{"id":"https://openalex.org/W2124589379","doi":"https://doi.org/10.1109/cscwd.2010.5471954","title":"A collaborative trust model of firewall-through based on Cloud Computing","display_name":"A collaborative trust model of firewall-through based on Cloud Computing","publication_year":2010,"publication_date":"2010-04-01","ids":{"openalex":"https://openalex.org/W2124589379","doi":"https://doi.org/10.1109/cscwd.2010.5471954","mag":"2124589379"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd.2010.5471954","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2010.5471954","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2010 14th International Conference on Computer Supported Cooperative Work in Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111693748","display_name":"Zhimin Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhimin Yang","raw_affiliation_strings":["Department of Computer, Shandong University, Weihai, China","Department of Computer, Shandong University at Weihai, Weihai, P.R. China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer, Shandong University, Weihai, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"Department of Computer, Shandong University at Weihai, Weihai, P.R. China#TAB#","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066974210","display_name":"Lixiang Qiao","orcid":null},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lixiang Qiao","raw_affiliation_strings":["Department of Computer, Shandong University, Weihai, China","Department of Computer, Shandong University at Weihai, Weihai, P.R. China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer, Shandong University, Weihai, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"Department of Computer, Shandong University at Weihai, Weihai, P.R. China#TAB#","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042017541","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0003-2485-1339"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["School of Computer Science and Software Engineering, University of Western Australia, Perth, WA, Australia","School of Computer Science and Software Engineering, The University of Western Australia, Perth, 35 Stirling Highway, Crawley, WA6009, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Software Engineering, University of Western Australia, Perth, WA, Australia","institution_ids":["https://openalex.org/I177877127"]},{"raw_affiliation_string":"School of Computer Science and Software Engineering, The University of Western Australia, Perth, 35 Stirling Highway, Crawley, WA6009, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101954235","display_name":"Chi Yang","orcid":"https://orcid.org/0000-0002-6770-4593"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chi Yang","raw_affiliation_strings":["School of Computer Science and Software Engineering, University of Western Australia, Perth, WA, Australia","School of Computer Science and Software Engineering, The University of Western Australia, Perth, 35 Stirling Highway, Crawley, WA6009, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Software Engineering, University of Western Australia, Perth, WA, Australia","institution_ids":["https://openalex.org/I177877127"]},{"raw_affiliation_string":"School of Computer Science and Software Engineering, The University of Western Australia, Perth, 35 Stirling Highway, Crawley, WA6009, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045167032","display_name":"Guangming Wan","orcid":null},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangming Wan","raw_affiliation_strings":["Department of Computer, Shandong University, Weihai, China","Department of Computer, Shandong University at Weihai, Weihai, P.R. China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer, Shandong University, Weihai, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"Department of Computer, Shandong University at Weihai, Weihai, P.R. China#TAB#","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111693748"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":null,"apc_paid":null,"fwci":6.7663,"has_fulltext":false,"cited_by_count":57,"citation_normalized_percentile":{"value":0.97143054,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"34","issue":null,"first_page":"329","last_page":"334"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8270246982574463},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7957616448402405},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7180346250534058},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4567592740058899},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1598920226097107},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11049064993858337}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8270246982574463},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7957616448402405},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7180346250534058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4567592740058899},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1598920226097107},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11049064993858337},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd.2010.5471954","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2010.5471954","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2010 14th International Conference on Computer Supported Cooperative Work in Design","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1972758331","https://openalex.org/W2130280511","https://openalex.org/W2156683901","https://openalex.org/W2349591219","https://openalex.org/W2359363985","https://openalex.org/W2377671946","https://openalex.org/W2379087440","https://openalex.org/W7027528911"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2515419187","https://openalex.org/W4244478748","https://openalex.org/W2507130582","https://openalex.org/W2042575648","https://openalex.org/W2050398201","https://openalex.org/W4223488648","https://openalex.org/W2009238965","https://openalex.org/W4220912467","https://openalex.org/W2363554702"],"abstract_inverted_index":{"In":[0],"this":[1,117],"paper,":[2],"the":[3,27,59,62,65,72,79,85,91,98,103],"existing":[4],"trust":[5,34,75,80,105,118,125],"models":[6,126],"and":[7,25,71,87,100,122],"firewall":[8,86],"technology":[9],"are":[10,51],"studied.":[11],"Then":[12],"we":[13],"develop":[14],"an":[15],"approach":[16],"based":[17,38,127],"on":[18,39,128],"Cloud":[19,40,137],"Computing":[20,138],"to":[21],"estimate":[22],"dynamic":[23],"context":[24],"present":[26],"definition":[28],"of":[29,36,68,74,102],"risk":[30],"signal.":[31],"A":[32],"collaborative":[33],"model":[35,45,60,81,119],"firewall-through":[37],"Environment":[41],"is":[42,82,109,120],"proposed.":[43],"The":[44,112],"has":[46],"three":[47],"advantages:":[48],"Firstly,":[49],"there":[50],"different":[52,56],"security":[53],"policies":[54],"for":[55],"domains.":[57],"Secondly,":[58],"considers":[61],"transaction":[63],"context,":[64],"historical":[66],"data":[67],"entity":[69],"influences":[70],"measurement":[73],"value":[76],"dynamically.":[77],"Thirdly,":[78],"compatible":[83],"with":[84],"does":[88],"not":[89],"break":[90],"firewall's":[92],"local":[93],"control":[94],"policies.":[95],"To":[96],"verify":[97],"reliability":[99],"effectiveness":[101],"coordinated":[104],"model,":[106],"a":[107],"simulation":[108,113],"carried":[110],"out.":[111],"result":[114],"shows":[115],"that":[116],"robust":[121],"out-performances":[123],"traditional":[124],"domains":[129],"because":[130],"it":[131],"successfully":[132],"blocks":[133],"malicious":[134],"access":[135],"under":[136],"environment.":[139]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":10}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
