{"id":"https://openalex.org/W1975902119","doi":"https://doi.org/10.1109/seccom.2007.4550335","title":"An analysis of the chinese wall pattern for guaranteeing confidentiality in grid-based virtual organisations","display_name":"An analysis of the chinese wall pattern for guaranteeing confidentiality in grid-based virtual organisations","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W1975902119","doi":"https://doi.org/10.1109/seccom.2007.4550335","mag":"1975902119"},"language":"en","primary_location":{"id":"doi:10.1109/seccom.2007.4550335","is_oa":false,"landing_page_url":"https://doi.org/10.1109/seccom.2007.4550335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068147817","display_name":"Gautier Dallons","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"G. Dallons","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072897088","display_name":"Philippe Massonet","orcid":"https://orcid.org/0000-0003-1883-4188"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P. Massonet","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091439974","display_name":"J.-F. Molderez","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"J.-F. Molderez","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025787987","display_name":"Christophe Ponsard","orcid":"https://orcid.org/0000-0002-5027-2114"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"C. Ponsard","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5047124247","display_name":"AE Arenas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Arenas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068147817"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3472,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82180514,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"217","last_page":"222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtual-organization","display_name":"Virtual organization","score":0.7822153568267822},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.7651364207267761},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6250787973403931},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6225552558898926},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.5816818475723267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5526877641677856},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4917357265949249},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.45037755370140076},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.4167143702507019},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11692103743553162}],"concepts":[{"id":"https://openalex.org/C2776272021","wikidata":"https://www.wikidata.org/wiki/Q16909857","display_name":"Virtual organization","level":3,"score":0.7822153568267822},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.7651364207267761},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6250787973403931},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6225552558898926},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.5816818475723267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5526877641677856},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4917357265949249},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.45037755370140076},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.4167143702507019},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11692103743553162},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/seccom.2007.4550335","is_oa":false,"landing_page_url":"https://doi.org/10.1109/seccom.2007.4550335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.105.7399","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.7399","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://epubs.cclrc.ac.uk/bitstream/1755/chinesewallV2.pdf","raw_type":"text"},{"id":"pmh:oai:epubs.cclrc.ac.uk:work/40451","is_oa":false,"landing_page_url":"http://purl.org/net/epubs/work/40451","pdf_url":null,"source":{"id":"https://openalex.org/S4306400334","display_name":"Science and Technology Facilities Council","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W182374222","https://openalex.org/W1506588809","https://openalex.org/W1555713513","https://openalex.org/W1635651613","https://openalex.org/W2118926712","https://openalex.org/W2162171351","https://openalex.org/W6607491130","https://openalex.org/W6633261527","https://openalex.org/W6636826181"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W2948807893","https://openalex.org/W1531601525","https://openalex.org/W1660945490","https://openalex.org/W2167381516","https://openalex.org/W1630484420","https://openalex.org/W2091859829","https://openalex.org/W2366029283","https://openalex.org/W2367299893","https://openalex.org/W2084588370"],"abstract_inverted_index":{"Virtual":[0],"organisations":[1,5],"(VO)":[2],"allow":[3],"independent":[4],"to":[6,11,40,43,69,78],"share":[7],"resources":[8],"and":[9,24,84],"collaborate":[10],"achieve":[12],"common":[13],"goals.":[14],"When":[15],"a":[16,21,31,51,121,132,149],"VO":[17,38,133],"is":[18,27,54,120,127,138,148],"defined":[19],"in":[20,45,50,59,115,129,156],"business":[22,35],"context":[23],"confidential":[25],"information":[26],"shared,":[28],"security":[29,49,63,108],"becomes":[30],"main":[32],"concern.":[33],"Furthermore,":[34],"contexts":[36],"the":[37,46,70,73,79,82,94,104,142],"need":[39],"adapt":[41],"quickly":[42],"changes":[44],"environment.":[47],"Maintaining":[48],"dynamic":[52],"environment":[53],"particularly":[55],"challenging":[56],"open":[57],"issue":[58],"current":[60],"Grids.":[61],"The":[62,118,135],"issues":[64],"are":[65],"not":[66],"only":[67],"related":[68],"protection":[71,80],"from":[72],"outside":[74],"world":[75],"but":[76],"also":[77,139],"of":[81,86,131],"integrity":[83],"confidentiality":[85],"each":[87],"organisation":[88],"against":[89],"potentially":[90],"conflicting":[91],"goals":[92],"within":[93],"VO.":[95,117,159],"To":[96],"tackle":[97],"this":[98,100],"problem,":[99],"paper":[101],"shows":[102],"how":[103],"general":[105],"Chinese":[106,123,154],"wall":[107,124],"model":[109],"can":[110],"be":[111],"adapted":[112],"for":[113],"use":[114],"Gridbased":[116],"result":[119],"reusable":[122],"pattern":[125,136],"that":[126],"expressed":[128],"terms":[130],"ontology.":[134],"formalization":[137],"proved":[140],"using":[141],"Alloy":[143],"SAT-based":[144],"technology.":[145],"This":[146],"work":[147],"first":[150],"step":[151],"towards":[152],"deploying":[153],"walls":[155],"operational":[157],"Grid-based":[158]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
