{"id":"https://openalex.org/W3012188741","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035245","title":"Towards Optimistic Access Control for Cloud-Based Collaborative Editors","display_name":"Towards Optimistic Access Control for Cloud-Based Collaborative Editors","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3012188741","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035245","mag":"3012188741"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa47632.2019.9035245","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035245","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021478470","display_name":"Olfa Abusalem","orcid":null},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Olfa Abusalem","raw_affiliation_strings":["IT dept., Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"IT dept., Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055104719","display_name":"Asma Cherif","orcid":"https://orcid.org/0000-0003-3875-074X"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Asma Cherif","raw_affiliation_strings":["IT dept., Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"IT dept., Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082464674","display_name":"Abdessamad Imine","orcid":"https://orcid.org/0000-0002-4496-0340"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abdessamad Imine","raw_affiliation_strings":["Lorraine University and LORIA-CNRS-INRIA Nancy Grand Est, Nancy, France"],"affiliations":[{"raw_affiliation_string":"Lorraine University and LORIA-CNRS-INRIA Nancy Grand Est, Nancy, France","institution_ids":["https://openalex.org/I4210127166","https://openalex.org/I1326498283","https://openalex.org/I4210121838","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021478470"],"corresponding_institution_ids":["https://openalex.org/I185163786"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35198343,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8385390639305115},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8135979175567627},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6254570484161377},{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.5803794264793396},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5258508324623108},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5025455951690674},{"id":"https://openalex.org/keywords/collaborative-editing","display_name":"Collaborative editing","score":0.4884461462497711},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4362282156944275},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.41320058703422546},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.32966798543930054},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2697490453720093},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06983035802841187}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8385390639305115},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8135979175567627},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6254570484161377},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.5803794264793396},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5258508324623108},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5025455951690674},{"id":"https://openalex.org/C2780967703","wikidata":"https://www.wikidata.org/wiki/Q2571389","display_name":"Collaborative editing","level":2,"score":0.4884461462497711},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4362282156944275},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.41320058703422546},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32966798543930054},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2697490453720093},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06983035802841187},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/aiccsa47632.2019.9035245","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035245","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},{"id":"mag:3040874455","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002220279625486","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8999999761581421,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1583844605","https://openalex.org/W1975898094","https://openalex.org/W1987862608","https://openalex.org/W2002748585","https://openalex.org/W2058049109","https://openalex.org/W2059802624","https://openalex.org/W2124470457","https://openalex.org/W2145234820","https://openalex.org/W2154911336","https://openalex.org/W2212976453","https://openalex.org/W2287022667","https://openalex.org/W2315226229","https://openalex.org/W2343608747","https://openalex.org/W2552498385","https://openalex.org/W2592817897","https://openalex.org/W2601382608","https://openalex.org/W2782208146","https://openalex.org/W4254944752","https://openalex.org/W6688238267"],"related_works":["https://openalex.org/W2378994405","https://openalex.org/W2385974820","https://openalex.org/W2373478030","https://openalex.org/W2378679551","https://openalex.org/W3149739944","https://openalex.org/W2392363776","https://openalex.org/W2063051341","https://openalex.org/W2591066345","https://openalex.org/W1494563618","https://openalex.org/W2357022711"],"abstract_inverted_index":{"Collaborative":[0],"editing":[1,104,164],"applications":[2,72,105,165],"for":[3,159],"cloud":[4,34,46,110],"environment":[5],"play":[6],"an":[7],"important":[8],"role":[9],"in":[10,32,54,59,136,166],"many":[11],"fields":[12],"and":[13,21,39,45,51,56,77,87,109,124],"communities":[14],"since":[15],"they":[16],"allow":[17],"users":[18],"to":[19,35,49,61,98,153],"communicate":[20],"collaborate":[22],"using":[23],"their":[24],"mobile":[25,44,108,162],"devices.":[26],"Mobile":[27],"devices":[28],"are":[29,96],"usually":[30],"cloned":[31],"the":[33,67,81,100,125,129,137,167],"minimize":[36],"computation":[37],"cost":[38],"energy":[40],"consumption.":[41],"Moreover,":[42],"these":[43,71],"interactions":[47],"lead":[48],"online":[50],"offline":[52],"switching":[53],"easy":[55],"continuous":[57],"ways":[58],"order":[60],"edit":[62],"shared":[63,82],"multimedia":[64],"documents.":[65],"However,":[66],"main":[68],"concern":[69],"of":[70,80,102,128,131,147],"is":[73],"still":[74],"maintaining":[75],"consistent":[76],"secure":[78],"copies":[79],"documents":[83],"with":[84],"low":[85],"latency":[86],"high":[88],"local":[89],"responsiveness.":[90],"Indeed,":[91],"appropriate":[92],"access":[93,132,157],"control":[94,133],"models":[95,134],"needed":[97],"preserve":[99],"features":[101],"collaborative":[103,122,138,163],"when":[106],"combining":[107],"environments.":[111],"In":[112],"this":[113],"paper,":[114],"we":[115],"present":[116],"a":[117,145,155],"study":[118,142],"on":[119],"existing":[120],"cloud-based":[121],"editors":[123],"current":[126],"state":[127],"art":[130],"used":[135],"edition":[139],"context.":[140],"This":[141],"has":[143],"raised":[144],"series":[146],"shortcomings":[148],"that":[149],"have":[150],"enabled":[151],"us":[152],"sketch":[154],"new":[156],"model":[158],"deploying":[160],"securely":[161],"cloud.":[168]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
