{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:40:15Z","timestamp":1730317215928,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600179","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T09:53:50Z","timestamp":1407837230000},"page":"1-11","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Open vs. closed systems for accountability"],"prefix":"10.1145","author":[{"given":"Joan","family":"Feigenbaum","sequence":"first","affiliation":[{"name":"Yale University"}]},{"given":"Aaron D.","family":"Jaggard","sequence":"additional","affiliation":[{"name":"U.S. Naval Research Laboratory"}]},{"given":"Rebecca N.","family":"Wright","sequence":"additional","affiliation":[{"name":"Rutgers University"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.039"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.26"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151414.1151416"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622487.1622491"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352582.1352588"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805950.1805959"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2527031.2527043"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073282"},{"key":"e_1_3_2_1_9_1","volume-title":"Social Science, Computer Science","author":"Feigenbaum J.","year":"2013","unstructured":"J. Feigenbaum , A. D. Jaggard , and R. N. Wright . Accountability as an interface between cybersecurity and social science . In L. J. Hoffman, editor, Social Science, Computer Science , and Cybersecurity Workshop Summary Report, 2013 . George Washington University CSPRI report GW-CSPRI-2013-02, http:\/\/www.cspri.seas.gwu.edu\/uploads\/2\/1\/3\/2\/21324690\/research_summary.pdf. J. Feigenbaum, A. D. Jaggard, and R. N. Wright. Accountability as an interface between cybersecurity and social science. In L. J. Hoffman, editor, Social Science, Computer Science, and Cybersecurity Workshop Summary Report, 2013. George Washington University CSPRI report GW-CSPRI-2013-02, http:\/\/www.cspri.seas.gwu.edu\/uploads\/2\/1\/3\/2\/21324690\/research_summary.pdf."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/570810.570812"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1162\/105864001300122476"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813098"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2005 Australasian Workshop on Grid Computing and e-Research -","volume":"44","author":"J\u00f8sang A.","year":"2005","unstructured":"A. J\u00f8sang , J. Fabre , B. Hay , J. Dalziel , and S. Pope . Trust requirements in identity management . In Proceedings of the 2005 Australasian Workshop on Grid Computing and e-Research - Volume 44 , ACSW Frontiers '05, pages 99--108, Darlinghurst, Australia, Australia , 2005 . Australian Computer Society, Inc. A. J\u00f8sang, J. Fabre, B. Hay, J. Dalziel, and S. Pope. Trust requirements in identity management. In Proceedings of the 2005 Australasian Workshop on Grid Computing and e-Research - Volume 44, ACSW Frontiers '05, pages 99--108, Darlinghurst, Australia, Australia, 2005. Australian Computer Society, Inc."},{"key":"e_1_3_2_1_15_1","series-title":"Communications in Computer and Information Science","first-page":"432","volume-title":"Advances in Computing and Communications","author":"Ko R. K. L.","year":"2011","unstructured":"R. K. L. Ko , B. S. Lee , and S. Pearson . Towards achieving accountability, auditability and trust in cloud computing . In A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki, and S. M. Thampi, editors, Advances in Computing and Communications , volume 193 of Communications in Computer and Information Science , pages 432 -- 444 . Springer Berlin Heidelberg , 2011 . R. K. L. Ko, B. S. Lee, and S. Pearson. Towards achieving accountability, auditability and trust in cloud computing. In A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki, and S. M. Thampi, editors, Advances in Computing and Communications, volume 193 of Communications in Computer and Information Science, pages 432--444. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839931"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2005.00434.x"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866366"},{"key":"e_1_3_2_1_19_1","volume-title":"Accessed","author":"Lampson B.","year":"2014","unstructured":"B. Lampson . Notes for presentation entitled \"Acountability and Freedom\", 2005. Available at http:\/\/research.microsoft.com\/en-us\/um\/people\/blampson\/slides\/AccountabilityAndFreedom.ppt. Accessed March 20, 2014 . B. Lampson. Notes for presentation entitled \"Acountability and Freedom\", 2005. Available at http:\/\/research.microsoft.com\/en-us\/um\/people\/blampson\/slides\/AccountabilityAndFreedom.ppt. Accessed March 20, 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592773"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646646.699185"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9299.00218"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.98"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/647504.728483"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647544.730472"},{"key":"e_1_3_2_1_27_1","volume-title":"Forging Global Accountabilities: Participation, Pluralism, and Public Ethics","author":"Weisband E.","year":"2007","unstructured":"E. Weisband and A. Ebrahim . Introduction: Forging global accountabilities . In A. Ebrahim and E. Weisband, editors, Forging Global Accountabilities: Participation, Pluralism, and Public Ethics . Cambridge University Press , 2007 . E. Weisband and A. Ebrahim. Introduction: Forging global accountabilities. In A. Ebrahim and E. Weisband, editors, Forging Global Accountabilities: Participation, Pluralism, and Public Ethics. Cambridge University Press, 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349043"}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T13:34:56Z","timestamp":1673530496000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600179"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":27,"alternative-id":["10.1145\/2600176.2600179","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600179","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}