{"id":"https://openalex.org/W2626528107","doi":"https://doi.org/10.1109/fmec.2017.7946401","title":"Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language","display_name":"Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2626528107","doi":"https://doi.org/10.1109/fmec.2017.7946401","mag":"2626528107"},"language":"en","primary_location":{"id":"doi:10.1109/fmec.2017.7946401","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fmec.2017.7946401","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063692201","display_name":"Nasser Abwnawar","orcid":null},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nasser Abwnawar","raw_affiliation_strings":["Software Technology Research Laboratory (STRL), De Montfort University, Leicester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Software Technology Research Laboratory (STRL), De Montfort University, Leicester, United Kingdom","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035745103","display_name":"Helge Janicke","orcid":"https://orcid.org/0000-0002-1345-2829"},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Helge Janicke","raw_affiliation_strings":["Software Technology Research Laboratory (STRL), De Montfort University, Leicester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Software Technology Research Laboratory (STRL), De Montfort University, Leicester, United Kingdom","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102845312","display_name":"Richard Smith\ufeff","orcid":"https://orcid.org/0000-0003-2796-1525"},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Richard Smith","raw_affiliation_strings":["Software Technology Research Laboratory (STRL), De Montfort University, Leicester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Software Technology Research Laboratory (STRL), De Montfort University, Leicester, United Kingdom","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081189407","display_name":"Aboubaker Lasebae","orcid":"https://orcid.org/0000-0003-2312-9694"},"institutions":[{"id":"https://openalex.org/I60488453","display_name":"Middlesex University","ror":"https://ror.org/01rv4p989","country_code":"GB","type":"education","lineage":["https://openalex.org/I60488453"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Aboubaker Lasebae","raw_affiliation_strings":["School of Engineering and Information Science, Middlesex University, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Science, Middlesex University, London, United Kingdom","institution_ids":["https://openalex.org/I60488453"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063692201"],"corresponding_institution_ids":["https://openalex.org/I66943878"],"apc_list":null,"apc_paid":null,"fwci":0.4836,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72456294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"40","issue":null,"first_page":"14","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7790296077728271},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7425907254219055},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5636446475982666},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5494300127029419},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5448839068412781},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5162215232849121},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5135924816131592},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.42600977420806885},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3946342170238495},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2713380455970764}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7790296077728271},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7425907254219055},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5636446475982666},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5494300127029419},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5448839068412781},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5162215232849121},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5135924816131592},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.42600977420806885},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3946342170238495},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2713380455970764},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fmec.2017.7946401","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fmec.2017.7946401","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W47613773","https://openalex.org/W320829365","https://openalex.org/W1588926042","https://openalex.org/W1966986089","https://openalex.org/W1992552504","https://openalex.org/W1997199359","https://openalex.org/W2002356434","https://openalex.org/W2019672983","https://openalex.org/W2028521236","https://openalex.org/W2051333695","https://openalex.org/W2068710192","https://openalex.org/W2070958191","https://openalex.org/W2078782914","https://openalex.org/W2104237724","https://openalex.org/W2122589245","https://openalex.org/W2124111503","https://openalex.org/W2135099885","https://openalex.org/W2143488688","https://openalex.org/W2157078218","https://openalex.org/W2160886020","https://openalex.org/W2166602595","https://openalex.org/W2169354977","https://openalex.org/W2227553894","https://openalex.org/W2322860310","https://openalex.org/W2394932100","https://openalex.org/W2484702693","https://openalex.org/W2884206483","https://openalex.org/W4246695531","https://openalex.org/W6601953201","https://openalex.org/W6635174806"],"related_works":["https://openalex.org/W2393973626","https://openalex.org/W2105261429","https://openalex.org/W2107355607","https://openalex.org/W2012419258","https://openalex.org/W318167434","https://openalex.org/W1482564230","https://openalex.org/W4285408982","https://openalex.org/W2127259385","https://openalex.org/W2004929657","https://openalex.org/W3178932601"],"abstract_inverted_index":{"This":[0],"paper":[1,88],"addresses":[2],"the":[3,81,92,141],"pressing":[4],"concern":[5],"of":[6,94,122,129,144],"insufficient":[7],"and":[8,29,40,59,84,102,139,164],"inflexible":[9],"support":[10,119,155],"for":[11],"data":[12,21,33,45,55,95,156],"privacy":[13,96,157],"in":[14,62,97],"hybrid":[15,130,165],"cloud":[16,100,131],"environments,":[17],"where":[18],"potentially":[19],"sensitive":[20,44],"is":[22,46,65,136],"dynamically":[23],"transferred":[24,48],"between":[25],"remote":[26],"(i.e.":[27,31],"public)":[28],"local":[30],"private)":[32],"centres,":[34],"as":[35,37],"well":[36],"personal":[38],"computers":[39],"portable/mobile":[41],"devices.":[42],"As":[43],"being":[47],"across":[49,125],"various":[50,120],"administrative":[51],"domains":[52],"with":[53,160],"differing":[54],"protection":[56],"levels,":[57],"legislations,":[58],"security":[60],"mechanisms":[61],"place,":[63],"it":[64],"important":[66],"to":[67,72,80,118],"enable":[68],"a":[69,74,126,147],"differentiated":[70],"approach":[71],"implement":[73],"flexible":[75],"access":[76,112],"control":[77,113],"mechanism":[78],"tailored":[79],"current":[82,142],"context":[83],"circumstances.":[85],"Accordingly,":[86],"this":[87],"raises":[89],"awareness":[90],"on":[91,138],"issues":[93],"such":[98],"heterogeneous":[99],"ecosystems,":[101],"presents":[103],"an":[104,111],"on-going":[105],"research":[106],"work":[107,135],"targeted":[108],"at":[109],"devising":[110],"policy":[114,148],"language,":[115,149],"which":[116],"serves":[117],"types":[121],"policies,":[123],"applicable":[124],"wide":[127],"range":[128],"scenarios.":[132],"The":[133],"presented":[134],"based":[137],"extends":[140],"capabilities":[143],"SANTA":[145],"-":[146],"which,":[150],"however,":[151],"currently":[152],"does":[153],"not":[154],"concerns":[158],"associated":[159],"clouds,":[161],"including":[162],"mobile":[163],"clouds.":[166]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
