{"id":"https://openalex.org/W4387021407","doi":"https://doi.org/10.1007/s10207-023-00747-2","title":"Secure outsourcing of manufacturing compliance checks","display_name":"Secure outsourcing of manufacturing compliance checks","publication_year":2023,"publication_date":"2023-09-25","ids":{"openalex":"https://openalex.org/W4387021407","doi":"https://doi.org/10.1007/s10207-023-00747-2"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-023-00747-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00747-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00747-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00747-2.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049270262","display_name":"Aikaterini Triakosia","orcid":null},"institutions":[{"id":"https://openalex.org/I32762134","display_name":"Harokopio University of Athens","ror":"https://ror.org/02k5gp281","country_code":"GR","type":"education","lineage":["https://openalex.org/I32762134"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Aikaterini Triakosia","raw_affiliation_strings":["Department of Informatics and Telematics, Harokopio University, Athens, 177 78, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Informatics and Telematics, Harokopio University, Athens, 177 78, Greece","institution_ids":["https://openalex.org/I32762134"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058404145","display_name":"Panagiotis Rizomiliotis","orcid":"https://orcid.org/0000-0001-6809-9981"},"institutions":[{"id":"https://openalex.org/I32762134","display_name":"Harokopio University of Athens","ror":"https://ror.org/02k5gp281","country_code":"GR","type":"education","lineage":["https://openalex.org/I32762134"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panagiotis Rizomiliotis","raw_affiliation_strings":["Department of Informatics and Telematics, Harokopio University, Athens, 177 78, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Informatics and Telematics, Harokopio University, Athens, 177 78, Greece","institution_ids":["https://openalex.org/I32762134"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026526196","display_name":"Cecilia Tonelli","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cecilia Tonelli","raw_affiliation_strings":["Applied Research and Technology, Collins Aerospace, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Applied Research and Technology, Collins Aerospace, Rome, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075672951","display_name":"Fabio Federici","orcid":"https://orcid.org/0000-0003-4179-3986"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fabio Federici","raw_affiliation_strings":["Applied Research and Technology, Collins Aerospace, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Applied Research and Technology, Collins Aerospace, Rome, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080397323","display_name":"Valerio Senni","orcid":"https://orcid.org/0000-0002-1131-0384"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Valerio Senni","raw_affiliation_strings":["Applied Research and Technology, Collins Aerospace, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Applied Research and Technology, Collins Aerospace, Rome, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5049270262"],"corresponding_institution_ids":["https://openalex.org/I32762134"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.1748,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56236735,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"23","issue":"1","first_page":"609","last_page":"627"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7917852401733398},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.7514597177505493},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.7120638489723206},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6230698227882385},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6035245656967163},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5684340596199036},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5290870666503906},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4900780916213989},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.34305110573768616},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11408048868179321},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09335219860076904}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7917852401733398},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.7514597177505493},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.7120638489723206},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6230698227882385},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6035245656967163},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5684340596199036},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5290870666503906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4900780916213989},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.34305110573768616},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11408048868179321},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09335219860076904},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-023-00747-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00747-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00747-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-023-00747-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00747-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00747-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320325722","display_name":"Harokopio University","ror":"https://ror.org/02k5gp281"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4387021407.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W913176383","https://openalex.org/W1966173718","https://openalex.org/W2064525681","https://openalex.org/W2098290658","https://openalex.org/W2175031088","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2250570571","https://openalex.org/W2554750353","https://openalex.org/W2765489369","https://openalex.org/W2768174108","https://openalex.org/W2790606405","https://openalex.org/W2913096406","https://openalex.org/W2955401130","https://openalex.org/W2969090117","https://openalex.org/W2990280959","https://openalex.org/W3017398322","https://openalex.org/W3021475380","https://openalex.org/W3022463004","https://openalex.org/W3028516757","https://openalex.org/W3033405216","https://openalex.org/W3079221395","https://openalex.org/W3102723029","https://openalex.org/W3117449869","https://openalex.org/W3155680838","https://openalex.org/W3199104148","https://openalex.org/W4205915954","https://openalex.org/W4285413053","https://openalex.org/W4294691594","https://openalex.org/W4313184921","https://openalex.org/W6606067566"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W4231184955","https://openalex.org/W2325765407","https://openalex.org/W2788012436","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W200604156","https://openalex.org/W2887779253","https://openalex.org/W2103519941","https://openalex.org/W2154953758"],"abstract_inverted_index":{"Abstract":[0],"Compliance":[1],"data":[2,77,103,122,194],"consists":[3],"of":[4,17,29,47,52,113,129,173,200,203,238,250,252,260],"manufacturing":[5],"quality":[6],"measures":[7],"collected":[8,30],"in":[9,73,236],"the":[10,18,27,39,50,53,60,68,98,130,139,176,183,207,246,268],"production":[11],"process.":[12],"Quality":[13],"checks":[14],"are":[15,264],"most":[16],"times":[19],"computationally":[20],"expensive":[21,266],"to":[22,26,38,92,175,187],"perform,":[23],"mainly":[24],"due":[25],"amount":[28],"data.":[31],"Having":[32],"trusted":[33],"solutions":[34,100],"for":[35,44,59,120,134,257,267],"outsourcing":[36],"analyses":[37],"Cloud":[40,54],"is":[41,57,78,116,127,152],"an":[42,157],"opportunity":[43],"reducing":[45],"costs":[46],"operation.":[48],"However,":[49,149],"adoption":[51],"computation":[55,136],"paradigm":[56],"delayed":[58],"many":[61],"security":[62],"risks":[63],"associated":[64],"with":[65,146],"it.":[66],"In":[67,138,167,179],"use":[69,162],"case":[70,163],"we":[71,170,181,212,244],"consider":[72],"this":[74,168],"paper,":[75,169],"compliance":[76,184],"very":[79],"sensitive,":[80],"because":[81],"it":[82,88],"may":[83,89],"contain":[84],"IP-critical":[85],"information,":[86],"or":[87,95,105],"be":[90],"related":[91],"safety-critical":[93],"operations":[94],"products.":[96],"While":[97],"technological":[99,132],"that":[101,197,263],"protect":[102],"in-transit":[104],"at":[106],"rest":[107],"have":[108,224],"reached":[109,144],"a":[110,117,188,253],"satisfying":[111],"level":[112],"maturity,":[114],"there":[115],"huge":[118],"demand":[119],"securing":[121],"in-use.":[123],"Homomorphic":[124],"Encryption":[125],"(HE)":[126],"one":[128],"main":[131],"enablers":[133],"secure":[135,258],"outsourcing.":[137],"last":[140],"decade,":[141],"HE":[142,151,174,209,230,270],"has":[143],"maturity":[145],"remarkable":[147],"pace.":[148],"using":[150,228],"still":[153],"far":[154],"from":[155],"being":[156],"automated":[158],"process":[159],"and":[160,232,241,248],"each":[161],"introduces":[164],"different":[165],"challenges.":[166],"investigate":[171],"application":[172],"described":[177],"scenario.":[178],"particular,":[180],"redesign":[182],"check":[185],"algorithm":[186],"HE-friendly":[189],"equivalent.":[190],"We":[191,223],"propose":[192],"efficient":[193],"input":[195],"encoding":[196],"takes":[198],"advantage":[199],"SIMD":[201],"type":[202],"computations":[204,262],"supported":[205],"by":[206,216],"CKKS":[208],"scheme.":[210,271],"Moreover,":[211],"introduce":[213],"security/performance":[214],"trade-offs":[215],"proposing":[217],"limited":[218],"but":[219],"acceptable":[220],"information":[221],"leakage.":[222],"implemented":[225],"our":[226,234],"solution":[227],"SEAL":[229],"library":[231],"evaluated":[233],"results":[235],"terms":[237],"time":[239],"complexity":[240],"accuracy.":[242],"Finally,":[243],"analyze":[245],"benefits":[247],"limitations":[249],"integration":[251],"Trusted":[254],"Execution":[255],"Environment":[256],"execution":[259],"some":[261],"overly":[265],"chosen":[269]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-01-26T23:06:41.788003","created_date":"2025-10-10T00:00:00"}
