{"id":"https://openalex.org/W2212710009","doi":"https://doi.org/10.1109/bigdata.2015.7363961","title":"Security for the scientific data services framework","display_name":"Security for the scientific data services framework","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2212710009","doi":"https://doi.org/10.1109/bigdata.2015.7363961","mag":"2212710009"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata.2015.7363961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2015.7363961","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101877231","display_name":"Jinoh Kim","orcid":"https://orcid.org/0000-0002-9835-1866"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"Texas A&M University \u2013 Commerce","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jinoh Kim","raw_affiliation_strings":["Department of Computer Science, Texas A&M University, Commerce, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas A&M University, Commerce, TX, USA","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101687868","display_name":"Bin Dong","orcid":"https://orcid.org/0000-0002-0725-0833"},"institutions":[{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bin Dong","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA","institution_ids":["https://openalex.org/I148283060"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062233562","display_name":"Suren Byna","orcid":"https://orcid.org/0000-0003-3048-3448"},"institutions":[{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Surendra Byna","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA","institution_ids":["https://openalex.org/I148283060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043129695","display_name":"Kesheng Wu","orcid":"https://orcid.org/0000-0002-6907-3393"},"institutions":[{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kesheng Wu","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA","institution_ids":["https://openalex.org/I148283060"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101877231"],"corresponding_institution_ids":["https://openalex.org/I206651237"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14181595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":null,"first_page":"1871","last_page":"1875"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7557427883148193},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7306693196296692},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5276057720184326},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.5235599875450134},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.44276827573776245},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4423937201499939},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43479055166244507},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3446846604347229},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09826979041099548}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7557427883148193},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7306693196296692},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5276057720184326},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.5235599875450134},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.44276827573776245},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4423937201499939},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43479055166244507},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3446846604347229},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09826979041099548},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata.2015.7363961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2015.7363961","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W183274994","https://openalex.org/W1496966732","https://openalex.org/W1749482271","https://openalex.org/W1993172344","https://openalex.org/W2002779106","https://openalex.org/W2021593960","https://openalex.org/W2060098952","https://openalex.org/W2070846709","https://openalex.org/W2126848481","https://openalex.org/W2144992332","https://openalex.org/W2157689518","https://openalex.org/W2166602595","https://openalex.org/W2949205821","https://openalex.org/W2952316258","https://openalex.org/W4211218509","https://openalex.org/W6628788583","https://openalex.org/W6629842282","https://openalex.org/W6637740582","https://openalex.org/W6682838308"],"related_works":["https://openalex.org/W2555738791","https://openalex.org/W2123296434","https://openalex.org/W2104547074","https://openalex.org/W4298042445","https://openalex.org/W2586694115","https://openalex.org/W2132693790","https://openalex.org/W2017616439","https://openalex.org/W2367441718","https://openalex.org/W2017675414","https://openalex.org/W1593822213"],"abstract_inverted_index":{"Scientific":[0,70],"data":[1,30,52,85,101],"is":[2,17,80],"often":[3],"shared":[4,29],"among":[5],"researchers":[6],"and":[7,88,94,103],"even":[8],"reorganized":[9],"by":[10],"colleagues":[11],"or":[12],"third-party":[13],"users.":[14],"Thus,":[15],"it":[16],"essential":[18],"to":[19,31],"provide":[20],"an":[21,44,61,105,117],"adequate":[22],"degree":[23],"of":[24,36],"access":[25,47,97],"control":[26,48,98],"for":[27,50,96,99],"such":[28,59],"preserve":[32],"a":[33,55,75,81],"desired":[34],"level":[35],"security":[37],"requirements.":[38,113],"In":[39,64],"this":[40],"work,":[41],"we":[42,66],"develop":[43,104],"essential,":[45],"lightweight":[46],"model":[49,108],"secure":[51],"services":[53],"in":[54],"limited":[56],"distributed":[57],"setting":[58],"as":[60,74],"HPC":[62],"cluster.":[63],"particular,":[65],"consider":[67],"SDS":[68],"(the":[69],"Data":[71],"Services":[72],"framework)":[73],"use":[76],"case":[77],"system,":[78],"which":[79],"framework":[82],"offering":[83],"performance-optimized":[84],"access,":[86],"reorganization,":[87],"analysis.":[89],"We":[90,114],"outline":[91],"the":[92,111],"requirements":[93],"challenges":[95],"effective":[100],"services,":[102],"authorization":[106],"service":[107],"based":[109],"on":[110],"defined":[112],"also":[115],"present":[116],"initial":[118],"prototyping":[119],"model.":[120]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
