{"id":"https://openalex.org/W2394909218","doi":"https://doi.org/10.1002/cpe.3755","title":"Security and reliability in big data","display_name":"Security and reliability in big data","publication_year":2016,"publication_date":"2016-01-06","ids":{"openalex":"https://openalex.org/W2394909218","doi":"https://doi.org/10.1002/cpe.3755","mag":"2394909218"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.3755","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.3755","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.3755","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113663657","display_name":"Ivan Stojmenovi\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ivan Stojmenovic","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026690142","display_name":"Peter R. M\u00fceller","orcid":"https://orcid.org/0000-0002-1922-5635"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Peter Mueller","raw_affiliation_strings":["IBM Zurich Research Laboratory, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Zurich Research Laboratory, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044019139","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0002-2189-7801"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100666554"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740,"provenance":"doaj"},"apc_paid":null,"fwci":1.435,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.665327,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":73,"max":77},"biblio":{"volume":"28","issue":"3","first_page":"581","last_page":"582"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9892,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.5632796}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.68866616},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6115535},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.573339},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.5632796},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.50053334},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.47006235},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46871462},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4413156},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.43875867},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4110384},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32313913},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30198348},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11714864},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.3755","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.3755","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Security_and_reliability_in_big_data/20891473","pdf_url":"https://figshare.com/articles/journal_contribution/Security_and_reliability_in_big_data/20891473/2/files/37161502.pdf","source":{"id":"https://openalex.org/S4306402621","display_name":"INDIGO (University of Illinois at Chicago)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39422238","host_organization_name":"University of Illinois Chicago","host_organization_lineage":["https://openalex.org/I39422238"],"host_organization_lineage_names":["University of Illinois Chicago"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://hdl.handle.net/10536/DRO/DU:30082232","pdf_url":"https://dro.deakin.edu.au/articles/journal_contribution/Security_and_reliability_in_big_data/20891473/2/files/37161502.pdf","source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":["Deakin University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.3755","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.3755","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":10,"referenced_works":["https://openalex.org/W1632686634","https://openalex.org/W1734673682","https://openalex.org/W1822131664","https://openalex.org/W1822234063","https://openalex.org/W1962758022","https://openalex.org/W2116859603","https://openalex.org/W2126572684","https://openalex.org/W2127400217","https://openalex.org/W2143374244","https://openalex.org/W2153334882"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4280543773","https://openalex.org/W4247566972","https://openalex.org/W3090563135","https://openalex.org/W2960264696","https://openalex.org/W2497432351","https://openalex.org/W2387622493","https://openalex.org/W2366083136","https://openalex.org/W2360028903","https://openalex.org/W178231042"],"abstract_inverted_index":{"The":[0,186,243],"purpose":[1],"of":[2,11,71,89,108,123,149,159,170,188,197,201,225,246,253,260,382,397,461,475,490],"this":[3,189,228,261,398,527,531,542,545,557],"special":[4,165,190,321,532,546],"issue":[5,166,191,229,314,547],"is":[6,83,192,195,256,279,341,393],"to":[7,67,95,142,155,179,207,271,294,334,351,356,386,441,450,453,529,555,561,568],"collate":[8],"a":[9,146,257,269,281,291,320,372,406,413,437,480,487,499],"selection":[10],"representative":[12,196],"research":[13,79,184,570],"articles":[14,232],"that":[15,139,209,233,278,410],"were":[16],"primarily":[17],"presented":[18],"at":[19],"the":[20,45,135,198,223,251,310,313,324,331,336,353,430,443,448,457,473,509,523,569],"12th":[21],"IEEE":[22],"International":[23],"Conference":[24],"on":[25,55,429,571,579],"Trust,":[26],"Security":[27],"and":[28,32,42,50,58,63,76,93,126,131,151,161,175,182,194,203,219,241,248,318,380,389,418,435,459,463,469,498,539,574],"Privacy":[29],"in":[30,44,60,65,86,112,128,222,250,284,298,315,433,472],"Computing":[31],"Communications":[33],"(TrustCom":[34],"2013).":[35],"This":[36,164],"annual":[37],"conference":[38],"brings":[39],"together":[40],"researchers":[41],"practitioners":[43,176],"world":[46],"from":[47,116,323],"both":[48],"academia":[49],"industry":[51],"who":[52],"are":[53,177],"working":[54],"trusted":[56],"computing":[57,300,471,485,492],"communications":[59,572],"computer":[61],"systems":[62],"networks,":[64,121],"order":[66],"promote":[68],"an":[69,342,394],"exchange":[70,375],"ideas,":[72],"discuss":[73],"future":[74],"collaborations,":[75],"develop":[77,371],"new":[78,153,292,407,414,481,488,500],"directions.":[80],"Big":[81],"data":[82,109,150,160,240,255,297,392,421,502],"now":[84,280],"invading":[85],"every":[87,110],"aspect":[88],"our":[90,97],"daily":[91,286],"life":[92],"promise":[94],"revolutionize":[96],"life.":[98,287],"For":[99],"example,":[100],"human":[101],"beings":[102],"create":[103],"about":[104,466],"2.5":[105],"quintillion":[106],"bytes":[107],"day":[111],"2012,":[113],"which":[114],"come":[115],"sensors,":[117],"individual":[118],"archives,":[119],"social":[120],"Internet":[122,127],"Things,":[124],"enterprise,":[125],"all":[129,508],"scales":[130],"formats.":[132],"We":[133,446,506,516,552],"face":[134],"most":[136],"challenging":[137],"issue,":[138],"is,":[140],"how":[141,171],"effectively":[143,387],"manage":[144],"such":[145,478],"large":[147,157],"amount":[148],"identify":[152],"ways":[154],"analyze":[156,388],"amounts":[158],"unlock":[162],"information.":[163],"presents":[167],"many":[168],"examples":[169],"researchers,":[172],"scholars,":[173],"vendors,":[174],"collaborating":[178],"address":[180,234],"security":[181,202,212],"reliability":[183,214],"challenges.":[185],"scope":[187],"broad":[193],"multi-disciplinary":[199],"nature":[200],"reliability.":[204],"In":[205],"addition":[206],"submissions":[208],"deal":[210],"with":[211,237],"challenges,":[213],"issues,":[215],"theoretical":[216],"analysis,":[217],"algorithms,":[218],"practical":[220,235],"experience":[221],"context":[224,252,474],"big":[226,254,383,420,476],"data,":[227,338,477],"also":[230],"includes":[231],"challenges":[236],"handling":[238],"large-scale":[239,391],"applications.":[242],"effective":[244],"protection":[245],"information":[247],"privacy":[249],"central":[258],"topic":[259,396],"issue.":[262,344,399,533],"Gwan-Hwan":[263],"Hwang":[264],"et":[265,306,347,368,402,425],"al.":[266,307,348,369,403,426],"1":[267],"present":[268,405],"scheme":[270,376],"fulfill":[272],"mutual":[273],"nonrepudiation":[274],"for":[275,362,377,416,483,493,512,525,565],"cloud":[276,299],"storage":[277],"popular":[282],"way":[283,293],"people's":[285],"2,":[288],"4":[289,349],"describes":[290],"protect":[295,335],"outsourced":[296],"through":[301],"access":[302],"management.":[303],"Yulei":[304],"Wu":[305],"3":[308,580],"provide":[309],"insights":[311],"into":[312,456],"IPv6":[316,326],"adoption":[317],"show":[319],"view":[322],"Chinese":[325],"Application":[327],"mix.":[328],"To":[329],"apply":[330],"encryption":[332],"technique":[333],"real-world":[337],"key":[339,374],"management":[340],"essential":[343],"Guojun":[345],"Wang":[346],"propose":[350],"use":[352],"multilinear":[354],"forms":[355],"achieve":[357],"decentralized":[358],"Group":[359],"Key":[360],"Management":[361],"Hierarchical":[363],"Access":[364],"Control.":[365],"Chang":[366],"Liu":[367],"5":[370],"hierarchical":[373],"secure":[378],"scheduling":[379],"auditing":[381],"data.":[384],"How":[385],"utilize":[390],"interesting":[395],"Jinson":[400],"Zhang":[401],"6":[404],"density":[408],"approach":[409],"can":[411],"produce":[412],"model":[415,440],"analyzing":[417],"visualizing":[419],"analysis.":[422],"Guiyi":[423],"Wei":[424],"7":[427],"target":[428],"service":[431,444],"cooperation":[432],"VANETs":[434],"introduce":[436],"game-based":[438],"incentive":[439],"improve":[442],"cooperation.":[445],"encourage":[447],"readers":[449],"review":[451],"8-10":[452],"gain":[454],"insight":[455],"breadth":[458],"depth":[460],"problems":[462],"innovative":[464],"solutions":[465],"high":[467],"performance":[468],"reliable":[470],"as":[479],"platform":[482],"ubiquitous":[484],"8,":[486],"application":[489],"soft":[491],"financial":[494],"option":[495],"pricing":[496],"9,":[497],"graph":[501],"processing":[503],"system":[504],"10.":[505],"thank":[507,518],"international":[510],"reviewers":[511],"their":[513],"professional":[514],"services.":[515],"deeply":[517],"Professor":[519,562],"Geoffrey":[520],"C.":[521],"Fox,":[522],"Editor-in-Chief,":[524],"providing":[526],"opportunity":[528,558],"publish":[530],"With":[534],"his":[535,566],"continuous":[536],"support,":[537],"encouragement,":[538],"guidance":[540],"throughout":[541],"publishing":[543],"project,":[544],"has":[548],"been":[549],"very":[550],"successful.":[551],"would":[553],"like":[554],"take":[556],"pay":[559],"tribute":[560],"Ivan":[563],"Stojmenovic":[564],"contributions":[567],"networks":[573],"algorithms.":[575],"He":[576],"passed":[577],"away":[578],"November":[581],"2014.":[582]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2394909218","counts_by_year":[{"year":2017,"cited_by_count":2}],"updated_date":"2024-12-08T14:45:37.342565","created_date":"2016-06-24"}