{"id":"https://openalex.org/W4285238449","doi":"https://doi.org/10.1007/978-981-19-0523-0_21","title":"Research on Security Assessment of Cross Border Data Flow","display_name":"Research on Security Assessment of Cross Border Data Flow","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285238449","doi":"https://doi.org/10.1007/978-981-19-0523-0_21"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-19-0523-0_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-19-0523-0_21","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100461415","display_name":"Na Wang","orcid":"https://orcid.org/0000-0002-7338-8515"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wang Na","raw_affiliation_strings":["Guangzhou Research Institute of Technology, Xidian University, Xi\u2019an, China","National Computer Network Intrusion Prevention Center, University of Chinese Academy of Sciences, Beijing, China","Guangzhou Research Institute of Technology, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Guangzhou Research Institute of Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"National Computer Network Intrusion Prevention Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Guangzhou Research Institute of Technology, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005525514","display_name":"Gaofei Wu","orcid":"https://orcid.org/0000-0002-7843-6520"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu Gaofei","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China","School of Cyber Engineering, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070240831","display_name":"Yue Qiuling","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Qiuling","raw_affiliation_strings":["School of Cyberspace Security, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100326923","display_name":"Jinglu Hu","orcid":"https://orcid.org/0000-0002-5601-7261"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hu Jinglu","raw_affiliation_strings":["Graduate School of Information, Production and Systems, Waseda University, Honjo, China"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information, Production and Systems, Waseda University, Honjo, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401884","display_name":"Yuqing Zhang","orcid":"https://orcid.org/0000-0001-8306-7195"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhang","raw_affiliation_strings":["Guangzhou Research Institute of Technology, Xidian University, Xi\u2019an, China","National Computer Network Intrusion Prevention Center, University of Chinese Academy of Sciences, Beijing, China","National Computer Network Intrusion Protection Center (NCNIPC), Beijing, China","School of Cyberspace Security, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"Guangzhou Research Institute of Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"National Computer Network Intrusion Prevention Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Computer Network Intrusion Protection Center (NCNIPC), Beijing, China","institution_ids":["https://openalex.org/I4210108629"]},{"raw_affiliation_string":"School of Cyberspace Security, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100461415"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210108629","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.6502,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68409344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"327","last_page":"341"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9621999859809875,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9621999859809875,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.6297028064727783},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.609981894493103},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5357991456985474},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5335842370986938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.49256306886672974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30925124883651733},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2572246193885803}],"concepts":[{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.6297028064727783},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.609981894493103},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5357991456985474},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5335842370986938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49256306886672974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30925124883651733},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2572246193885803},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-19-0523-0_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-19-0523-0_21","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1535032090","https://openalex.org/W2067541751","https://openalex.org/W2100497661","https://openalex.org/W3011390569","https://openalex.org/W3034343647","https://openalex.org/W3043977733"],"related_works":["https://openalex.org/W2162350346","https://openalex.org/W2417158417","https://openalex.org/W3138050359","https://openalex.org/W2085558045","https://openalex.org/W4210784828","https://openalex.org/W2946634840","https://openalex.org/W2967550622","https://openalex.org/W51752556","https://openalex.org/W3193040745","https://openalex.org/W2000498638"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
