{"id":"https://openalex.org/W4385488256","doi":"https://doi.org/10.1109/ecai58194.2023.10193926","title":"Provision of IT security access to integrated applications for Local and Regional Utility Service providers approach","display_name":"Provision of IT security access to integrated applications for Local and Regional Utility Service providers approach","publication_year":2023,"publication_date":"2023-06-29","ids":{"openalex":"https://openalex.org/W4385488256","doi":"https://doi.org/10.1109/ecai58194.2023.10193926"},"language":"en","primary_location":{"id":"doi:10.1109/ecai58194.2023.10193926","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ecai58194.2023.10193926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028856745","display_name":"Dorin Vasile Deac-\u0218uteu","orcid":"https://orcid.org/0000-0002-5573-7443"},"institutions":[{"id":"https://openalex.org/I141595442","display_name":"University of Bucharest","ror":"https://ror.org/02x2v6p15","country_code":"RO","type":"education","lineage":["https://openalex.org/I141595442"]},{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Dorin Vasile Deac Suteu","raw_affiliation_strings":["Polytechnic University of Bucharest,Faculty of Industrial Engineering and Robotics,Bucharest,Romania","Faculty of Industrial Engineering and Robotics, Polytechnic University of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Polytechnic University of Bucharest,Faculty of Industrial Engineering and Robotics,Bucharest,Romania","institution_ids":["https://openalex.org/I141595442","https://openalex.org/I61641377"]},{"raw_affiliation_string":"Faculty of Industrial Engineering and Robotics, Polytechnic University of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I141595442","https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040009695","display_name":"Aurel Mihail \u021a\u00ee\u021bu","orcid":"https://orcid.org/0000-0002-0054-6535"},"institutions":[{"id":"https://openalex.org/I124121301","display_name":"Lucian Blaga University of Sibiu","ror":"https://ror.org/026gdz537","country_code":"RO","type":"education","lineage":["https://openalex.org/I124121301"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Aurel Mihail Titu","raw_affiliation_strings":["&#x201C;Lucian Blaga&#x201D; University of Sibiu,Sibiu,Romania"],"affiliations":[{"raw_affiliation_string":"&#x201C;Lucian Blaga&#x201D; University of Sibiu,Sibiu,Romania","institution_ids":["https://openalex.org/I124121301"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074162324","display_name":"Maria Popa","orcid":"https://orcid.org/0000-0002-9899-4423"},"institutions":[{"id":"https://openalex.org/I4210140223","display_name":"1 Decembrie 1918 University","ror":"https://ror.org/04577k168","country_code":"RO","type":"education","lineage":["https://openalex.org/I4210140223"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Maria Popa","raw_affiliation_strings":["University of Alba Iulia,&#x201C;1 December 1918&#x201D;,Alba Iulia,Romania"],"affiliations":[{"raw_affiliation_string":"University of Alba Iulia,&#x201C;1 December 1918&#x201D;,Alba Iulia,Romania","institution_ids":["https://openalex.org/I4210140223"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103241121","display_name":"Alina Bianca Pop","orcid":"https://orcid.org/0000-0002-4784-8485"},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Alina Bianca Pop","raw_affiliation_strings":["Technical University of Cluj-Napoca, Northern University Centre of Baia Mare,Faculty of Engineering,Department of Engineering and Technology Management,Baia Mare,Maramures,Romania,430083"],"affiliations":[{"raw_affiliation_string":"Technical University of Cluj-Napoca, Northern University Centre of Baia Mare,Faculty of Engineering,Department of Engineering and Technology Management,Baia Mare,Maramures,Romania,430083","institution_ids":["https://openalex.org/I158333966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101615987","display_name":"Diana Dragomir","orcid":"https://orcid.org/0000-0001-6833-8815"},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Diana Dragomir","raw_affiliation_strings":["Technical University of Cluj Napoca,Cluj-Napoca,Romania","Technical University of Cluj Napoca, Cluj-Napoca, Romania"],"affiliations":[{"raw_affiliation_string":"Technical University of Cluj Napoca,Cluj-Napoca,Romania","institution_ids":["https://openalex.org/I158333966"]},{"raw_affiliation_string":"Technical University of Cluj Napoca, Cluj-Napoca, Romania","institution_ids":["https://openalex.org/I158333966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5028856745"],"corresponding_institution_ids":["https://openalex.org/I141595442","https://openalex.org/I61641377"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10144563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"65","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9355000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9355000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14435","display_name":"Information Retrieval and Data Mining","score":0.9282000064849854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9189000129699707,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7756587266921997},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7602968215942383},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.7217920422554016},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.7209810018539429},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.6813791990280151},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.5589002370834351},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5493277907371521},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5002837181091309},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.46526268124580383},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.45172542333602905},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.44524097442626953},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.44407737255096436},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4293527603149414},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.42348435521125793},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.416459858417511},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.40310508012771606},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.35883277654647827},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.2235144078731537},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2000608742237091},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15848329663276672}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7756587266921997},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7602968215942383},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.7217920422554016},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.7209810018539429},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.6813791990280151},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.5589002370834351},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5493277907371521},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5002837181091309},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.46526268124580383},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.45172542333602905},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.44524097442626953},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.44407737255096436},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4293527603149414},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.42348435521125793},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.416459858417511},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.40310508012771606},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.35883277654647827},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.2235144078731537},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2000608742237091},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15848329663276672},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ecai58194.2023.10193926","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ecai58194.2023.10193926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W3139989853","https://openalex.org/W3193295308"],"related_works":["https://openalex.org/W4321844648","https://openalex.org/W2005134512","https://openalex.org/W4282564355","https://openalex.org/W833563683","https://openalex.org/W2165898552","https://openalex.org/W770390123","https://openalex.org/W2560277441","https://openalex.org/W1009702940","https://openalex.org/W2894900144","https://openalex.org/W4323909739"],"abstract_inverted_index":{"The":[0,59],"purpose":[1],"of":[2,24,35,42,66,83,86,108,132],"application":[3,9,45,104,148],"security":[4,17,46,90,149,151,162,170],"is":[5,47,116,128],"to":[6,50,52,62,75,78,97,119,125,143,155],"protect":[7],"software":[8],"code":[10],"and":[11,32,56,100,113,164],"data":[12],"from":[13],"malicious":[14],"action.":[15],"Application":[16],"can":[18,71,136],"be":[19],"addressed":[20],"at":[21],"any":[22],"stage":[23],"the":[25,29,36,40,67,81,103,130],"operational":[26],"process,":[27],"including":[28],"design,":[30],"development,":[31],"deployment":[33],"stages":[34],"IT":[37,73],"application,":[38],"so":[39],"scope":[41],"what":[43],"protects":[44],"constantly":[48],"growing":[49],"adapt":[51],"new":[53],"attack":[54],"vectors":[55],"threat":[57],"methods.":[58],"article":[60],"aims":[61],"perform":[63],"an":[64],"analysis":[65],"potential":[68,109],"dangers":[69],"that":[70,140,153],"affect":[72],"applications":[74],"enable":[76],"management":[77,92],"properly":[79],"rank":[80],"importance":[82],"different":[84],"aspects":[85],"information":[87],"security.":[88,122],"Using":[89],"access":[91,168],"(SMA)":[93],"as":[94],"a":[95],"tool":[96],"measure":[98],"compliance":[99],"risk":[101],"in":[102,106,169],"portfolio":[105],"terms":[107],"exploits,":[110],"vulnerabilities,":[111],"misconfigurations,":[112],"exploitable":[114],"interfaces":[115],"one":[117],"way":[118,124],"improve":[120,126],"cyber":[121],"Another":[123],"cybersecurity":[127],"through":[129],"use":[131],"multi-factor":[133],"authentication.":[134],"SMA":[135],"help":[137],"mitigate":[138],"risks":[139],"are":[141],"related":[142],"insufficient":[144],"or":[145,166],"improperly":[146],"implemented":[147],"scans,":[150],"issues":[152],"continue":[154],"exist":[156],"beyond":[157],"established":[158,161],"deadlines":[159],"for":[160],"standards,":[163],"over-privileged":[165],"unused":[167],"tools.":[171]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
