{"id":"https://openalex.org/W2024987747","doi":"https://doi.org/10.1145/1099554.1099575","title":"Securing XML data in third-party distribution systems","display_name":"Securing XML data in third-party distribution systems","publication_year":2005,"publication_date":"2005-10-31","ids":{"openalex":"https://openalex.org/W2024987747","doi":"https://doi.org/10.1145/1099554.1099575","mag":"2024987747"},"language":"en","primary_location":{"id":"doi:10.1145/1099554.1099575","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1099554.1099575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th ACM international conference on Information and knowledge management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057684417","display_name":"Barbara Carminati","orcid":"https://orcid.org/0000-0002-7502-4731"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Barbara Carminati","raw_affiliation_strings":["University of Insubria at Como, Como, Italy"],"affiliations":[{"raw_affiliation_string":"University of Insubria at Como, Como, Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036362276","display_name":"Elena Ferrari","orcid":"https://orcid.org/0000-0002-7312-6769"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Elena Ferrari","raw_affiliation_strings":["University of Insubria at Como, Como, Italy"],"affiliations":[{"raw_affiliation_string":"University of Insubria at Como, Como, Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Purdue University, Lafayette"],"affiliations":[{"raw_affiliation_string":"Purdue University, Lafayette","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057684417"],"corresponding_institution_ids":["https://openalex.org/I115752224"],"apc_list":null,"apc_paid":null,"fwci":8.6845,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.97584746,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"99","last_page":"106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.824354887008667},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6060124039649963},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.5857390761375427},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.541792631149292},{"id":"https://openalex.org/keywords/xml-encryption","display_name":"XML Encryption","score":0.537416934967041},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5076941251754761},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5029181838035583},{"id":"https://openalex.org/keywords/xml-signature","display_name":"XML Signature","score":0.4972567856311798},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.45282161235809326},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.419664204120636},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4158782362937927},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3949044644832611},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.3537372946739197},{"id":"https://openalex.org/keywords/xml-database","display_name":"XML database","score":0.32694369554519653},{"id":"https://openalex.org/keywords/efficient-xml-interchange","display_name":"Efficient XML Interchange","score":0.25332093238830566}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.824354887008667},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6060124039649963},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.5857390761375427},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.541792631149292},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.537416934967041},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5076941251754761},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5029181838035583},{"id":"https://openalex.org/C34330436","wikidata":"https://www.wikidata.org/wiki/Q979532","display_name":"XML Signature","level":4,"score":0.4972567856311798},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.45282161235809326},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.419664204120636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4158782362937927},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3949044644832611},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.3537372946739197},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.32694369554519653},{"id":"https://openalex.org/C11508877","wikidata":"https://www.wikidata.org/wiki/Q1124477","display_name":"Efficient XML Interchange","level":3,"score":0.25332093238830566},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1099554.1099575","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1099554.1099575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th ACM international conference on Information and knowledge management","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.159.742","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cerias.purdue.edu/ssl/techreports-ssl/2005-117-report.pdf","raw_type":"text"},{"id":"pmh:oai:irinsubria.uninsubria.it:11383/1504365","is_oa":false,"landing_page_url":"http://hdl.handle.net/11383/1504365","pdf_url":null,"source":{"id":"https://openalex.org/S4377196351","display_name":"IrInSubria (University of Insubria)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I115752224","host_organization_name":"University of Insubria","host_organization_lineage":["https://openalex.org/I115752224"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W192371968","https://openalex.org/W1499220070","https://openalex.org/W1566345534","https://openalex.org/W2043508455","https://openalex.org/W2095417143","https://openalex.org/W2100907499","https://openalex.org/W2107307934","https://openalex.org/W2120588620","https://openalex.org/W2171027248"],"related_works":["https://openalex.org/W2784994761","https://openalex.org/W2535167360","https://openalex.org/W1968063342","https://openalex.org/W252540258","https://openalex.org/W2100796523","https://openalex.org/W2163695653","https://openalex.org/W2053796210","https://openalex.org/W2993670902","https://openalex.org/W200734095","https://openalex.org/W2106024890"],"abstract_inverted_index":{"Web-based":[0],"third-party":[1,31],"architectures":[2],"for":[3,62],"data":[4,55],"publishing":[5],"are":[6,73],"today":[7],"receiving":[8],"growing":[9],"attention,":[10],"due":[11],"to":[12,18,83,103,115,138],"their":[13],"scalability":[14],"and":[15,25,40,58,149],"the":[16,38,41,48,66,88,91,118,124],"ability":[17],"efficiently":[19],"manage":[20],"large":[21],"numbers":[22],"of":[23,28,43,50,90,126,144],"users":[24],"great":[26],"amounts":[27],"data.":[29,153],"A":[30],"architecture":[32],"relies":[33],"on":[34,87],"a":[35],"distinction":[36],"between":[37],"Owner":[39,46],"Publisher":[42,53],"information.":[44,68],"The":[45],"is":[47],"producer":[49],"information,":[51],"whereas":[52],"provides":[54],"management":[56],"services":[57],"query":[59],"processing":[60],"functions":[61],"(a":[63],"portion":[64],"of)":[65],"Owner's":[67],"In":[69,130],"such":[70,139],"architecture,":[71],"there":[72],"important":[74,120],"security":[75,121],"concerns":[76],"especially":[77],"if":[78],"we":[79,133],"do":[80],"not":[81],"want":[82],"make":[84],"any":[85],"assumption":[86],"trustworthy":[89],"Publishers.":[92],"Although":[93],"approaches":[94],"have":[95],"been":[96,110],"proposed":[97],"[4,":[98],"5]":[99],"providing":[100],"partial":[101],"solutions":[102],"this":[104,131],"problem,":[105,140],"no":[106],"comprehensive":[107],"framework":[108],"has":[109],"so":[111],"far":[112],"developed":[113],"able":[114],"support":[116],"all":[117],"most":[119],"properties":[122],"in":[123],"presence":[125],"an":[127,135],"untrusted":[128],"Publisher.":[129],"paper,":[132],"develop":[134],"XML-based":[136],"solution":[137],"which":[141],"makes":[142],"use":[143],"non-conventional":[145],"digital":[146],"signature":[147],"techniques":[148],"queries":[150],"over":[151],"encrypted":[152]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
