{"id":"https://openalex.org/W1775717908","doi":"https://doi.org/10.1002/cpe.3458","title":"Frontier technologies of trust computing and network security","display_name":"Frontier technologies of trust computing and network security","publication_year":2015,"publication_date":"2015-04-29","ids":{"openalex":"https://openalex.org/W1775717908","doi":"https://doi.org/10.1002/cpe.3458","mag":"1775717908"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.3458","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.3458","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.3458","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["#N##TAB##TAB##TAB##TAB# Deakin University, Australia#N##TAB##TAB##TAB#"],"affiliations":[{"raw_affiliation_string":"#N##TAB##TAB##TAB##TAB# Deakin University, Australia#N##TAB##TAB##TAB#","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017655792","display_name":"Ahmed Al\u2010Dubi","orcid":null},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"funder","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ahmed Al\u2010Dubi","raw_affiliation_strings":["Edinburgh Napier University, UK."],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University, UK.","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057111258","display_name":"Lei Liu","orcid":"https://orcid.org/0000-0002-7171-1454"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"funder","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Liu","raw_affiliation_strings":["#N##TAB##TAB##TAB##TAB# Shandong University, China#N##TAB##TAB##TAB#"],"affiliations":[{"raw_affiliation_string":"#N##TAB##TAB##TAB##TAB# Shandong University, China#N##TAB##TAB##TAB#","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100730785","display_name":"Xiaowen Chu","orcid":"https://orcid.org/0000-0001-9745-4372"},"institutions":[{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"funder","lineage":["https://openalex.org/I141568987"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiaowen Chu","raw_affiliation_strings":["Hong Kong Baptist University Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong Baptist University Hong Kong","institution_ids":["https://openalex.org/I141568987"]}]}],"institution_assertions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":4740,"currency":"USD","value_usd":4740},"apc_paid":null,"fwci":0.295,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":1,"citation_normalized_percentile":{"value":0.546925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":66,"max":73},"biblio":{"volume":"27","issue":"12","first_page":"2907","last_page":"2909"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.992,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9864,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/frontier","display_name":"Frontier","score":0.86694694}],"concepts":[{"id":"https://openalex.org/C2778571376","wikidata":"https://www.wikidata.org/wiki/Q1355821","display_name":"Frontier","level":2,"score":0.86694694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.57460946},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.566454},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4429057},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33861876},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1183829},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.3458","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.3458","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.3458","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.3458","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1615476970","https://openalex.org/W1719179348","https://openalex.org/W1854187702","https://openalex.org/W1905691211","https://openalex.org/W1942610567","https://openalex.org/W1959306103","https://openalex.org/W2012398243","https://openalex.org/W2056401003","https://openalex.org/W2117888804","https://openalex.org/W2120305260","https://openalex.org/W2122598447","https://openalex.org/W2146505137","https://openalex.org/W2146825696","https://openalex.org/W2149014688","https://openalex.org/W2171222341"],"related_works":["https://openalex.org/W579144800","https://openalex.org/W4226099950","https://openalex.org/W2748952813","https://openalex.org/W2360633292","https://openalex.org/W2347401120","https://openalex.org/W2334292868","https://openalex.org/W2310010941","https://openalex.org/W2069525434","https://openalex.org/W2046798653","https://openalex.org/W1988132375"],"abstract_inverted_index":{"The":[0,48,179,255,283,330,400,418,518,548,599,612,670,685,758,823,858,866,916,969,1023,1037,1058,1075,1101,1179,1226,1238],"increasing":[1],"complexity":[2],"of":[3,44,55,62,96,104,117,124,172,211,224,230,278,304,309,327,336,385,474,523,532,593,608,628,681,707,766,775,820,831,856,888,924,952,997,1045,1064,1097,1103,1138,1185,1234],"computer":[4,32],"systems":[5,59,892],"and":[6,14,25,30,41,46,57,66,78,84,93,99,107,130,141,163,213,219,307,311,316,325,369,456,495,535,542,606,659,691,711,726,764,773,853,897,955,995,1007,1026,1041,1069,1088,1116,1123,1156,1232,1254,1269],"communication":[7],"networks":[8,207,353],"induces":[9],"tremendous":[10],"requirements":[11],"for":[12,60,143,158,262,339,349,424,491,498,516,571,654,722,742,753,872,884,1012,1054,1150,1251,1277],"trust":[13,1115],"security.":[15,109,485],"This":[16,87,356,440,577,715,804,1214],"special":[17,88,113,133,151,1283],"issue":[18,89,114,134,444,1113],"includes":[19],"topics":[20],"on":[21,445,568,811,979,1211],"trusted":[22,105,126],"computing,":[23],"risk":[24],"reputation":[26],"management,":[27],"network":[28,108,125,455,484,657,945],"security":[29,65,324,377,410,504,946],"survivable":[31],"systems/networks.":[33],"These":[34],"issues":[35],"have":[36,155,391,477,602,638,1020,1181],"evolved":[37],"into":[38,465,740,1160],"an":[39,270,415,452,807,985,1111,1147],"active":[40],"important":[42,276,1112],"area":[43,277],"research":[45,77,98],"development.":[47],"past":[49],"decade":[50],"has":[51,69,240,358,430,565,698,787,861,908,1050,1204,1216],"witnessed":[52],"a":[53,71,197,242,286,383,436,511,529,580,625,678,718,747,844,885,1002,1052,1062,1121,1193,1218],"proliferation":[54],"concurrency":[56],"computation":[58],"practice":[61],"highly":[63],"trust,":[64],"privacy,":[67,293],"which":[68,160,246,390,544,564,585],"become":[70],"key":[72,448,462],"subject":[73],"in":[74,81,101,121,146,166,191,204,273,342,350,387,398,414,435,480,483,525,556,573,596,620,705,778,900,1114,1129,1207,1257,1281],"determining":[75],"future":[76,144],"development":[79,100,140],"activities":[80],"many":[82],"academic":[83],"industrial":[85],"branches.":[86],"aims":[90,982],"to":[91,135,200,291,299,321,394,507,514,588,645,735,794,816,837,911,943,958,965,975,983,990,1016,1072,1084,1126,1170,1175,1197,1243,1247,1265,1271],"present":[92,1244],"discuss":[94],"advances":[95],"current":[97],"all":[102,1248],"aspects":[103],"computing":[106,487,575],"In":[110,149,236,842],"addition,":[111,237,843],"this":[112,132,147,150,167,238,380,649,1282],"provides":[115,624,651],"snapshots":[116],"contemporary":[118],"academia":[119],"work":[120,165,239,381,578,650,716,826,1256],"the":[122,173,222,228,248,274,302,323,328,372,388,404,408,432,443,458,466,471,489,501,533,540,557,561,604,609,629,636,640,662,702,737,755,762,767,818,828,834,880,913,921,937,949,962,966,992,1008,1033,1043,1079,1095,1132,1136,1165,1177,1183,1191,1230,1235,1249,1259,1272],"field":[123,950],"computing.":[127,1118],"We":[128,1261],"prepared":[129],"organized":[131],"record":[136],"state-of-the-art":[137],"research,":[138],"novel":[139,162,478,626],"trends":[142],"insight":[145,438],"domain.":[148],"issue,":[152],"14":[153],"papers":[154,476],"been":[156,392,862,909,1021,1205],"accepted":[157],"publication,":[159],"demonstrate":[161,322,919,1028],"original":[164],"field.":[168],"A":[169,333,551,694,729,781,972],"detailed":[170,530],"overview":[171],"selected":[174],"works":[175],"is":[176,289,586,733,751,849,1110,1168],"given":[177],"below.":[178],"first":[180,217],"paper":[181,284,357,441,704,805,970,1038,1133,1215],"entitled":[182,771,971,1039,1134],"Dynamic":[183],"Malicious":[184,267],"Node":[185],"Detection":[186],"with":[187,221,301,701,851,879,894,1222],"Semi-supervised":[188],"Multivariate":[189],"Classification":[190],"Cognitive":[192],"Wireless":[193,621],"Sensor":[194,622],"Networks":[195],"designed":[196],"multivariate":[198,225],"classifier":[199],"detect":[201],"malicious":[202,214,312],"nodes":[203],"wireless":[205],"sensor":[206,232],"1.":[208],"Communication":[209],"features":[210],"normal":[212],"node":[215],"are":[216,319,940],"extracted":[218],"modeled,":[220],"help":[223],"classification":[226],"algorithm,":[227],"type":[229],"unknown":[231,914],"can":[233,676,927,1089],"be":[234,508,646,795,928,1082,1090],"inferred.":[235],"presented":[241,320,579,1146,1217],"promising":[243],"detecting":[244],"result,":[245,1003],"limited":[247,800],"false":[249],"detection":[250],"rate":[251],"under":[252,667],"1":[253],"percentile.":[254],"second":[256],"paper,":[257,332,420,520,550,614,687,868],"Efficient":[258,422],"Privacy":[259,619,690],"Preserving":[260],"Matchmaking":[261],"Mobile":[263,340],"Social":[264],"Networking":[265],"against":[266],"Users,":[268],"addressed":[269],"interesting":[271],"topic":[272],"increasingly":[275],"mobile":[279],"social":[280],"networking":[281],"2.":[282],"presents":[285],"protocol":[287,450,464],"that":[288,403,661,673,920,1078],"shown":[290],"preserve":[292],"by":[294,469,864,930,947,1093],"not":[295,1190],"revealing":[296],"attribute":[297],"data":[298],"participants,":[300],"intent":[303],"being":[305],"efficient":[306],"tolerant":[308],"semi-honest":[310],"attacks.":[313],"Theoretical":[314],"analysis":[315,808,1071],"simulation":[317,759,917,1063,1076],"results":[318,601,671,760,918,1180,1228],"efficiency":[326,605,765,1030],"protocol.":[329],"third":[331],"Formal":[334],"Analysis":[335,772],"Authentication":[337],"Protocols":[338],"Devices":[341],"Next":[343],"Generation":[344],"Networks,":[345,623],"investigated":[346,431,560,788,850],"authentication":[347,361,397,433,481],"protocols":[348,374,386,406,434,482],"next":[351],"generation":[352],"(NGNs)":[354],"3.":[355],"introduced":[359,1206],"two":[360],"protocols,":[362],"verifies":[363],"those":[364,791],"using":[365,1067],"formal":[366],"methods":[367],"approach":[368,1059,1125,1196],"discusses":[370],"how":[371],"developed":[373,405,734,768,806,824,859,910,1166],"achieved":[375],"desired":[376,409],"proprieties.":[378],"Moreover,":[379],"considered":[382],"number":[384,1096],"literature,":[389],"proposed":[393,610,1236],"address":[395,912],"device":[396],"NGNs.":[399],"comparison":[401],"shows":[402,660],"meet":[407],"properties":[411],"without":[412],"resulting":[413],"additional":[416],"overhead.":[417],"fourth":[419],"An":[421,521,904],"Protocol":[423],"Two-Party":[425],"Explicit":[426],"Authenticated":[427],"Key":[428],"Agreement,\u0130":[429],"different":[437,656,1085],"4.":[439],"examined":[442],"authenticated":[446,461],"two-party":[447],"agreement":[449,463],"over":[451],"insecure":[453],"public":[454],"extends":[457],"existing":[459],"implicit":[460],"explicit":[467],"one":[468],"introducing":[470],"authenticators.":[472],"Both":[473],"these":[475,1158],"developments":[479],"Cloud":[486,526,558],"offers":[488],"potential":[490,512,1098],"significant":[492],"cost":[493],"reductions":[494],"increased":[496],"agility":[497],"users.":[499],"On":[500],"other":[502],"hand,":[503],"concerns":[505],"continue":[506],"raised":[509],"as":[510,833],"barrier":[513],"uptake":[515],"clouds.":[517],"fifth":[519],"Overview":[522],"Insider-Attacks":[524],"Computing,\u0130":[527],"involved":[528],"modeling":[531],"threat":[534],"vulnerability":[536],"land":[537],"scape,":[538],"including":[539],"incentives":[541],"motivations":[543],"drive":[545],"attackers":[546],"5.":[547],"sixth":[549],"Lightweight":[552],"Software":[553],"Fault-Tolerance":[554],"System":[555],"Environment,":[559],"software":[562,582,594],"failures":[563],"significantly":[566],"impact":[567],"high":[569,679],"availability":[570],"services":[572],"cloud":[574,597],"6.":[576],"lightweight":[581],"fault-tolerance":[583],"system,":[584],"able":[587],"recover":[589],"programs":[590],"from":[591],"types":[592,1087],"bugs":[595],"environment.":[598],"experimental":[600,1227],"validated":[603,761,863,1182],"feasibility":[607],"system.":[611],"seventh":[613,703],"Fake":[615],"Source-Based":[616],"Source":[617],"Location":[618,689],"formalization":[627],"fake":[630,641,674],"source":[631],"selection":[632,643],"problem":[633,644,883],"7.":[634],"Further,":[635,1164],"authors":[637],"proven":[639],"sources":[642,675],"NP-complete.":[647],"Then,":[648],"parametric":[652],"heuristics":[653,663],"three":[655],"configurations":[658],"provide":[664,677,1120],"optimal":[665],"levels":[666],"appropriate":[668],"parameterization.":[669],"suggest":[672],"level":[680],"source-based":[682],"location":[683,709,724,744],"privacy.":[684,728,757],"eighth":[686],"Protecting":[688],"Query":[692],"Privacy:":[693],"Combined":[695],"Clustering":[696],"Approach,\u0130":[697],"similar":[699],"motivation":[700],"terms":[706],"securing":[708],"privacy":[710,713,725],"query":[712,727,756],"8.":[714],"employed":[717],"combined":[719],"clustering":[720,731,749],"algorithm":[721,1011,1221],"protecting":[723],"K-means":[730],"method":[732,750,907,989],"group":[736],"user":[738],"requests":[739],"clusters":[741],"providing":[743],"safety.":[745],"Meanwhile,":[746],"hierarchical":[748],"used":[752],"preserving":[754],"correctness":[763,1184],"algorithms.":[769],"Paper":[770],"Evaluation":[774],"Incentive":[776],"Mechanisms":[777],"P2P":[779],"Networks:":[780],"Spatial":[782],"Evolutionary":[783],"Game":[784],"Theory":[785],"Perspective\u0130":[786],"selfish":[789],"peers,":[790],"who":[792],"refuse":[793],"cooperative":[796],"when":[797],"considering":[798],"their":[799,839,1186,1245,1252],"transmission":[801],"resources":[802],"9.":[803],"framework":[809,860,1149,1167],"based":[810,846],"spatial":[812],"evolutionary":[813],"game":[814,836],"theory":[815],"verify":[817],"effectiveness":[819,1233],"incentive":[821,847],"mechanisms.":[822],"frame":[825],"modeled":[827],"transactions":[829],"relationships":[830],"peers":[832],"donor\u2013recipient":[835],"satisfy":[838],"asymmetric":[840],"characters.":[841],"reciprocation":[845],"mechanism":[848],"homogeneous":[852],"heterogeneous":[854],"benefits":[855],"services.":[857],"simulations.":[865],"tenth":[867],"Robust":[869],"Stabilization":[870],"Design":[871],"Large-Scale":[873],"Parameterized":[874],"Nonlinear":[875],"Switched":[876],"Systems,":[877],"concerned":[878],"robust":[881],"stabilization":[882],"large":[886],"class":[887],"parameterized":[889],"switched":[890],"nonlinear":[891],"interconnected":[893],"unmolded":[895],"dynamics":[896],"uncertain":[898],"disturbance":[899],"cascade":[901],"form":[902],"10.":[903],"adaptive":[905],"approximation":[906],"nonlinearities.":[915],"asymptotic":[922],"stability":[923],"system":[925],"performance":[926],"adjusted":[929],"choosing":[931],"suitable":[932],"design":[933,988,1005,1018],"parameters.":[934],"To":[935,1119],"protect":[936],"networks,":[938],"firewalls":[939],"crucial":[941],"elements":[942],"enhance":[944,1171],"examining":[948],"value":[951],"every":[953],"packet":[954,963],"decide":[956],"whether":[957],"accept":[959],"or":[960],"discard":[961],"according":[964],"firewall":[967,987,998,1004,1014,1017,1034],"policy.":[968],"New":[973],"Approach":[974],"Designing":[976],"Firewall":[977],"Based":[978,1210],"Multidimensional":[980],"Matrix\u0130":[981],"develop":[984],"effective":[986],"ensure":[991],"consistency,":[993],"compactness":[994],"completeness":[996],"rules":[999,1015,1035],"11.":[1000],"As":[1001],"matrix":[1006,1019],"corresponding":[1009],"construction":[1010],"mapping":[1013],"given.":[1022],"theoretical":[1024],"proof":[1025],"experiments":[1027],"its":[1029],"while":[1031],"maintaining":[1032],"conflict-free.":[1036],"Simulating":[1040],"Modelling":[1042],"Effectiveness":[1044],"Graphical":[1046],"Password":[1047],"Intersection":[1048],"Attacks":[1049],"established":[1051],"model":[1053,1080],"intersection":[1055,1065],"attacks":[1056,1066],"12.":[1057],"involves":[1060],"creating":[1061],"countermeasures":[1068],"performing":[1070],"determine":[1073],"efficacy.":[1074],"suggested":[1077],"could":[1081],"applied":[1083,1169],"attack":[1086],"further":[1091],"improved":[1092],"incorporating":[1094],"pass":[1099],"images.":[1100],"survivability":[1102],"representational":[1104],"state":[1105],"transfer":[1106],"(REST)":[1107],"web":[1108],"applications":[1109,1174],"reliable":[1117],"systematic":[1122],"principled":[1124],"handling":[1127],"faults":[1128],"RESTful":[1130,1139,1173],"applications,":[1131],"Improving":[1135],"Survivability":[1137],"Web":[1140],"Applications":[1141],"via":[1142],"Declarative":[1143],"Fault":[1144],"Tolerance\u0130":[1145],"architectural":[1148],"specifying":[1151],"fault":[1152],"tolerance":[1153],"functionality":[1154],"declaratively":[1155],"translating":[1157],"specifications":[1159],"platform-specific":[1161],"code":[1162],"13.":[1163],"realistic":[1172],"withstand":[1176],"faults.":[1178],"work.":[1187],"Last":[1188],"but":[1189],"least,":[1192],"role":[1194,1219],"mining":[1195,1220],"automatically":[1198],"find":[1199],"roles":[1200],"among":[1201],"user-permission":[1202],"assignments":[1203],"Role":[1208],"Mining":[1209],"Cardinality":[1212],"Constraints.":[1213],"cardinality":[1223],"constraints":[1224],"14.":[1225],"demonstrated":[1229],"rationality":[1231],"algorithm.":[1237],"guest":[1239],"editors":[1240],"would":[1241,1263],"like":[1242,1264],"appreciations":[1246],"reviewers":[1250],"qualified":[1253],"expedite":[1255],"evaluating":[1258],"manuscripts.":[1260],"also":[1262],"express":[1266],"our":[1267],"gratitude":[1268],"thanks":[1270],"Editor-in-Chief,":[1273],"Prof.":[1274],"Geoffrey":[1275],"Fox,":[1276],"his":[1278],"full":[1279],"support":[1280],"issue.":[1284]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1775717908","counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-02-16T03:37:14.349418","created_date":"2016-06-24"}