{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:39:01Z","timestamp":1725557941552},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540404101"},{"type":"electronic","value":"9783540449935"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-44993-5_4","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:21:24Z","timestamp":1277234484000},"page":"51-60","source":"Crossref","is-referenced-by-count":3,"title":["Key Challenges in DRM: An Industry Perspective"],"prefix":"10.1007","author":[{"given":"Brian A.","family":"LaMacchia","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Ayars, J.: XMCL\u2013the eXtensible Media Commerce Language, draft as of June 2001, Available at http:\/\/xmcl.org\/specification.html"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-49135-X_9","volume-title":"Security Protocols","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust Management for Public Key Infrastructures. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 59\u201363. Springer, Heidelberg (1999)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"#cr-split#-4_CR4.1","doi-asserted-by":"crossref","unstructured":"Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. In: Proceedings of the Sixth International World Wide Web Conference, Santa Clara, CA (April 1997);","DOI":"10.1016\/S0169-7552(97)00009-3"},{"key":"#cr-split#-4_CR4.2","doi-asserted-by":"crossref","unstructured":"Reprinted in Computer Networks and ISDN Systems 29, 953-964 (1997)","DOI":"10.1016\/S0169-7552(97)00009-3"},{"key":"4_CR5","unstructured":"eXtensible Rights Markup Language (XrML) 2.1, submission by ContentGuard to the OASIS Rights Language Technical Committee (May 2002), Available at http:\/\/www.oasis-open.org\/committees\/rights\/documents\/xrml200205.zip"},{"key":"4_CR6","unstructured":"Fox, B., LaMacchia, B.: A Safe Harbor for Designers of DRM Systems. Communications of the ACM (to appear)"},{"key":"4_CR7","unstructured":"Godik, S., Moses, T. (eds.): OASIS eXtensible Access Control Markup Language (XACML). OASIS eXtensible Access Control Markup Language Technical Committee, Working Draft (September 2002)"},{"key":"4_CR8","unstructured":"Hallam-Baker, P., Maler, E. (eds.): Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML). OASIS XML-Based Security Services Technical Committee (May 2002)"},{"key":"4_CR9","unstructured":"Iannella, R. (ed.): Open Digital Rights Language (ODRL), Version 1.1, Available at http:\/\/odrl.net\/1.1\/ODRL-11.pdf"},{"key":"4_CR10","unstructured":"LaMacchia, B., Lange, S., Lyons, M., Martin, R., Price, K.: .NET Framework Security. Addison-Wesley, Reading (2002)"},{"key":"4_CR11","unstructured":"Moving Picture Experts Group (MPEG), ISO\/IEC JTC1\/SC29\/WG11. Working documents, available at http:\/\/mpeg.telecomitalialab.com\/working_documents.htm"},{"volume-title":"Trusted Computing Platforms, TCPA Technology in Context","year":"2002","key":"4_CR12","unstructured":"Pearson, S. (ed.): Trusted Computing Platforms, TCPA Technology in Context. Prentice Hall PTR, Englewood Cliffs (2002)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D. (eds.): PKIX Working Group, Internet Engineering Task Force. RFC 3280, Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile (April 2002), Available at http:\/\/www.ietf.org\/rfc\/rfc3280.txt","DOI":"10.17487\/rfc3280"},{"key":"4_CR14","unstructured":"Reddy, H. (Chairperson): OASIS Rights Language Technical Committee. Charter and documents, availabe at http:\/\/www.oasis-open.org\/committees\/rights\/"},{"key":"4_CR15","volume-title":"The Digital Property Rights Language, Manual and Tutorial, Version 1.02","author":"M. Stefik","year":"1996","unstructured":"Stefik, M.: The Digital Property Rights Language, Manual and Tutorial, Version 1.02. Xerox Palo Alto Research Center, Palo Alto (1996)"},{"key":"4_CR16","unstructured":"Trusted Computing Platform Alliance, TCPA Main Specification, Version 1.1b, Available at http:\/\/www.trustedcomputing.org\/docs\/main%20v1_1b.pdf"},{"key":"4_CR17","unstructured":"Trusted Computing Platform Alliance, TCPA PC Specific Implementation Specification, Version 1.00, Available at http:\/\/www.trustedcomputing.org\/docs\/TCPA_PCSpecificSpecifcation_v100.pdf"}],"container-title":["Lecture Notes in Computer Science","Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44993-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:38:40Z","timestamp":1559209120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44993-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540404101","9783540449935"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44993-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}