{"id":"https://openalex.org/W2067488096","doi":"https://doi.org/10.1109/apsec.2012.90","title":"A Context-Based Integrity Framework","display_name":"A Context-Based Integrity Framework","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2067488096","doi":"https://doi.org/10.1109/apsec.2012.90","mag":"2067488096"},"language":"en","primary_location":{"id":"doi:10.1109/apsec.2012.90","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsec.2012.90","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 19th Asia-Pacific Software Engineering Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061952215","display_name":"Mark Anderson","orcid":"https://orcid.org/0000-0003-4064-6087"},"institutions":[{"id":"https://openalex.org/I1303474014","display_name":"Defence Science and Technology Group","ror":"https://ror.org/05ddrvt52","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1303474014","https://openalex.org/I2801453606","https://openalex.org/I3139952251"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mark Anderson","raw_affiliation_strings":["Defence Science & Technology Organisation"],"affiliations":[{"raw_affiliation_string":"Defence Science & Technology Organisation","institution_ids":["https://openalex.org/I1303474014"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024595046","display_name":"Paul Montague","orcid":"https://orcid.org/0000-0001-9461-7471"},"institutions":[{"id":"https://openalex.org/I1303474014","display_name":"Defence Science and Technology Group","ror":"https://ror.org/05ddrvt52","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1303474014","https://openalex.org/I2801453606","https://openalex.org/I3139952251"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Paul Montague","raw_affiliation_strings":["Defence Science & Technology Organisation"],"affiliations":[{"raw_affiliation_string":"Defence Science & Technology Organisation","institution_ids":["https://openalex.org/I1303474014"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041555131","display_name":"Benjamin Long","orcid":"https://orcid.org/0000-0002-4340-7674"},"institutions":[{"id":"https://openalex.org/I1303474014","display_name":"Defence Science and Technology Group","ror":"https://ror.org/05ddrvt52","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1303474014","https://openalex.org/I2801453606","https://openalex.org/I3139952251"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Benjamin Long","raw_affiliation_strings":["Defence Science & Technology Organisation"],"affiliations":[{"raw_affiliation_string":"Defence Science & Technology Organisation","institution_ids":["https://openalex.org/I1303474014"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061952215"],"corresponding_institution_ids":["https://openalex.org/I1303474014"],"apc_list":null,"apc_paid":null,"fwci":1.4211,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.87342224,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"49","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.8075788021087646},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.700302243232727},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6366286873817444},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.5751718878746033},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5457378029823303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.485212117433548},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.41524872183799744}],"concepts":[{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.8075788021087646},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.700302243232727},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6366286873817444},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.5751718878746033},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5457378029823303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.485212117433548},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.41524872183799744},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsec.2012.90","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsec.2012.90","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 19th Asia-Pacific Software Engineering Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1489115818","https://openalex.org/W1559155956","https://openalex.org/W1597215399","https://openalex.org/W1660562555","https://openalex.org/W1968328775","https://openalex.org/W1991953173","https://openalex.org/W2015394587","https://openalex.org/W2028321083","https://openalex.org/W2072298536","https://openalex.org/W2130577401","https://openalex.org/W2134296086","https://openalex.org/W2147715037","https://openalex.org/W2150216504","https://openalex.org/W2152505375","https://openalex.org/W2162022335","https://openalex.org/W2174103411","https://openalex.org/W3149774747","https://openalex.org/W4285719527","https://openalex.org/W6668459110","https://openalex.org/W6680035254","https://openalex.org/W6683952262"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W4210648132"],"abstract_inverted_index":{"Although":[0],"there":[1],"is":[2],"significant":[3],"research":[4],"and":[5,14,29,70],"development":[6],"into":[7],"information":[8],"security":[9,24],"areas":[10],"such":[11],"as":[12],"confidentiality":[13],"availability,":[15],"scope":[16],"remains":[17],"for":[18,37,65],"attention":[19],"to":[20,49],"the":[21,34,50],"third":[22],"fundamental":[23],"property:":[25],"integrity.":[26],"The":[27],"Biba":[28],"Clark-Wilson":[30],"models":[31],"are":[32],"still":[33],"most":[35],"recognised":[36],"managing":[38],"integrity":[39,60,76],"of":[40,74],"data":[41,75],"in":[42,53],"systems.":[43],"After":[44],"identifying":[45],"several":[46],"desirable":[47],"extensions":[48],"original":[51],"ideas":[52],"these":[54],"models,":[55],"we":[56],"present":[57],"a":[58,66,78],"new":[59],"framework,":[61],"which":[62],"can":[63],"allow":[64],"more":[67],"flexible,":[68],"quantitative,":[69],"context":[71],"sensitive":[72],"management":[73],"on":[77],"system":[79],"wide":[80],"basis.":[81]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
