{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:44Z","timestamp":1750220444120,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,28]]},"DOI":"10.1145\/3448734.3450776","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T15:47:36Z","timestamp":1621266456000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Decentralized Copyright Protection Method Supporting Validity Period Control"],"prefix":"10.1145","author":[{"given":"Bo","family":"Geng","sequence":"first","affiliation":[{"name":"Beijing Information Science &amp; Technology University"}]},{"given":"Ning","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Information Science &amp; Technology University"}]},{"given":"Xue","family":"Feng","sequence":"additional","affiliation":[{"name":"Beijing Information Science &amp; Technology University"}]},{"given":"Yunmei","family":"Shi","sequence":"additional","affiliation":[{"name":"Beijing Information Science &amp; Technology University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A survey of the research on digital rights management. Jisuanji Xuebao(Chinese Journal of Computers), 28(12):1957\u20131968","author":"Yu Yin-Yan","year":"2005","unstructured":"Yin-Yan Yu and Zhi Tang . A survey of the research on digital rights management. Jisuanji Xuebao(Chinese Journal of Computers), 28(12):1957\u20131968 , 2005 . Yin-Yan Yu and Zhi Tang. A survey of the research on digital rights management. Jisuanji Xuebao(Chinese Journal of Computers), 28(12):1957\u20131968, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7961371"},{"issue":"010","key":"e_1_3_2_1_3_1","first-page":"153","article-title":"Design and implementation of a novel general format multimedia digital rights management system","volume":"000","author":"Huang Qinlong","year":"2013","unstructured":"Qinlong Huang , Zhaofeng Ma , Jia Mo , Xinxin Niu , and Yixian Yang . Design and implementation of a novel general format multimedia digital rights management system . China Communications , 000 ( 010 ): 153 \u2013 161 , 2013 . Qinlong Huang, Zhaofeng Ma, Jia Mo, Xinxin Niu, and Yixian Yang. Design and implementation of a novel general format multimedia digital rights management system. China Communications, 000(010):153\u2013161, 2013.","journal-title":"China Communications"},{"key":"e_1_3_2_1_4_1","first-page":"486","volume-title":"Proceedings of the Evaluation and Assessment in Software Engineering","author":"Gaber Tarek","unstructured":"Tarek Gaber , Ali Ahmed , and Amira Mostafa . Privdrm : A privacy-preserving secure digital right management system . In Proceedings of the Evaluation and Assessment in Software Engineering , pages 481\u2013 486 . 2020. Tarek Gaber, Ali Ahmed, and Amira Mostafa. Privdrm: A privacy-preserving secure digital right management system. In Proceedings of the Evaluation and Assessment in Software Engineering, pages 481\u2013486. 2020."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5614-4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2012.02771"},{"key":"e_1_3_2_1_7_1","first-page":"411","volume-title":"IFIP International Conference on ICT Systems Se- curity and Privacy Protection","author":"Schaub Alexander","unstructured":"Alexander Schaub , R\u00b4emi Bazin , Omar Hasan , and Lionel Brunie . A trustless privacy- preserving reputation system . In IFIP International Conference on ICT Systems Se- curity and Privacy Protection , pages 398\u2013 411 . Springer, 2016. Alexander Schaub, R\u00b4emi Bazin, Omar Hasan, and Lionel Brunie. A trustless privacy- preserving reputation system. In IFIP International Conference on ICT Systems Se- curity and Privacy Protection, pages 398\u2013411. Springer, 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.261"},{"key":"e_1_3_2_1_9_1","first-page":"46","volume-title":"International Con-ference on Blockchain","author":"Zhang Zehao","unstructured":"Zehao Zhang and Li Zhao . A design of digital rights management mechanism based on blockchain technology . In International Con-ference on Blockchain , pages 32\u2013 46 . Springer, 2018. Zehao Zhang and Li Zhao. A design of digital rights management mechanism based on blockchain technology. In International Con-ference on Blockchain, pages 32\u201346. Springer, 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301403.3301404"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.029"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9020084"},{"key":"e_1_3_2_1_13_1","first-page":"468","volume-title":"2019 International Conference on Information Networking (ICOIN)","author":"Jeong Yena","unstructured":"Yena Jeong , DongYeop Hwang , and Ki-Hyung Kim . Blockchain-based management of video surveillance systems . In 2019 International Conference on Information Networking (ICOIN) , pages 465\u2013 468 . IEEE, 2019. Yena Jeong, DongYeop Hwang, and Ki-Hyung Kim. Blockchain-based management of video surveillance systems. In 2019 International Conference on Information Networking (ICOIN), pages 465\u2013468. IEEE, 2019."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Yi Ouyang Xianghan Zheng Xiaoliang Lu Lin Xiaowei and Shengyin Zhang. Copyright protection application based on blockchain technology. In 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications Big Data & Cloud Computing Sustainable Computing & Communications Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom) pages 1271\u20131274. IEEE 2019.  Yi Ouyang Xianghan Zheng Xiaoliang Lu Lin Xiaowei and Shengyin Zhang. Copyright protection application based on blockchain technology. In 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications Big Data & Cloud Computing Sustainable Computing & Communications Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom) pages 1271\u20131274. IEEE 2019.","DOI":"10.1109\/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00182"},{"key":"e_1_3_2_1_15_1","first-page":"125","volume-title":"International conference on financial cryptography and data security","author":"Eyal I","unstructured":"Eyal I Croman K, Decker C. On scaling decentralized blockchains . In International conference on financial cryptography and data security , pages 106\u2013 125 . Springer, 2016. Eyal I Croman K, Decker C. On scaling decentralized blockchains. In International conference on financial cryptography and data security, pages 106\u2013125. Springer, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_17_1","first-page":"708","volume-title":"2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI)","author":"Zheng Qiuhong","unstructured":"Qiuhong Zheng , Yi Li , Ping Chen , and Xinghua Dong . An innovative ipfs-based storage model for blockchain . In 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI) , pages 704\u2013 708 . IEEE, 2018. Qiuhong Zheng, Yi Li, Ping Chen, and Xinghua Dong. An innovative ipfs-based storage model for blockchain. In 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI), pages 704\u2013708. IEEE, 2018."},{"key":"e_1_3_2_1_18_1","first-page":"2657","volume-title":"2017 IEEE International Conference on Big Data (Big Data)","author":"Chen Yongle","unstructured":"Yongle Chen , Hui Li , Kejiao Li , and Jiyang Zhang . An improved p2p file system scheme based on ipfs and blockchain . In 2017 IEEE International Conference on Big Data (Big Data) , pages 2652\u2013 2657 . IEEE, 2017. Yongle Chen, Hui Li, Kejiao Li, and Jiyang Zhang. An improved p2p file system scheme based on ipfs and blockchain. In 2017 IEEE International Conference on Big Data (Big Data), pages 2652\u20132657. IEEE, 2017."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01453-5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080659"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2048-0"},{"key":"e_1_3_2_1_22_1","volume-title":"Alexandria Engineering Journal","author":"El-Rahman Hassan Heba","year":"2020","unstructured":"Heba El-Rahman Hassan , Mohamed Tahoun , and Gh S ElTaweel . A robust computational drm framework for protecting multimedia contents using aes and ecc . Alexandria Engineering Journal , 2020 . Heba El-Rahman Hassan, Mohamed Tahoun, and Gh S ElTaweel. A robust computational drm framework for protecting multimedia contents using aes and ecc. Alexandria Engineering Journal, 2020."}],"event":{"name":"CONF-CDS 2021: The 2nd International Conference on Computing and Data Science","acronym":"CONF-CDS 2021","location":"Stanford CA USA"},"container-title":["The 2nd International Conference on Computing and Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450776","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448734.3450776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:38Z","timestamp":1750193258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450776"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":22,"alternative-id":["10.1145\/3448734.3450776","10.1145\/3448734"],"URL":"https:\/\/doi.org\/10.1145\/3448734.3450776","relation":{},"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"2021-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}