Tamper resistant software: an implementation. In Proc. International Workshop on Information Hiding, 1996. Cambridge, UK.","DOI":"10.1007\/3-540-61996-8_49"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proceedings of the ACM Conference on Principles of Programming Languages, 1998. San Diego, CA.","DOI":"10.1145\/268946.268962"},{"key":"43_CR3","unstructured":"J. Gray. The Benchmark Handbook For Databse and Transaction Processing Systems. Morgan Kaufmann, 1991."},{"key":"43_CR4","unstructured":"J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1993."},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"A. Kemper, C. Kilger, and G. Moerkotte. Function materialization in object bases. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 1991.","DOI":"10.1145\/115790.115833"},{"key":"43_CR6","unstructured":"U. Maheshwari, R. Vingralek, and W. Shapiro. How to build a trusted database system on untrusted storage. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000. San Diego, CA."},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"M. Rosenblum and J. Ousterhout. The design and implementation of a logstructured file system. In Proceedings of the 13th ACM Symposium on Operating Systems Principles, 1991. Pacific Grove, CA.","DOI":"10.1145\/121132.121137"},{"key":"43_CR8","unstructured":"M. Seltzer and M. Olson. Challenges in embedded database system administration. In Proceeding of the Embedded System Workshop, 1999. Cambridge, MA (software available at www.sleepycat.com )."},{"key":"43_CR9","unstructured":"Infineon Technologies. Eurochip II-SLE 5536. available at www.infineon.com\/cgi\/ecrm.dll\/ecrm\/scripts\/prod_ov.jsp?\/oid=14702&\/cat_oid=-8233 , November 2000."}],"container-title":["Lecture Notes in Computer Science","Advances in Database Technology \u2014 EDBT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45876-X_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T15:44:35Z","timestamp":1556466275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45876-X_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540433248","9783540458760"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-45876-x_43","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}