{"id":"https://openalex.org/W2144708929","doi":"https://doi.org/10.1109/iscc.2002.1021777","title":"Security as services in active networks","display_name":"Security as services in active networks","publication_year":2003,"publication_date":"2003-06-25","ids":{"openalex":"https://openalex.org/W2144708929","doi":"https://doi.org/10.1109/iscc.2002.1021777","mag":"2144708929"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2002.1021777","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2002.1021777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100719724","display_name":"Zhaoyu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]},{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhaoyu Liu","raw_affiliation_strings":["Department of Software and Information Systems, North Carolina State University, Charlotte, NC, USA","Dept. of Software & Inf. Syst., North Carolina Univ., Charlotte, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Software and Information Systems, North Carolina State University, Charlotte, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"Dept. of Software & Inf. Syst., North Carolina Univ., Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065622216","display_name":"Roy H. Campbell","orcid":"https://orcid.org/0000-0002-3754-7777"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R.H. Campbell","raw_affiliation_strings":["Department of Computer Science, University of Illinois, Urbana-Champaign, IL, USA","Information Trust Institute"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois, Urbana-Champaign, IL, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"Information Trust Institute","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111827173","display_name":"M. Dennis Mickunas","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M.D. Mickunas","raw_affiliation_strings":["Department of Computer Science, University of Illinois, Urbana-Champaign, IL, USA","University of Illinois at Urbana Champaign"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois, Urbana-Champaign, IL, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"University of Illinois at Urbana Champaign","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100719724"],"corresponding_institution_ids":["https://openalex.org/I102149020","https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.7082,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78001992,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"883","last_page":"890"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7172697186470032},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.6451290845870972},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6091568470001221},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5812705755233765},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5656968355178833},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5376120805740356},{"id":"https://openalex.org/keywords/active-networking","display_name":"Active networking","score":0.46406254172325134},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4392232298851013},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.41697239875793457},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.41240420937538147},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3947121500968933},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.221889466047287},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.22060060501098633},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1457056701183319},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1425764262676239}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7172697186470032},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.6451290845870972},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6091568470001221},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5812705755233765},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5656968355178833},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5376120805740356},{"id":"https://openalex.org/C102665078","wikidata":"https://www.wikidata.org/wiki/Q4677571","display_name":"Active networking","level":2,"score":0.46406254172325134},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4392232298851013},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.41697239875793457},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.41240420937538147},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3947121500968933},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.221889466047287},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.22060060501098633},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1457056701183319},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1425764262676239},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2002.1021777","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2002.1021777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W71980116","https://openalex.org/W1553202712","https://openalex.org/W1570296326","https://openalex.org/W1721190297","https://openalex.org/W1844157571","https://openalex.org/W1849264414","https://openalex.org/W1995156790","https://openalex.org/W2128131083","https://openalex.org/W2137830219","https://openalex.org/W2141316418","https://openalex.org/W2143346868","https://openalex.org/W2148854408","https://openalex.org/W2166602595","https://openalex.org/W2237087446","https://openalex.org/W2492269491","https://openalex.org/W6637876144","https://openalex.org/W6638894111","https://openalex.org/W6679675124","https://openalex.org/W6690107052"],"related_works":["https://openalex.org/W88610236","https://openalex.org/W2744631404","https://openalex.org/W2165898552","https://openalex.org/W2290724697","https://openalex.org/W1811024770","https://openalex.org/W2372674753","https://openalex.org/W2018644264","https://openalex.org/W2188404590","https://openalex.org/W2187486724","https://openalex.org/W2907868081"],"abstract_inverted_index":{"This":[0],"paper":[1],"discusses":[2],"the":[3,61,83,107,121],"design":[4],"and":[5,44,65,76,87,98,125],"implementation":[6],"for":[7,119],"supporting":[8],"customized":[9,20,53,111],"security":[10,21,38,42,54,64,85,97,112],"services":[11,22,55,88],"in":[12],"active":[13,16,34,41,57,91,122,126],"networks":[14],"using":[15],"networking":[17],"principles.":[18],"The":[19,49,101],"support":[23,50,108],"is":[24],"based":[25,94],"on":[26,95],"a":[27,116],"secure":[28,102],"node":[29,35,103],"architecture":[30],"that":[31],"includes":[32],"an":[33,40],"operating":[36],"system":[37],"API,":[39],"guardian,":[43],"quality":[45,70],"of":[46,51,71,109],"protection":[47,66,72],"provisions.":[48],"highly":[52],"permits":[56],"nodes":[58],"to":[59],"satisfy":[60],"application-specific":[62],"dynamic":[63],"requirements.":[67,100],"It":[68],"associates":[69],"with":[73,106],"network":[74,123],"software":[75],"application":[77],"security.":[78],"Applications":[79],"can":[80,114],"dynamically":[81,110],"select":[82],"suitable":[84],"configurations":[86],"at":[89],"each":[90],"routing":[92],"node,":[93],"their":[96],"performance":[99],"architecture,":[104],"together":[105],"services,":[113],"provide":[115],"fundamental":[117],"base":[118],"securing":[120],"infrastructure":[124],"applications.":[127]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
