{"id":"https://openalex.org/W2146308814","doi":"https://doi.org/10.1109/dexa.2003.1232051","title":"Towards accountable management of identity and privacy: sticky policies and enforceable tracing services","display_name":"Towards accountable management of identity and privacy: sticky policies and enforceable tracing services","publication_year":2004,"publication_date":"2004-01-23","ids":{"openalex":"https://openalex.org/W2146308814","doi":"https://doi.org/10.1109/dexa.2003.1232051","mag":"2146308814"},"language":"en","primary_location":{"id":"doi:10.1109/dexa.2003.1232051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dexa.2003.1232051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055694969","display_name":"Marco Casassa Mont","orcid":"https://orcid.org/0009-0004-7611-6947"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M.C. Mont","raw_affiliation_strings":["HP Laboratories, Trusted Systems Laboratory, UK","Trusted Syst. Lab., HP Lab., UK"],"affiliations":[{"raw_affiliation_string":"HP Laboratories, Trusted Systems Laboratory, UK","institution_ids":[]},{"raw_affiliation_string":"Trusted Syst. Lab., HP Lab., UK","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011190459","display_name":"Siani Pearson","orcid":"https://orcid.org/0000-0003-3576-9402"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Pearson","raw_affiliation_strings":["HP Laboratories, Trusted Systems Laboratory, UK","Trusted Syst. Lab., HP Lab., UK"],"affiliations":[{"raw_affiliation_string":"HP Laboratories, Trusted Systems Laboratory, UK","institution_ids":[]},{"raw_affiliation_string":"Trusted Syst. Lab., HP Lab., UK","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035781181","display_name":"Pete Bramhall","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P. Bramhall","raw_affiliation_strings":["HP Laboratories, Trusted Systems Laboratory, UK","Trusted Syst. Lab., HP Lab., UK"],"affiliations":[{"raw_affiliation_string":"HP Laboratories, Trusted Systems Laboratory, UK","institution_ids":[]},{"raw_affiliation_string":"Trusted Syst. Lab., HP Lab., UK","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055694969"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":15.2502,"has_fulltext":false,"cited_by_count":248,"citation_normalized_percentile":{"value":0.98978226,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.7230631709098816},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5936108827590942},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5803977847099304},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5665633678436279},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.5627517700195312},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5595855116844177},{"id":"https://openalex.org/keywords/destiny","display_name":"Destiny (ISS module)","score":0.5389881730079651},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5184885263442993},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5025498867034912},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.47613075375556946},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4613829255104065},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45553043484687805},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.44501814246177673},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.434871643781662},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.4119427800178528},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.4106450378894806},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.351546049118042},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2426268458366394},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08770915865898132}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.7230631709098816},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5936108827590942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5803977847099304},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5665633678436279},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.5627517700195312},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5595855116844177},{"id":"https://openalex.org/C44761211","wikidata":"https://www.wikidata.org/wiki/Q752841","display_name":"Destiny (ISS module)","level":2,"score":0.5389881730079651},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5184885263442993},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5025498867034912},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.47613075375556946},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4613829255104065},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45553043484687805},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.44501814246177673},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.434871643781662},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.4119427800178528},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4106450378894806},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.351546049118042},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2426268458366394},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08770915865898132},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/dexa.2003.1232051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dexa.2003.1232051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.12.7546","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.7546","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.hpl.hp.com/techreports/2003/HPL-2003-49.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1487821058","https://openalex.org/W1540267373","https://openalex.org/W1568555283","https://openalex.org/W1797206029","https://openalex.org/W2085753559","https://openalex.org/W2100719963","https://openalex.org/W2122440889","https://openalex.org/W2139523314","https://openalex.org/W2146308814","https://openalex.org/W2152924492","https://openalex.org/W2484300113","https://openalex.org/W4230816331","https://openalex.org/W4285719527","https://openalex.org/W6629372320","https://openalex.org/W6634174013"],"related_works":["https://openalex.org/W4308433763","https://openalex.org/W3035518953","https://openalex.org/W2898512050","https://openalex.org/W4386213623","https://openalex.org/W3110872243","https://openalex.org/W4236961386","https://openalex.org/W151744205","https://openalex.org/W4377818785","https://openalex.org/W4385282342","https://openalex.org/W4246096667"],"abstract_inverted_index":{"Digital":[0],"identities":[1],"and":[2,17,27,53,62,94,106,127,135,148],"profiles":[3],"are":[4],"precious":[5],"assets.":[6],"On":[7,22],"one":[8],"hand":[9],"they":[10],"enable":[11],"users":[12,103],"to":[13,58,76,97,142],"engage":[14],"in":[15,104,140,151],"transactions":[16],"interactions":[18],"on":[19,124],"the":[20,23,34,46,66],"Internet.":[21],"other":[24],"hand,":[25],"abuses":[26],"leakages":[28],"of":[29,36,45,51,68,86,113],"this":[30,69,82],"information":[31,61,70],"could":[32],"violate":[33],"privacy":[35,54,100],"their":[37,59],"owners,":[38],"sometimes":[39],"with":[40],"serious":[41],"consequences.":[42],"Nowadays":[43],"most":[44,80],"people":[47],"have":[48],"limited":[49],"understanding":[50],"security":[52],"policies":[55,126],"when":[56],"applied":[57],"confidential":[60],"little":[63],"control":[64,105],"over":[65],"destiny":[67],"since":[71],"it":[72,150],"has":[73],"been":[74],"disclosed":[75],"third":[77],"parties.":[78],"In":[79],"cases":[81],"is":[83,139],"a":[84,120,144,152],"matter":[85],"trust.":[87],"This":[88],"document":[89],"describes":[90],"an":[91],"innovative":[92],"approach":[93],"related":[95],"mechanisms":[96],"enforce":[98],"users'":[99],"by":[101],"putting":[102],"making":[107],"organizations":[108],"more":[109],"accountable.":[110],"As":[111],"part":[112],"our":[114],"ongoing":[115],"research":[116],"activity,":[117],"we":[118],"introduce":[119],"technical":[121],"solution":[122],"based":[123],"sticky":[125],"tracing":[128],"services":[129],"that":[130],"leverages":[131],"identity-based":[132],"encryption":[133],"(IBE)":[134],"TCPA":[136],"technologies.":[137],"Work":[138],"progress":[141],"build":[143],"full":[145],"working":[146],"prototype":[147],"deploy":[149],"real-life":[153],"environment.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":17},{"year":2014,"cited_by_count":20},{"year":2013,"cited_by_count":23},{"year":2012,"cited_by_count":22}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
