{"id":"https://openalex.org/W1588175687","doi":"https://doi.org/10.1109/aina.2004.1283969","title":"Securing XML document sources and their distribution","display_name":"Securing XML document sources and their distribution","publication_year":2004,"publication_date":"2004-06-10","ids":{"openalex":"https://openalex.org/W1588175687","doi":"https://doi.org/10.1109/aina.2004.1283969","mag":"1588175687"},"language":"en","primary_location":{"id":"doi:10.1109/aina.2004.1283969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2004.1283969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100648251","display_name":"Junqi Zhang","orcid":"https://orcid.org/0000-0002-4465-5880"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Junqi Zhang","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029458848","display_name":"Vijay Varadharajan","orcid":"https://orcid.org/0000-0002-3621-9114"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"V. Varadharajan","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031334961","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0001-5660-440X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100648251"],"corresponding_institution_ids":["https://openalex.org/I99043593"],"apc_list":null,"apc_paid":null,"fwci":3.2872,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.92530474,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"562","last_page":"567"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.849947452545166},{"id":"https://openalex.org/keywords/xml-encryption","display_name":"XML Encryption","score":0.8139026165008545},{"id":"https://openalex.org/keywords/well-formed-document","display_name":"Well-formed document","score":0.750201940536499},{"id":"https://openalex.org/keywords/xml-validation","display_name":"XML validation","score":0.7225279808044434},{"id":"https://openalex.org/keywords/xml-signature","display_name":"XML Signature","score":0.7152554392814636},{"id":"https://openalex.org/keywords/efficient-xml-interchange","display_name":"Efficient XML Interchange","score":0.6622904539108276},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.5761058330535889},{"id":"https://openalex.org/keywords/streaming-xml","display_name":"Streaming XML","score":0.5689454078674316},{"id":"https://openalex.org/keywords/simple-api-for-xml","display_name":"Simple API for XML","score":0.549800455570221},{"id":"https://openalex.org/keywords/document-structure-description","display_name":"Document Structure Description","score":0.5479247570037842},{"id":"https://openalex.org/keywords/xml-schema-editor","display_name":"XML Schema Editor","score":0.5392090082168579},{"id":"https://openalex.org/keywords/cxml","display_name":"cXML","score":0.4777590334415436},{"id":"https://openalex.org/keywords/xml-framework","display_name":"XML framework","score":0.4148474633693695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.405362993478775},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4051857590675354},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.3943521976470947},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3502223491668701}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.849947452545166},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.8139026165008545},{"id":"https://openalex.org/C137441365","wikidata":"https://www.wikidata.org/wiki/Q7981054","display_name":"Well-formed document","level":5,"score":0.750201940536499},{"id":"https://openalex.org/C55348073","wikidata":"https://www.wikidata.org/wiki/Q595926","display_name":"XML validation","level":3,"score":0.7225279808044434},{"id":"https://openalex.org/C34330436","wikidata":"https://www.wikidata.org/wiki/Q979532","display_name":"XML Signature","level":4,"score":0.7152554392814636},{"id":"https://openalex.org/C11508877","wikidata":"https://www.wikidata.org/wiki/Q1124477","display_name":"Efficient XML Interchange","level":3,"score":0.6622904539108276},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.5761058330535889},{"id":"https://openalex.org/C44883583","wikidata":"https://www.wikidata.org/wiki/Q7622687","display_name":"Streaming XML","level":3,"score":0.5689454078674316},{"id":"https://openalex.org/C8595896","wikidata":"https://www.wikidata.org/wiki/Q577094","display_name":"Simple API for XML","level":5,"score":0.549800455570221},{"id":"https://openalex.org/C68699486","wikidata":"https://www.wikidata.org/wiki/Q265904","display_name":"Document Structure Description","level":3,"score":0.5479247570037842},{"id":"https://openalex.org/C34716815","wikidata":"https://www.wikidata.org/wiki/Q8042322","display_name":"XML Schema Editor","level":3,"score":0.5392090082168579},{"id":"https://openalex.org/C101509794","wikidata":"https://www.wikidata.org/wiki/Q5014897","display_name":"cXML","level":5,"score":0.4777590334415436},{"id":"https://openalex.org/C21761406","wikidata":"https://www.wikidata.org/wiki/Q8042330","display_name":"XML framework","level":3,"score":0.4148474633693695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.405362993478775},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4051857590675354},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.3943521976470947},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3502223491668701}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aina.2004.1283969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2004.1283969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1483186839","https://openalex.org/W1601260598","https://openalex.org/W1937082285","https://openalex.org/W1992016522","https://openalex.org/W2039588269","https://openalex.org/W2079799821","https://openalex.org/W2082200489","https://openalex.org/W2107307934","https://openalex.org/W6989499955"],"related_works":["https://openalex.org/W1972245780","https://openalex.org/W2347497444","https://openalex.org/W2112528798","https://openalex.org/W1588175687","https://openalex.org/W1912491515","https://openalex.org/W137582083","https://openalex.org/W1591876566","https://openalex.org/W5728047","https://openalex.org/W1775446240","https://openalex.org/W4241144834"],"abstract_inverted_index":{"XML":[0,21,41,94,135,197],"has":[1,66,82,111,142],"been":[2],"becoming":[3],"popular":[4],"for":[5,17,37,59,92,133,185,194,199],"data":[6],"store,":[7],"document":[8,22,225],"representation":[9],"and":[10,24,51,74,117,137,188,211,219],"exchange":[11],"over":[12,145],"the":[13,18,38,63,85,100,109,119,160,169,196,206,217,220,223],"Web.":[14],"Security":[15],"mechanisms":[16],"protection":[19,39,48],"of":[20,40,47,71,99,222],"sources":[23],"their":[25,138],"distribution":[26,58],"are":[27],"essential.":[28],"Author-X":[29,146],"is":[30,106,166,177,191],"a":[31,45,80,104,131,164,182],"Java":[32],"based":[33],"system":[34,65],"specifically":[35],"conceived":[36],"documents.":[42,95],"It":[43],"supports":[44,56],"range":[46],"granularity":[49],"levels":[50],"subject":[52],"credentials,":[53],"but":[54],"also":[55],"push":[57],"documents":[60,116,136,198],"broadcast.":[61],"However,":[62],"proposed":[64],"certain":[67],"disadvantages":[68],"in":[69],"terms":[70],"both":[72],"security":[73,207],"dynamic":[75],"key":[76,186],"management.":[77],"For":[78],"example,":[79],"sender":[81,110],"to":[83,88,112,122,180],"distribute":[84],"secret":[86,120],"keys":[87,121],"all":[89,114,123,168],"correspondent":[90,124],"users":[91,101,171],"different":[93],"Also,":[96],"if":[97],"one":[98,150,154],"leave":[102],"or":[103,163],"credential":[105,165],"changed,":[107,167],"then":[108],"re-encrypt":[113],"related":[115],"redistribute":[118],"users.":[125],"In":[126],"this":[127],"paper,":[128],"we":[129],"present":[130],"scheme":[132,141],"securing":[134],"distribution.":[139],"Our":[140],"several":[143],"advantages":[144],"such":[147],"as:":[148],"(a)":[149],"user":[151,161],"needs":[152],"only":[153],"private":[155],"key;":[156],"(b)":[157],"even":[158],"when":[159],"leaves":[162],"other":[170],"will":[172],"be":[173],"unaffected;":[174],"(c)":[175],"there":[176,190],"no":[178,192],"need":[179,193],"establish":[181],"secure":[183],"channel":[184],"distribution;":[187],"(d)":[189],"checking":[195],"access":[200],"control":[201],"policies":[202],"applied.":[203],"These":[204],"make":[205],"model":[208],"more":[209],"efficient":[210],"robust":[212],"as":[213,215],"well":[214],"simplifying":[216],"programming":[218],"generation":[221],"encrypted":[224],"base.":[226]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
