{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:24:14Z","timestamp":1725701054153},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T00:00:00Z","timestamp":1692316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T00:00:00Z","timestamp":1692316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,18]]},"DOI":"10.1109\/dsc59305.2023.00083","type":"proceedings-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T19:32:58Z","timestamp":1704742378000},"page":"533-539","source":"Crossref","is-referenced-by-count":0,"title":["A Trust Usage Control Approach for Media Player Based on Intel SGX"],"prefix":"10.1109","author":[{"given":"Ruoyu","family":"Wang","sequence":"first","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University,Guangzhou,China"}]},{"given":"Junjian","family":"Li","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University,Guangzhou,China"}]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University,Guangzhou,China"}]},{"given":"Naqin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University,Guangzhou,China"}]},{"given":"Jiahao","family":"Liu","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University,Guangzhou,China"}]}],"member":"263","reference":[{"article-title":"IFPI","volume-title":"IFPIs Global Music Report 2023","year":"2023","key":"ref1"},{"article-title":"52pojie","volume-title":"Analysis of QQ Music App API for High-Resolution Lossless Audio Quality Downloads","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2857546.2857609"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417270"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3183342"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960526"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3123312"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205990"},{"key":"ref11","first-page":"610","article-title":"PrivacyGuard: Enforcing private data usage control with blockchain and attested offchain contract execution","volume-title":"Proc. Eur. Symp. Res. Comput. Secur.","author":"Xiao","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"ref13","first-page":"283","article-title":"Opaque: An oblivious and encrypted distributed analytics platform","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Des. Implementation","author":"Zheng","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3231594"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3170274"},{"key":"ref16","first-page":"687","article-title":"Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services[C]","volume-title":"USENIX Security Symposium","author":"Wang","year":"2013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343109"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS47205.2019.9040744"},{"article-title":"apple","volume-title":"FairPlay Streaming Overview","year":"2023","key":"ref19"},{"article-title":"QQ Music","volume-title":"QQ Music Client","year":"2023","key":"ref20"},{"article-title":"KuGou","volume-title":"KuGou Music Client","year":"2023","key":"ref21"},{"article-title":"NetEase Cloud Music","volume-title":"NetEase Cloud Music Client","year":"2023","key":"ref22"},{"article-title":"y81","volume-title":"Pirate audio app download","year":"2023","key":"ref23"},{"article-title":"chilkatsoft","volume-title":"CkCrypt2 C++ Reference Documentation","year":"2023","key":"ref24"},{"article-title":"un4seen","volume-title":"BASS Developments","year":"2023","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11172710"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3308850"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS55109.2022.00014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-022-07409-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00072"}],"event":{"name":"2023 8th International Conference on Data Science in Cyberspace (DSC)","start":{"date-parts":[[2023,8,18]]},"location":"Hefei, China","end":{"date-parts":[[2023,8,20]]}},"container-title":["2023 8th International Conference on Data Science in Cyberspace (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10380805\/10380970\/10381443.pdf?arnumber=10381443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:58:40Z","timestamp":1705107520000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10381443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,18]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/dsc59305.2023.00083","relation":{},"subject":[],"published":{"date-parts":[[2023,8,18]]}}}