{"id":"https://openalex.org/W2156457019","doi":"https://doi.org/10.1109/dexa.2002.1045937","title":"Ubiquitous Internet access control: the PAPI system","display_name":"Ubiquitous Internet access control: the PAPI system","publication_year":2004,"publication_date":"2004-04-23","ids":{"openalex":"https://openalex.org/W2156457019","doi":"https://doi.org/10.1109/dexa.2002.1045937","mag":"2156457019"},"language":"en","primary_location":{"id":"doi:10.1109/dexa.2002.1045937","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dexa.2002.1045937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086797320","display_name":"Diego L\u00f3pez","orcid":"https://orcid.org/0000-0002-8326-2000"},"institutions":[{"id":"https://openalex.org/I94687816","display_name":"Osiris Therapeutics (United States)","ror":"https://ror.org/03r8s5x58","country_code":"US","type":"company","lineage":["https://openalex.org/I94687816"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"D.R. Lopez","raw_affiliation_strings":["RedIRIS, USA"],"affiliations":[{"raw_affiliation_string":"RedIRIS, USA","institution_ids":["https://openalex.org/I94687816"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016948074","display_name":"R. Castro","orcid":"https://orcid.org/0000-0003-4199-9335"},"institutions":[{"id":"https://openalex.org/I94687816","display_name":"Osiris Therapeutics (United States)","ror":"https://ror.org/03r8s5x58","country_code":"US","type":"company","lineage":["https://openalex.org/I94687816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. Castro-Rojo","raw_affiliation_strings":["RedIRIS, USA"],"affiliations":[{"raw_affiliation_string":"RedIRIS, USA","institution_ids":["https://openalex.org/I94687816"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086797320"],"corresponding_institution_ids":["https://openalex.org/I94687816"],"apc_list":null,"apc_paid":null,"fwci":0.5266,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.68028187,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"441","last_page":"445"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14067","display_name":"Cloud Computing and Remote Desktop Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14067","display_name":"Cloud Computing and Remote Desktop Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9534000158309937,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7959972620010376},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6925836801528931},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6108871698379517},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5668431520462036},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.5564826726913452},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5367565751075745},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.48529428243637085},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3026593327522278},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.07545280456542969}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7959972620010376},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6925836801528931},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6108871698379517},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5668431520462036},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.5564826726913452},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5367565751075745},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.48529428243637085},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3026593327522278},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.07545280456542969}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dexa.2002.1045937","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dexa.2002.1045937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1560324339","https://openalex.org/W1979867163","https://openalex.org/W2118783124","https://openalex.org/W4210522481"],"related_works":["https://openalex.org/W2770657926","https://openalex.org/W2901729341","https://openalex.org/W2088642402","https://openalex.org/W4246289931","https://openalex.org/W2505244523","https://openalex.org/W2484790450","https://openalex.org/W2788694634","https://openalex.org/W2952052200","https://openalex.org/W3131327268","https://openalex.org/W4312883651"],"abstract_inverted_index":{"PAPI":[0,68,73],"is":[1],"a":[2],"system":[3],"for":[4,44],"providing":[5,87],"access":[6,76,91],"control":[7,47,77],"to":[8,20,29,51,92],"restricted":[9],"information":[10,40],"resources":[11],"across":[12],"the":[13,52,57],"Internet.":[14],"The":[15],"authentication":[16,33,74],"mechanisms":[17,48],"are":[18,49],"designed":[19],"be":[21],"as":[22,24],"flexible":[23],"possible,":[25],"allowing":[26],"each":[27],"organization":[28],"use":[30],"its":[31],"own":[32],"schema,":[34],"keeping":[35],"user":[36,53],"privacy,":[37],"and":[38,54,63,75],"offering":[39],"providers":[41],"data":[42],"enough":[43],"statistics.":[45],"Access":[46],"transparent":[50],"compatible":[55],"with":[56,89],"most":[58],"commonly":[59],"employed":[60],"Web":[61],"browsers":[62],"any":[64,81,93],"operating":[65],"system.":[66],"Since":[67],"uses":[69],"standard":[70],"HTTP":[71],"procedures,":[72],"does":[78],"not":[79],"require":[80],"specific":[82],"hardware":[83],"or":[84],"software,":[85],"thus":[86],"users":[88],"ubiquitous":[90],"resource":[94],"they":[95],"have":[96],"right":[97],"to.":[98]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
