{"id":"https://openalex.org/W1995448827","doi":"https://doi.org/10.1109/icmcs.2012.6320165","title":"MultiLevel-OrBAC: Multi-Level Integrity management in organization based access control framework","display_name":"MultiLevel-OrBAC: Multi-Level Integrity management in organization based access control framework","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W1995448827","doi":"https://doi.org/10.1109/icmcs.2012.6320165","mag":"1995448827"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/icmcs.2012.6320165","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6320165","source":{"id":"https://openalex.org/S4306419704","display_name":"International Conference on Multimedia Computing and Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6320165","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091223983","display_name":"Amine Ba\u00efna","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153527","display_name":"Institut National des Postes et T\u00e9l\u00e9communications","ror":"https://ror.org/052bnvt46","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210153527","https://openalex.org/I4210167103"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Amine Baina","raw_affiliation_strings":["INPT, Rabat, Maroc"],"affiliations":[{"raw_affiliation_string":"INPT, Rabat, Maroc","institution_ids":["https://openalex.org/I4210153527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000857027","display_name":"Youssef Laarouchi","orcid":null},"institutions":[{"id":"https://openalex.org/I1301102746","display_name":"Renault (France)","ror":"https://ror.org/04v98kq37","country_code":"FR","type":"company","lineage":["https://openalex.org/I1301102746"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Youssef Laarouchi","raw_affiliation_strings":["Renault, Paris, France"],"affiliations":[{"raw_affiliation_string":"Renault, Paris, France","institution_ids":["https://openalex.org/I1301102746"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.573804,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":78},"biblio":{"volume":null,"issue":null,"first_page":"933","last_page":"938"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9957,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.69613326},{"id":"https://openalex.org/keywords/integrity-management","display_name":"Integrity management","score":0.48449323},{"id":"https://openalex.org/keywords/structural-integrity","display_name":"Structural integrity","score":0.41838777}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.70300174},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.69613326},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6705712},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49377188},{"id":"https://openalex.org/C2777675914","wikidata":"https://www.wikidata.org/wiki/Q6043351","display_name":"Integrity management","level":3,"score":0.48449323},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.46097413},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.44291016},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.42145464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42004773},{"id":"https://openalex.org/C2984185122","wikidata":"https://www.wikidata.org/wiki/Q1309431","display_name":"Structural integrity","level":2,"score":0.41838777},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32625636},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15676007},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/icmcs.2012.6320165","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6320165","source":{"id":"https://openalex.org/S4306419704","display_name":"International Conference on Multimedia Computing and Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/icmcs.2012.6320165","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6320165","source":{"id":"https://openalex.org/S4306419704","display_name":"International Conference on Multimedia Computing and Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.56,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W1668287011","https://openalex.org/W1898358686","https://openalex.org/W1991895580","https://openalex.org/W2134296086","https://openalex.org/W2160207938","https://openalex.org/W2166602595","https://openalex.org/W2249384348"],"related_works":["https://openalex.org/W2944047995","https://openalex.org/W2735691628","https://openalex.org/W2470866419","https://openalex.org/W2386130827","https://openalex.org/W2313857634","https://openalex.org/W2093175586","https://openalex.org/W2085924563","https://openalex.org/W2045060444","https://openalex.org/W1982787159","https://openalex.org/W1974566058"],"abstract_inverted_index":{"This":[0],"work":[1],"proposes":[2],"a":[3,41],"new":[4],"integrity":[5,25,33,49],"access":[6],"control":[7],"model:":[8],"\"MultiLevel-OrBAC\".":[9],"On":[10,35],"the":[11,31,36],"one":[12],"hand,":[13,38],"we":[14,39],"extend":[15],"OrBAC":[16],"(Organization-Based":[17],"Access":[18],"Control":[19],"Model)":[20],"to":[21],"take":[22],"into":[23],"account":[24],"rules":[26,52],"and":[27,50],"levels":[28],"based":[29],"on":[30],"Totel":[32],"model.":[34],"other":[37],"present":[40],"representative":[42],"scenario":[43],"of":[44],"secure":[45],"applications":[46],"in":[47],"which":[48],"security":[51,57],"are":[53],"interacting":[54],"inside":[55],"MultiLevel-OrBAC":[56],"policy.":[58]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1995448827","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2024-12-13T02:03:53.384478","created_date":"2016-06-24"}