{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:49:49Z","timestamp":1757544589059,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011688","name":"ECSEL-JU through the program ECSEL-Innovation Actions-2018 (ECSEL-IA) for research project in the area Cyber-Physical Systems","doi-asserted-by":"publisher","award":["CPS4EU ID-826276"],"award-info":[{"award-number":["CPS4EU ID-826276"]}],"id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2995564","type":"journal-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T20:49:58Z","timestamp":1589921398000},"page":"95987-95996","source":"Crossref","is-referenced-by-count":7,"title":["An Enterprise Rights Management System for On-the-Field Maintenance Facilities"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6315-4221","authenticated-orcid":false,"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2988-700X","authenticated-orcid":false,"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Riccio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.06.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2009.2034944"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2060326"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.07.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.008"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2016.31"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_5"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"journal-title":"Microsoft Rights Management Services","year":"2020","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79966-5_2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2690321"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0228-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-014-0248-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5220\/0007578605880595"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543909"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1023-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.05.006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.53"},{"journal-title":"Common criteria for information technology security evaluation part 1 Introduction and general model version 3 1 rev 4","year":"2012","key":"ref18"},{"journal-title":"Common criteria for information technology security evaluation part 2 Security functional components version 3 1 rev 4","year":"2012","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-150539"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2301517"},{"journal-title":"Adobe Livecycle ES4","year":"2020","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0975-y"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809860"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.881945"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2777991"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IUCC-CSS.2016.018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2009.2035978"},{"key":"ref9","article-title":"Trusted virtual domains&#x2014;Design, implementation and lessons learned","volume":"6163","author":"catuogno","year":"2009","journal-title":"Trusted Systems INTRUST"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.14"},{"journal-title":"Common criteria for information technology security evaluation part 3 Security assurance components version 3 1 rev 4","year":"2012","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref22","first-page":"1","article-title":"On the fusion of prosody, voice spectrum and face features for multimodal person verification","author":"farr\u00fas","year":"2006","journal-title":"Proc Int Conf Spoken Lang Process (ICSLP)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1604"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903538"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456467"},{"key":"ref41","first-page":"463","article-title":"Graphical passwords: A survey","author":"suo","year":"2005","journal-title":"Proc Ann Comput Secur Appl Conf (ACSAC)"},{"key":"ref23","first-page":"37","article-title":"Fusion of face and voice: An improvement","volume":"12","author":"fouda","year":"2012","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.03.019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-009-0417-2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322973"},{"journal-title":"TEE System Architecture v1 2","year":"2011","key":"ref25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09096295.pdf?arnumber=9096295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:52:08Z","timestamp":1639770728000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9096295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2995564","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}