{"id":"https://openalex.org/W2153646237","doi":"https://doi.org/10.1109/trustcom.2013.199","title":"Use of Role Based Access Control for Security-Purpose Hypervisors","display_name":"Use of Role Based Access Control for Security-Purpose Hypervisors","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2153646237","doi":"https://doi.org/10.1109/trustcom.2013.199","mag":"2153646237"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.199","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://kar.kent.ac.uk/43213/1/issr2013-final-published.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037753337","display_name":"Manabu Hirano","orcid":"https://orcid.org/0000-0001-9780-6454"},"institutions":[{"id":"https://openalex.org/I131361393","display_name":"National Institute of Technology, Toyota College","ror":"https://ror.org/01nw25822","country_code":"JP","type":"education","lineage":["https://openalex.org/I131361393"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Manabu Hirano","raw_affiliation_strings":["Department of Information and Computer Engineering, Toyota National College of Technology, Toyota, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Computer Engineering, Toyota National College of Technology, Toyota, Japan","institution_ids":["https://openalex.org/I131361393"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048642442","display_name":"David Chadwick","orcid":"https://orcid.org/0000-0003-3145-055X"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David W Chadwick","raw_affiliation_strings":["School of Computing, University of Kent, Canterbury, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Kent, Canterbury, United Kingdom","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037420906","display_name":"Suguru Yamaguchi","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Suguru Yamaguchi","raw_affiliation_strings":["Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma, Japan","institution_ids":["https://openalex.org/I75917431"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":1,"citation_normalized_percentile":{"value":0.48323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":65,"max":72},"biblio":{"volume":null,"issue":null,"first_page":"1613","last_page":"1619"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Trust and Reputation Systems in Online Environments","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Trust and Reputation Systems in Online Environments","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.6971911},{"id":"https://openalex.org/keywords/role-based-authorization","display_name":"Role-Based Authorization","score":0.583469},{"id":"https://openalex.org/keywords/access-control","display_name":"Access Control","score":0.552889},{"id":"https://openalex.org/keywords/hardware-security","display_name":"Hardware Security","score":0.504873},{"id":"https://openalex.org/keywords/mandatory-access-control","display_name":"Mandatory access control","score":0.4478567}],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.96713257},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837353},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.6971911},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.59904885},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5925851},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.55568457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48498034},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48066628},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.4478567},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4157439},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.39197674},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.25559652}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.199","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://kar.kent.ac.uk/43213/1/issr2013-final-published.pdf","pdf_url":"https://kar.kent.ac.uk/43213/1/issr2013-final-published.pdf","source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":["University of Kent"],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://kar.kent.ac.uk/43213/1/issr2013-final-published.pdf","pdf_url":"https://kar.kent.ac.uk/43213/1/issr2013-final-published.pdf","source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":["University of Kent"],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.77,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1584317806","https://openalex.org/W19255610","https://openalex.org/W1985656666","https://openalex.org/W2040234252","https://openalex.org/W2084564831","https://openalex.org/W2106738174","https://openalex.org/W2106869436","https://openalex.org/W2110205037","https://openalex.org/W2124303957","https://openalex.org/W2126848481","https://openalex.org/W2132714796","https://openalex.org/W2133592286","https://openalex.org/W2138071562","https://openalex.org/W2145857528","https://openalex.org/W2154765153"],"related_works":["https://openalex.org/W2555738791","https://openalex.org/W2379813727","https://openalex.org/W2378367493","https://openalex.org/W2357728851","https://openalex.org/W2355345331","https://openalex.org/W2159723021","https://openalex.org/W2102864986","https://openalex.org/W1990260561","https://openalex.org/W177923951","https://openalex.org/W1593822213"],"abstract_inverted_index":{"This":[0],"paper":[1],"shows":[2],"the":[3,44,64,105],"design":[4],"and":[5,78,99],"implementation":[6,71],"of":[7,46,72],"a":[8,17,23,53,69],"Role":[9],"Based":[10],"Access":[11],"Control":[12],"(RBAC)":[13],"mechanism":[14],"for":[15,33,57,104],"securing":[16],"hypervisor":[18,25],"called":[19,67],"BitVisor.":[20],"BitVisor":[21,39],"is":[22],"small":[24],"that":[26],"provides":[27],"security":[28,41],"functions":[29,42],"like":[30],"encryption":[31],"services":[32],"I/O":[34],"devices":[35],"in":[36,82],"its":[37],"hypervisor-layer.":[38],"enforces":[40],"without":[43],"help":[45],"guest":[47],"OSs,":[48],"but":[49],"it":[50],"only":[51],"supports":[52],"static":[54],"configuration":[55,87],"file":[56],"machine":[58],"set":[59],"up.":[60],"Consequently,":[61],"we":[62,92],"employ":[63],"RBAC":[65,74],"system":[66],"PERMIS,":[68,91],"proven":[70],"an":[73],"policy":[75],"decision":[76],"engine":[77],"credential":[79],"validation":[80],"service,":[81],"order":[83],"to":[84],"provide":[85],"dynamic":[86],"control.":[88],"By":[89],"using":[90],"can":[93,100],"write":[94],"finer":[95],"grained":[96],"authorization":[97],"policies":[98],"dynamically":[101],"update":[102],"them":[103],"security-purpose":[106],"hypervisor.":[107]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2153646237","counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2024-11-22T10:51:47.057354","created_date":"2016-06-24"}