{"id":"https://openalex.org/W787131627","doi":"https://doi.org/10.1007/978-3-319-20810-7_16","title":"Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System","display_name":"Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W787131627","doi":"https://doi.org/10.1007/978-3-319-20810-7_16","mag":"787131627"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-20810-7_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20810-7_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/hal-01745825v1/document","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054613089","display_name":"Annanda Thavymony Rath","orcid":"https://orcid.org/0000-0003-4705-544X"},"institutions":[{"id":"https://openalex.org/I149768937","display_name":"University of Namur","ror":"https://ror.org/03d1maw17","country_code":"BE","type":"education","lineage":["https://openalex.org/I149768937"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Annanda Thavymony Rath","raw_affiliation_strings":["Faculty of Computer Science, University of Namur, Namur, Belgium"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of Namur, Namur, Belgium","institution_ids":["https://openalex.org/I149768937"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051188027","display_name":"Jean-No\u00ebl Colin","orcid":"https://orcid.org/0000-0003-4754-7671"},"institutions":[{"id":"https://openalex.org/I149768937","display_name":"University of Namur","ror":"https://ror.org/03d1maw17","country_code":"BE","type":"education","lineage":["https://openalex.org/I149768937"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jean-No\u00ebl Colin","raw_affiliation_strings":["Faculty of Computer Science, University of Namur, Namur, Belgium"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of Namur, Namur, Belgium","institution_ids":["https://openalex.org/I149768937"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054613089"],"corresponding_institution_ids":["https://openalex.org/I149768937"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.517,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.87185595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"233","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6945736408233643},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6253527402877808},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.5459205508232117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5438171029090881},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.5345152616500854},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5240973234176636},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.47340425848960876},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.45740675926208496},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.34999018907546997},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1959696114063263}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6945736408233643},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6253527402877808},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.5459205508232117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5438171029090881},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.5345152616500854},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5240973234176636},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.47340425848960876},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.45740675926208496},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.34999018907546997},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1959696114063263},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-20810-7_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20810-7_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01745825v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01745825","pdf_url":"https://inria.hal.science/hal-01745825v1/document","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.233-241, &#x27E8;10.1007/978-3-319-20810-7_16&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:pure.unamur.be:openaire_cris_publications/4ee86433-4bfd-4a38-8f90-dbd45f874669","is_oa":false,"landing_page_url":"https://researchportal.unamur.be/en/publications/4ee86433-4bfd-4a38-8f90-dbd45f874669","pdf_url":null,"source":{"id":"https://openalex.org/S4406922457","display_name":"Repository of the University of Namur","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Rath, T M A & Colin, J N 2015, Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System. in P Samarati (ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 9149, 16, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9149, Springer Verlag, pp. 233-241, 29th IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2015, Fairfax, United States, 13/07/15. https://doi.org/10.1007/978-3-319-20810-7_16","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01745825v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01745825","pdf_url":"https://inria.hal.science/hal-01745825v1/document","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.233-241, &#x27E8;10.1007/978-3-319-20810-7_16&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W787131627.pdf","grobid_xml":"https://content.openalex.org/works/W787131627.grobid-xml"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W1980437932","https://openalex.org/W2034590833","https://openalex.org/W2082354523","https://openalex.org/W2146140675","https://openalex.org/W2154765153","https://openalex.org/W2617830947"],"related_works":["https://openalex.org/W3120813729","https://openalex.org/W3196150687","https://openalex.org/W1495119096","https://openalex.org/W2284242097","https://openalex.org/W2121067221","https://openalex.org/W2546066963","https://openalex.org/W2277948094","https://openalex.org/W2086058948","https://openalex.org/W2030860479","https://openalex.org/W2357522001"],"abstract_inverted_index":null,"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
