{"id":"https://openalex.org/W1980526920","doi":"https://doi.org/10.1145/1101908.1101933","title":"Secure sharing between untrusted users in a transparent source/binary deployment model","display_name":"Secure sharing between untrusted users in a transparent source/binary deployment model","publication_year":2005,"publication_date":"2005-11-07","ids":{"openalex":"https://openalex.org/W1980526920","doi":"https://doi.org/10.1145/1101908.1101933","mag":"1980526920"},"language":"en","primary_location":{"id":"doi:10.1145/1101908.1101933","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1101908.1101933","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111669413","display_name":"Eelco Dolstra","orcid":null},"institutions":[{"id":"https://openalex.org/I193662353","display_name":"Utrecht University","ror":"https://ror.org/04pp8hn57","country_code":"NL","type":"education","lineage":["https://openalex.org/I193662353"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Eelco Dolstra","raw_affiliation_strings":["Utrecht University, Utrecht, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Utrecht University, Utrecht, The Netherlands","institution_ids":["https://openalex.org/I193662353"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5111669413"],"corresponding_institution_ids":["https://openalex.org/I193662353"],"apc_list":null,"apc_paid":null,"fwci":0.9142,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.80400585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"154","last_page":"163"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8210745453834534},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7684285640716553},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5616041421890259},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5118605494499207},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.49339309334754944},{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.484464168548584},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.45088469982147217},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4352077543735504},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4105958640575409},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2521144151687622},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12205630540847778}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8210745453834534},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7684285640716553},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5616041421890259},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5118605494499207},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.49339309334754944},{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.484464168548584},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.45088469982147217},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4352077543735504},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4105958640575409},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2521144151687622},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12205630540847778},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1101908.1101933","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1101908.1101933","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.512.4455","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.512.4455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://nixos.org/~eelco/pubs/secsharing-ase2005-final.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W137089333","https://openalex.org/W300961985","https://openalex.org/W1591051730","https://openalex.org/W1656731780","https://openalex.org/W1766049901","https://openalex.org/W2011456500","https://openalex.org/W2073065242","https://openalex.org/W2103239853","https://openalex.org/W2113577889","https://openalex.org/W2120039195","https://openalex.org/W2126954297","https://openalex.org/W2148238464","https://openalex.org/W2167500728","https://openalex.org/W2167898414","https://openalex.org/W2913474215","https://openalex.org/W6635316176"],"related_works":["https://openalex.org/W2120204135","https://openalex.org/W2139396251","https://openalex.org/W1796293478","https://openalex.org/W1577544887","https://openalex.org/W2168276503","https://openalex.org/W1573537275","https://openalex.org/W2105713543","https://openalex.org/W174435416","https://openalex.org/W2132239740","https://openalex.org/W2554503563"],"abstract_inverted_index":{"The":[0,79,175],"Nix":[1,200],"software":[2],"deployment":[3,47],"system":[4,139],"is":[5,57,81],"based":[6],"on":[7,137],"the":[8,41,49,66,93,118,129,141,146,165,170,196,199],"paradigm":[9],"of":[10,45,51,59,161,173,185,198],"transparent":[11],"source/binary":[12],"deployment:":[13],"distributors":[14],"deploy":[15],"descriptors":[16],"that":[17,82,86,126,132,134,149,168],"build":[18],"components":[19],"from":[20,35,65,92],"source,":[21],"while":[22,103],"client":[23],"machines":[24],"can":[25],"transparently":[26],"optimise":[27],"such":[28],"source":[29,46,68],"builds":[30],"by":[31],"downloading":[32],"pre-built":[33],"binaries":[34,89],"remote":[36,120,143],"repositories.":[37],"This":[38],"model":[39,131,148,167],"combines":[40],"simplicity":[42],"and":[43,164,192],"flexibility":[44],"with":[48,113,117],"efficiency":[50],"binary":[52,75],"deployment.":[53],"A":[54],"desirable":[55],"property":[56],"sharing":[58],"components:":[60],"if":[61],"multiple":[62],"users":[63,83,104,136],"install":[64],"same":[67,119,142],"descriptors,":[69],"ideally":[70],"only":[71],"one":[72],"remotely":[73,87],"built":[74,91,101],"should":[76],"be":[77,157],"installed.":[78],"problem":[80],"must":[84],"trust":[85,111,144],"downloaded":[88],"were":[90,193],"sources":[94],"they":[95],"are":[96,179],"claimed":[97],"to":[98],"have":[99,109,140,152],"been":[100],"from,":[102],"in":[105,159,188,195],"general":[106],"do":[107],"not":[108,151],"a":[110,138,182],"relation":[112],"each":[114],"other":[115],"or":[116],"repositories.This":[121],"paper":[122],"presents":[123],"three":[124],"models":[125,178],"enable":[127],"sharing:":[128],"extensional":[130],"requires":[133],"all":[135],"relations,":[145],"intensional":[147],"does":[150],"this":[153],"requirement":[154],"but":[155],"may":[156],"suboptimal":[158],"terms":[160],"space":[162],"use,":[163],"mixed":[166],"merges":[169],"best":[171],"properties":[172],"both.":[174],"latter":[176],"two":[177],"achieved":[180],"through":[181],"novel":[183],"technique":[184],"hash":[186],"rewriting":[187],"content-addressable":[189],"component":[190],"stores,":[191],"implemented":[194],"context":[197],"system.":[201]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
