{"id":"https://openalex.org/W2140502826","doi":"https://doi.org/10.1109/acsac.2000.898862","title":"Implementing security policies using the Safe Areas of Computation approach","display_name":"Implementing security policies using the Safe Areas of Computation approach","publication_year":2002,"publication_date":"2002-11-11","ids":{"openalex":"https://openalex.org/W2140502826","doi":"https://doi.org/10.1109/acsac.2000.898862","mag":"2140502826"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/acsac.2000.898862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110361166","display_name":"Andr\u00e9 L. M. dos Santos","orcid":null},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A.L.M. dos Santos","raw_affiliation_strings":["Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109057758","display_name":"Richard A. Kemmerer","orcid":null},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R.A. Kemmerer","raw_affiliation_strings":["University of California,Santa Barbara,"],"affiliations":[{"raw_affiliation_string":"University of California,Santa Barbara,","institution_ids":["https://openalex.org/I154570441"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.27,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.610191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":71,"max":73},"biblio":{"volume":null,"issue":null,"first_page":"90","last_page":"99"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9967,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73068845},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6172416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.56217206},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5595963},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.542744},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4846397},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.44429776},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.42137325},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/acsac.2000.898862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.42}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W1575741533","https://openalex.org/W2095629885","https://openalex.org/W2103078852","https://openalex.org/W2142405333","https://openalex.org/W2166128845","https://openalex.org/W2997851677","https://openalex.org/W4255445045"],"related_works":["https://openalex.org/W3121798572","https://openalex.org/W2949620858","https://openalex.org/W2770877918","https://openalex.org/W2533125852","https://openalex.org/W2388464034","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W2092530219","https://openalex.org/W2057435755","https://openalex.org/W2018782216"],"abstract_inverted_index":{"The":[0,169],"World":[1,84],"Wide":[2,85],"Web":[3],"is":[4],"playing":[5],"a":[6,63,71],"major":[7],"role":[8],"in":[9,14,31,82,104],"reducing":[10],"business":[11],"costs":[12,44],"and":[13,45,107,136,165],"providing":[15],"convenience":[16],"to":[17,25,40,46,51,93,161],"users.":[18],"Digital":[19],"libraries":[20,164],"capitalize":[21,36],"on":[22,37,127],"this":[23,38],"technology":[24,39],"distribute":[26],"documents":[27],"that":[28,61,89,157],"are":[29,57],"stored":[30],"their":[32,42,52],"servers.":[33],"Online":[34],"banks":[35],"reduce":[41],"operating":[43],"offer":[47],"24":[48],"hour":[49],"services":[50,56,60,174],"clients.":[53],"These":[54],"two":[55],"examples":[58],"of":[59,66,74,100,122,178],"require":[62,70],"high":[64],"degree":[65],"security.":[67],"Therefore,":[68],"they":[69],"higher":[72],"level":[73],"protection":[75],"than":[76],"the":[77,83,113,119,125,134,138,172,180,186],"existing":[78],"technologies":[79],"commonly":[80],"used":[81,92,117,160],"Web.":[86],"An":[87],"approach":[88,188],"can":[90,142,158,189],"be":[91,143,159,190],"protect":[94,162],"Internet":[95],"transactions,":[96],"called":[97],"Safe":[98,120],"Areas":[99,121],"Computation,":[101],"was":[102],"described":[103],"(dos":[105],"Santos":[106],"Kemmerer,":[108],"1999).":[109],"This":[110,151],"paper":[111,152,170],"describes":[112,154],"access":[114,129,139],"control":[115,130,140],"lists":[116,131,141],"by":[118,133,185],"Computation":[123],"approach,":[124,135],"operations":[126],"these":[128],"supported":[132,184],"how":[137,179],"customized":[144],"for":[145],"implementing":[146],"many":[147],"different":[148],"security":[149,182],"policies.":[150],"also":[153],"example":[155,177],"policies":[156,183],"digital":[163],"online":[166],"bank":[167,173],"services.":[168],"uses":[171],"as":[175],"an":[176],"generic":[181],"SAC":[187],"composed.":[191]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2140502826","counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2024-12-12T23:41:41.749343","created_date":"2016-06-24"}