{"id":"https://openalex.org/W2068962170","doi":"https://doi.org/10.1109/cscwd.2007.4281428","title":"Active Authorization Management for Multi-domain Cooperation","display_name":"Active Authorization Management for Multi-domain Cooperation","publication_year":2007,"publication_date":"2007-04-01","ids":{"openalex":"https://openalex.org/W2068962170","doi":"https://doi.org/10.1109/cscwd.2007.4281428","mag":"2068962170"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd.2007.4281428","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2007.4281428","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 11th International Conference on Computer Supported Cooperative Work in Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100629957","display_name":"Yuqing Sun","orcid":"https://orcid.org/0000-0002-0625-6096"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuqing Sun","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University, China","Shandong University, Jinan,"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Shandong University, Jinan,","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079312541","display_name":"Bin Gong","orcid":"https://orcid.org/0000-0001-9820-4762"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Gong","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University, China","Shandong University, Jinan,"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Shandong University, Jinan,","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101536417","display_name":"Xiangxu Meng","orcid":"https://orcid.org/0000-0001-7290-5659"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangxu Meng","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University, China","Shandong University, Jinan,"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Shandong University, Jinan,","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100836736","display_name":"Zongkai Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongkai Lin","raw_affiliation_strings":["Chinese Academy of Sciences, Institute for Computing Technology, Beijing, China","Institue of Computing Technology, Chinese Academy of Sciences, Beijing, China. lzk@ict.ac.cn"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute for Computing Technology, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institue of Computing Technology, Chinese Academy of Sciences, Beijing, China. lzk@ict.ac.cn","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100629957"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":0.9717,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86085078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"162","last_page":"167"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperation","display_name":"Interoperation","score":0.9110808372497559},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7654619216918945},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6102273464202881},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.591218113899231},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5811693668365479},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5735172033309937},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5557729005813599},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5336630344390869},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47403717041015625},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4212353527545929},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.359769344329834},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3487844169139862},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.32275688648223877},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2650826573371887},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.09267762303352356}],"concepts":[{"id":"https://openalex.org/C139458680","wikidata":"https://www.wikidata.org/wiki/Q12184942","display_name":"Interoperation","level":3,"score":0.9110808372497559},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7654619216918945},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6102273464202881},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.591218113899231},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5811693668365479},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5735172033309937},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5557729005813599},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5336630344390869},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47403717041015625},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4212353527545929},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.359769344329834},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3487844169139862},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.32275688648223877},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2650826573371887},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.09267762303352356},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd.2007.4281428","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2007.4281428","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 11th International Conference on Computer Supported Cooperative Work in Design","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1532088349","https://openalex.org/W1970034526","https://openalex.org/W1975449217","https://openalex.org/W1981420668","https://openalex.org/W1982022358","https://openalex.org/W2000952251","https://openalex.org/W2060690494","https://openalex.org/W2096814801","https://openalex.org/W2099742748","https://openalex.org/W2113467413","https://openalex.org/W2123102905","https://openalex.org/W2149046210","https://openalex.org/W2156885966","https://openalex.org/W2171837288","https://openalex.org/W6674989116"],"related_works":["https://openalex.org/W2555738791","https://openalex.org/W1990260561","https://openalex.org/W1593822213","https://openalex.org/W2357728851","https://openalex.org/W2017675414","https://openalex.org/W2367441718","https://openalex.org/W2355345331","https://openalex.org/W1466567525","https://openalex.org/W2105261429","https://openalex.org/W318167434"],"abstract_inverted_index":{"In":[0,59],"a":[1],"multi-domain":[2,69],"collaboration":[3],"environment,":[4],"an":[5,64],"enterprise":[6],"should":[7],"authorize":[8],"different":[9],"access":[10],"rights":[11],"for":[12,68],"sensitive":[13],"information":[14],"to":[15,18,49,81,111],"partners":[16],"according":[17],"its":[19],"security":[20,83],"policies":[21,84],"and":[22,36,78,86,98,115],"relationships":[23],"with":[24,31],"them,":[25],"which":[26,71],"may":[27],"be":[28],"changed":[29],"dynamically":[30],"the":[32,46,52,73,88],"development":[33],"of":[34,45,75,94],"transaction":[35],"business":[37,76],"rules.":[38],"So,":[39],"it":[40],"is":[41,107],"emerging":[42],"as":[43],"one":[44],"major":[47],"concerns":[48],"effectively":[50],"manage":[51],"authorizations":[53],"while":[54],"supporting":[55],"flexible":[56],"multi-level":[57],"collaboration.":[58],"this":[60,113],"work,":[61],"we":[62],"propose":[63],"active":[65],"authorization":[66,96],"model":[67,114],"cooperation,":[70],"introduces":[72],"notions":[74],"rules":[77],"context":[79,90],"parameters":[80],"update":[82],"automatically":[85],"satisfy":[87],"dynamic":[89],"requirements.":[91],"The":[92,104],"algorithms":[93],"handling":[95],"queries":[97],"roles":[99],"mapping":[100],"are":[101],"also":[102],"presented.":[103],"system":[105],"architecture":[106],"discussed":[108],"in":[109],"detail":[110],"implement":[112],"support":[116],"interoperation":[117],"among":[118],"heterogeneous":[119],"platforms.":[120]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
