{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:37:39Z","timestamp":1742913459393,"version":"3.40.3"},"publisher-location":"London","reference-count":10,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447153726"},{"type":"electronic","value":"9781447153733"}],"license":[{"start":{"date-parts":[[2013,11,28]],"date-time":"2013-11-28T00:00:00Z","timestamp":1385596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,11,28]],"date-time":"2013-11-28T00:00:00Z","timestamp":1385596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4471-5373-3_7","type":"book-chapter","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T03:02:45Z","timestamp":1385521365000},"page":"165-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Adoption of Rights Expression Language in CONVERGENCE"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Tropea","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Blefari Melazzi","sequence":"additional","affiliation":[]},{"given":"Helder","family":"Castro","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Chiariglione","sequence":"additional","affiliation":[]},{"given":"Angelo","family":"Difino","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Huebner","sequence":"additional","affiliation":[]},{"given":"Angelos","family":"Christos-Anadiotis","sequence":"additional","affiliation":[]},{"given":"Aziz","family":"Mousas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,28]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"J. Bethencourt, A. Sahai, and B. Waters. 2007. Ciphertext-Policy Attribute-Based Encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP \u203207). IEEE Computer Society, Washington, DC, USA, 321\u2013334. DOI:10.1109\/SP.2007.11\n                http:\/\/dx.doi.org\/10.1109\/SP.2007.11.","DOI":"10.1109\/SP.2007.11"},{"key":"7_CR2","unstructured":"ccREL Website, http:\/\/creativecommons.org\/ns"},{"key":"7_CR3","unstructured":"Deliverable D4.1, CONVERGENCE project. Preliminary Definition of the Versatile Digital Item. http:\/\/www.ict-convergence.eu\/deliverables, 2011."},{"key":"7_CR4","unstructured":"IETF Network Working Group. An Internet Attribute Certificate Profile for Authorization. Request for Comments: 3281. April 2002. http:\/\/www.ietf.org\/rfc\/rfc3281.txt"},{"key":"7_CR5","unstructured":"ISO\/IEC 21000-5:2004, International Standards Organization (ISO), JTC 1, SC 29, Information technology\u2014Multimedia framework (MPEG-21)\u2014Part 5: Rights Expression Language."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"A. Lewko and B. Waters. 2011. Decentralizing attribute-based encryption. In Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology (EUROCRYPT\u201911), Kenneth G. Paterson (Ed.). Springer-Verlag, Berlin, Heidelberg, 568\u2013588.","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"7_CR7","unstructured":"ODRL Website http:\/\/odrl.net\/"},{"key":"7_CR8","unstructured":"OMA DRM Release 2.2 Website, http:\/\/www.openmobilealliance.org\/Technical\/release_program\/drm_v2_2.aspx"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"T. Pedersen. 1991. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO \u201891), Joan Feigenbaum (Ed.). Springer-Verlag, London, UK, 129\u2013140.","DOI":"10.1007\/3-540-46766-1_9"},{"key":"7_CR10","unstructured":"M. Stefik, Letting Loose the Light: Igniting Commerce in Electronic Publication, In: M. STefik (ed.), Internet Dreams: Archetypes, Myths, and Metaphors (pp. 219\u2013253), Cambridge (MA), MIT Press, 1996."}],"container-title":["Signals and Communication Technology","Enhancing the Internet with the CONVERGENCE System"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-5373-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T19:14:57Z","timestamp":1675797297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-5373-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,28]]},"ISBN":["9781447153726","9781447153733"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-5373-3_7","relation":{},"ISSN":["1860-4862","1860-4870"],"issn-type":[{"type":"print","value":"1860-4862"},{"type":"electronic","value":"1860-4870"}],"subject":[],"published":{"date-parts":[[2013,11,28]]},"assertion":[{"value":"28 November 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}