{"id":"https://openalex.org/W2344251723","doi":"https://doi.org/10.1109/tdsc.2015.2497680","title":"Enhancing MongoDB with Purpose-Based Access Control","display_name":"Enhancing MongoDB with Purpose-Based Access Control","publication_year":2015,"publication_date":"2015-11-04","ids":{"openalex":"https://openalex.org/W2344251723","doi":"https://doi.org/10.1109/tdsc.2015.2497680","mag":"2344251723"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2015.2497680","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2497680","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042580260","display_name":"Pietro Colombo","orcid":"https://orcid.org/0000-0003-4617-5247"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Pietro Colombo","raw_affiliation_strings":["Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell\u2019Insubria, Varese, Italy","Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell\u2019Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]},{"raw_affiliation_string":"Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036362276","display_name":"Elena Ferrari","orcid":"https://orcid.org/0000-0002-7312-6769"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Elena Ferrari","raw_affiliation_strings":["Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell\u2019Insubria, Varese, Italy","Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell\u2019Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]},{"raw_affiliation_string":"Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042580260"],"corresponding_institution_ids":["https://openalex.org/I115752224"],"apc_list":null,"apc_paid":null,"fwci":15.3696,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.98625554,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"14","issue":"6","first_page":"591","last_page":"604"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nosql","display_name":"NoSQL","score":0.9201793670654297},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8122661113739014},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6831321716308594},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6078298091888428},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5470184087753296},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.536439061164856},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5328431725502014},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5149450898170471},{"id":"https://openalex.org/keywords/relational-database-management-system","display_name":"Relational database management system","score":0.5041650533676147},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4767887592315674},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4698654115200043},{"id":"https://openalex.org/keywords/data-management","display_name":"Data management","score":0.42345619201660156},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4230199158191681},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.3239176571369171},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26020348072052},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.12922242283821106},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12317895889282227}],"concepts":[{"id":"https://openalex.org/C2779599972","wikidata":"https://www.wikidata.org/wiki/Q82231","display_name":"NoSQL","level":3,"score":0.9201793670654297},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8122661113739014},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6831321716308594},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6078298091888428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5470184087753296},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.536439061164856},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5328431725502014},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5149450898170471},{"id":"https://openalex.org/C24394798","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database management system","level":3,"score":0.5041650533676147},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4767887592315674},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4698654115200043},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.42345619201660156},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4230199158191681},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.3239176571369171},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26020348072052},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.12922242283821106},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12317895889282227},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2015.2497680","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2497680","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:irinsubria.uninsubria.it:11383/2024758","is_oa":false,"landing_page_url":"http://hdl.handle.net/11383/2024758","pdf_url":null,"source":{"id":"https://openalex.org/S4377196351","display_name":"IrInSubria (University of Insubria)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I115752224","host_organization_name":"University of Insubria","host_organization_lineage":["https://openalex.org/I115752224"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1554214151","https://openalex.org/W1603920809","https://openalex.org/W1871395573","https://openalex.org/W1967221886","https://openalex.org/W1980437932","https://openalex.org/W1981420413","https://openalex.org/W1986950008","https://openalex.org/W2003367163","https://openalex.org/W2046006386","https://openalex.org/W2072956666","https://openalex.org/W2073294300","https://openalex.org/W2084568010","https://openalex.org/W2087822702","https://openalex.org/W2090930794","https://openalex.org/W2118313280","https://openalex.org/W2119909348","https://openalex.org/W2125129370","https://openalex.org/W2154765153","https://openalex.org/W2166444898","https://openalex.org/W2206334976","https://openalex.org/W2209587831","https://openalex.org/W2244091508","https://openalex.org/W2914418376","https://openalex.org/W3021135929","https://openalex.org/W6633064328"],"related_works":["https://openalex.org/W2295775753","https://openalex.org/W4381416854","https://openalex.org/W2603313942","https://openalex.org/W4306877231","https://openalex.org/W2143602713","https://openalex.org/W4386408829","https://openalex.org/W4241927984","https://openalex.org/W4236503624","https://openalex.org/W2765185163","https://openalex.org/W3124817491"],"abstract_inverted_index":{"Privacy":[0],"has":[1],"become":[2],"a":[3,62],"key":[4],"requirement":[5],"for":[6,34,51],"data":[7,24],"management":[8,19,25],"systems.":[9],"Nevertheless,":[10],"NoSQL":[11,64],"datastores,":[12],"namely":[13],"highly":[14],"scalable":[15],"non":[16],"relational":[17],"database":[18],"systems,":[20],"which":[21],"often":[22],"support":[23,33],"of":[26,54,69,72],"Internet":[27],"scale":[28],"applications,still":[29],"do":[30],"not":[31],"provide":[32],"privacy":[35,81],"policies":[36],"enforcement.":[37],"With":[38],"this":[39,45],"work,":[40],"we":[41],"begin":[42],"to":[43],"address":[44],"issue,":[46],"by":[47],"proposing":[48],"an":[49],"approach":[50],"the":[52,70,73],"integration":[53],"purpose":[55],"based":[56,76],"policy":[57],"enforcement":[58,85],"capabilities":[59],"into":[60,93],"MongoDB,":[61],"popular":[63],"datastore.":[65],"Our":[66],"contribution":[67],"consists":[68],"enhancement":[71],"MongoDB":[74,95],"role":[75],"access":[77,108],"control":[78,109],"model":[79],"with":[80,110],"concepts":[82],"and":[83],"related":[84],"monitor.":[86],"The":[87],"proposed":[88],"monitor":[89,105],"is":[90],"easily":[91],"integrable":[92],"any":[94],"deployment":[96],"through":[97],"simple":[98],"configurations.":[99],"Experimental":[100],"results":[101],"show":[102],"that":[103],"our":[104],"enforces":[106],"purpose-based":[107],"low":[111],"overhead.":[112]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
