{"id":"https://openalex.org/W1966480545","doi":"https://doi.org/10.1109/pst.2014.6890958","title":"Crypto-assistant: Towards facilitating developer's encryption of sensitive data","display_name":"Crypto-assistant: Towards facilitating developer's encryption of sensitive data","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W1966480545","doi":"https://doi.org/10.1109/pst.2014.6890958","mag":"1966480545"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2014.6890958","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890958","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071758671","display_name":"Ricardo Rodriguez Garcia","orcid":null},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ricardo Rodriguez Garcia","raw_affiliation_strings":["Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","(Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Canada)"],"affiliations":[{"raw_affiliation_string":"Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","institution_ids":["https://openalex.org/I39470171"]},{"raw_affiliation_string":"(Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Canada)","institution_ids":["https://openalex.org/I39470171"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000647973","display_name":"Julie Thorpe","orcid":"https://orcid.org/0000-0002-6629-158X"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Julie Thorpe","raw_affiliation_strings":["Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","(Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Canada)"],"affiliations":[{"raw_affiliation_string":"Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","institution_ids":["https://openalex.org/I39470171"]},{"raw_affiliation_string":"(Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Canada)","institution_ids":["https://openalex.org/I39470171"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016781361","display_name":"Miguel Vargas Mart\u00edn","orcid":"https://orcid.org/0000-0001-8169-6836"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Miguel Vargas Martin","raw_affiliation_strings":["Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","(Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Canada)"],"affiliations":[{"raw_affiliation_string":"Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","institution_ids":["https://openalex.org/I39470171"]},{"raw_affiliation_string":"(Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Canada)","institution_ids":["https://openalex.org/I39470171"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071758671"],"corresponding_institution_ids":["https://openalex.org/I39470171"],"apc_list":null,"apc_paid":null,"fwci":0.5823,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64334491,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"11","issue":null,"first_page":"342","last_page":"346"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7882220149040222},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7541754841804504},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6125482320785522},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5343251824378967},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5032233595848083},{"id":"https://openalex.org/keywords/graphical-user-interface","display_name":"Graphical user interface","score":0.4364885687828064},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3776874840259552},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3404434323310852},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.315197229385376},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3080981373786926}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7882220149040222},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7541754841804504},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6125482320785522},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5343251824378967},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5032233595848083},{"id":"https://openalex.org/C37789001","wikidata":"https://www.wikidata.org/wiki/Q782543","display_name":"Graphical user interface","level":2,"score":0.4364885687828064},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3776874840259552},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3404434323310852},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.315197229385376},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3080981373786926},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst.2014.6890958","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890958","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W125279808","https://openalex.org/W1486643944","https://openalex.org/W1517950588","https://openalex.org/W1965274158","https://openalex.org/W1967446222","https://openalex.org/W1978901798","https://openalex.org/W1985408088","https://openalex.org/W2057796693","https://openalex.org/W2119387527","https://openalex.org/W2182611062","https://openalex.org/W2250364516","https://openalex.org/W4237081854","https://openalex.org/W4237374172","https://openalex.org/W4285719527","https://openalex.org/W6605031466","https://openalex.org/W6629083439","https://openalex.org/W6641748356","https://openalex.org/W6691933294"],"related_works":["https://openalex.org/W1981780420","https://openalex.org/W2182707996","https://openalex.org/W45233828","https://openalex.org/W2964988449","https://openalex.org/W2397952901","https://openalex.org/W2029380707","https://openalex.org/W188202134","https://openalex.org/W4255934811","https://openalex.org/W2465382974","https://openalex.org/W2022968056"],"abstract_inverted_index":{"The":[0,62],"lack":[1,74],"of":[2,4,13,52,64,72,75,85],"encryption":[3,80,86],"data":[5],"at":[6],"rest":[7],"or":[8],"in":[9,113,121],"motion":[10],"is":[11,67],"one":[12],"the":[14,47,53,58,65,70,83,122],"top":[15],"10":[16],"database":[17],"vulnerabilities":[18],"[1].":[19],"We":[20,115],"suggest":[21],"that":[22,93],"this":[23,43],"vulnerability":[24],"could":[25],"be":[26],"prevented":[27],"by":[28,35,81],"encouraging":[29],"developers":[30],"to":[31,68,79,104],"perform":[32],"encryption-related":[33],"tasks":[34],"enhancing":[36],"their":[37],"integrated":[38],"development":[39],"environment":[40],"(IDE).":[41],"To":[42],"end,":[44],"we":[45],"created":[46],"Crypto-Assistant:":[48],"a":[49,89],"modified":[50],"version":[51],"Hibernate":[54,97],"Tools":[55],"plug-in":[56],"for":[57,107],"popular":[59],"Eclipse":[60],"IDE.":[61],"purpose":[63],"Crypto-Assistant":[66],"mitigate":[69],"impact":[71],"developers'":[73,123],"security":[76],"knowledge":[77],"related":[78],"facilitating":[82],"use":[84],"directives":[87],"via":[88],"graphical":[90],"user":[91],"interface":[92],"seamlessly":[94],"integrates":[95],"with":[96],"Tools.":[98],"Two":[99],"preliminary":[100],"tests":[101],"helped":[102],"us":[103],"identify":[105],"items":[106],"improvement":[108],"which":[109],"have":[110],"been":[111],"implemented":[112],"Crypto-Assistant.":[114],"discuss":[116],"Crypto-Assistant's":[117],"architecture,":[118],"interface,":[119],"changes":[120],"workflow,":[124],"and":[125],"design":[126],"considerations.":[127]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
