{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:06:40Z","timestamp":1735582000632},"reference-count":16,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2003,3,1]],"date-time":"2003-03-01T00:00:00Z","timestamp":1046476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Decision Support Systems"],"published-print":{"date-parts":[[2003,3]]},"DOI":"10.1016\/s0167-9236(02)00067-2","type":"journal-article","created":{"date-parts":[[2003,1,9]],"date-time":"2003-01-09T07:31:12Z","timestamp":1042097472000},"page":"413-425","source":"Crossref","is-referenced-by-count":18,"title":["Integration of digital rights management into the Internet Open Trading Protocol"],"prefix":"10.1016","volume":"34","author":[{"given":"S.H","family":"Kwok","sequence":"first","affiliation":[]},{"given":"S.C","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"K.C","family":"Wong","sequence":"additional","affiliation":[]},{"given":"K.F","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"S.M","family":"Lui","sequence":"additional","affiliation":[]},{"given":"K.Y","family":"Tam","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/S0167-9236(02)00067-2_BIB1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1002\/bult.8","article-title":"Rights management and security in the electronic library","volume":"22","author":"Anderson","year":"1995","journal-title":"Bulletin of the American Society for Information Science"},{"issue":"4","key":"10.1016\/S0167-9236(02)00067-2_BIB2","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/49.668980","article-title":"Some general methods for tampering with watermarks","volume":"16","author":"Cox","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"12","key":"10.1016\/S0167-9236(02)00067-2_BIB3","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/S0167-9236(02)00067-2_BIB4","unstructured":"Digimarc, http:\/\/www.digimarc.com\/."},{"key":"10.1016\/S0167-9236(02)00067-2_BIB5","unstructured":"Electronic Business Extensive Markup Language (ebXML), http:\/\/www.ebxml.org\/."},{"issue":"6","key":"10.1016\/S0167-9236(02)00067-2_BIB6","doi-asserted-by":"crossref","DOI":"10.1045\/june2001-iannella","article-title":"Digital rights management (DRM) architectures","volume":"7","author":"Iannella","year":"2001","journal-title":"D-Lib Magazine"},{"key":"10.1016\/S0167-9236(02)00067-2_BIB7","unstructured":"Internet Open Trading Protocol\u2014IOTP Version 1.0., http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-trade-iotp-v1.0-protocol-07.txt."},{"key":"10.1016\/S0167-9236(02)00067-2_BIB8","unstructured":"InterTrust, http:\/\/www.intertrust.com\/news\/partnerspr\/musicmatch.html."},{"key":"10.1016\/S0167-9236(02)00067-2_BIB9","series-title":"InterTrust Announces PowerChord Digital Rights Management Software","year":"1999"},{"key":"10.1016\/S0167-9236(02)00067-2_BIB10","series-title":"Proceedings of the International Conference on Electronic Commerce (ICEC 2000)","first-page":"139","article-title":"An SDMI-based rights management system for electronic media using digital watermarking","author":"Kwok","year":"2000"},{"key":"10.1016\/S0167-9236(02)00067-2_BIB11","series-title":"Proceedings of the International Conference on Electronic Commerce (ICEC 2000)","first-page":"179","article-title":"Digital rights management in Internet open trading protocol (IOTP)","author":"Kwok","year":"2000"},{"key":"10.1016\/S0167-9236(02)00067-2_BIB12","unstructured":"Universal Description, Discovery and Integration (UDDI), http:\/\/www.ddi.org."},{"issue":"2","key":"10.1016\/S0167-9236(02)00067-2_BIB13","first-page":"68","article-title":"Protecting your property in cyberspace","volume":"34","author":"Wayner","year":"2000","journal-title":"Computerworld"},{"key":"10.1016\/S0167-9236(02)00067-2_BIB14","unstructured":"Windows Media Technologies, http:\/\/msdn.microsoft.com\/workshop\/imedia\/windowsmedia\/IntroToWMT.asp."},{"key":"10.1016\/S0167-9236(02)00067-2_BIB15","first-page":"484","article-title":"Agent-based copyright protection architecture for online electronic publishing","volume":"3657","author":"Yi","year":"1999","journal-title":"Proceedings of SPIE\u2014The International Society for Optical Engineering"},{"key":"10.1016\/S0167-9236(02)00067-2_BIB16","series-title":"Proc. of the International Conference on Imaging Science, System and Applications (June 30\u2013July 3)","article-title":"Applying digital watermarking techniques to online multimedia commerce","author":"Zhao","year":"1997"}],"container-title":["Decision Support Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167923602000672?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167923602000672?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T11:27:41Z","timestamp":1555154861000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167923602000672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,3]]}},"alternative-id":["S0167923602000672"],"URL":"https:\/\/doi.org\/10.1016\/s0167-9236(02)00067-2","relation":{},"ISSN":["0167-9236"],"issn-type":[{"value":"0167-9236","type":"print"}],"subject":[],"published":{"date-parts":[[2003,3]]}}}