{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:54:57Z","timestamp":1725530097391},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642008429"},{"type":"electronic","value":"9783642008436"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00843-6_15","type":"book-chapter","created":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T14:42:08Z","timestamp":1238596928000},"page":"159-170","source":"Crossref","is-referenced-by-count":0,"title":["Security Specification for Conversion Technologies of Heterogeneous DRM Systems"],"prefix":"10.1007","author":[{"given":"Heasuk","family":"Jo","sequence":"first","affiliation":[]},{"given":"Woongryul","family":"Jeon","sequence":"additional","affiliation":[]},{"given":"Yunho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Microsoft Windows Media Rights Manager, http:\/\/www.microsoft.com\/windows\/windowsmedia\/howto\/articles\/drmarchitecture.aspx"},{"key":"15_CR2","unstructured":"iTunes FairPlay, http:\/\/www.apple.com\/lu\/support\/itunes\/authetication.html"},{"key":"15_CR3","unstructured":"PachyDRM, http:\/\/pachydrm.com"},{"key":"15_CR4","unstructured":"Secure Digital Container, http:\/\/www.digicont.com"},{"key":"15_CR5","unstructured":"International Standard ISO\/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 1 (2005)"},{"key":"15_CR6","unstructured":"International Standard ISO\/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 2 (2005)"},{"key":"15_CR7","unstructured":"International Standard ISO\/IEC 15408, Common Criteria for Information Technology Security Evaluation, Part 3 (2005)"},{"key":"15_CR8","unstructured":"International Standard ISO\/IEC 15408, Common Methodology for Information Technology Security Evaluation, Evaluation methodology (2005)"},{"key":"15_CR9","unstructured":"http:\/\/digital-lifestyles.info\/drm-interchange-alive-and-living-in-korea\/"},{"key":"15_CR10","unstructured":"http:\/\/technomart.etri.re.kr"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Herrmann, D.S.: Using the Common Criteria for IT Security Evaluation. Auerbach publications (2003)","DOI":"10.1201\/9781420031423"},{"key":"15_CR12","unstructured":"Open Mobile Alliance, DRM Architecture Approved Version 2.0 (2006)"},{"key":"15_CR13","unstructured":"Apple Inc. Common Criteria Certification: Apple\u2019s Ongoing Commitment to Security, Whitepaper"},{"key":"15_CR14","unstructured":"Jaafari, A.B.: Common Criteria for Information Technology Security Evaluation Mobile Phone Digital Rights Management Protection Profile, Polytechnic University (2004)"},{"key":"15_CR15","unstructured":"Jaafari, A.B.: Protection Profile Reuse: Case Study of the reusability of the Smart Card Protection Profile for producing the Mobile Phone Digital Rights Management Protction Profile, Polytechnic University (2004)"},{"key":"15_CR16","unstructured":"Naini, R.S., Sheppard, N.P., Uehara, T.: Import\/Export in Digital Rights Management. In: ACM Workshop on Digital Rights Management (2004)"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/JPROC.2004.827357","volume":"92","author":"R.H. Koenen","year":"2004","unstructured":"Koenen, R.H., Lacy, J., Mackay, M., Mitchell, S.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE\u00a092, 883\u2013897 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Bradley, W., Maher, D.: The NEMO P2P service orchestration framework. In: Proc. 37th Annu. Hawaii Int. Conf. System Sciences (2004)","DOI":"10.1109\/HICSS.2004.1265686"},{"key":"15_CR19","volume-title":"Open DRM and the Future of Media","author":"V. Torres","year":"2008","unstructured":"Torres, V., Serrao, C., Dias, M.S., Delgado, J.: Open DRM and the Future of Media. IEEE Computer Society, Los Alamitos (2008)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Rump, N.: Can digital rights management be standardized? IEEE Signal Processing Magazine (2004)","DOI":"10.1109\/MSP.2004.1276114"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00843-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T07:14:18Z","timestamp":1558250058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00843-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008429","9783642008436"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00843-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}