{"id":"https://openalex.org/W2153414845","doi":"https://doi.org/10.1145/1102199.1102202","title":"Maintaining privacy on derived objects","display_name":"Maintaining privacy on derived objects","publication_year":2005,"publication_date":"2005-11-07","ids":{"openalex":"https://openalex.org/W2153414845","doi":"https://doi.org/10.1145/1102199.1102202","mag":"2153414845"},"language":"en","primary_location":{"id":"doi:10.1145/1102199.1102202","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1102199.1102202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM workshop on Privacy in the electronic society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083686418","display_name":"Nicola Zannone","orcid":"https://orcid.org/0000-0002-9081-5996"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Nicola Zannone","raw_affiliation_strings":["University of Trento, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"University of Trento, Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085639552","display_name":"Fabio Massacci","orcid":"https://orcid.org/0000-0002-1091-8486"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fabio Massacci","raw_affiliation_strings":["University of Trento, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"University of Trento, Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071866219","display_name":"Duminda Wijesekera","orcid":"https://orcid.org/0000-0002-7122-3055"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Duminda Wijesekera","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083686418"],"corresponding_institution_ids":["https://openalex.org/I193223587"],"apc_list":null,"apc_paid":null,"fwci":2.2745,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.91787691,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"10","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8256791234016418},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.6957933902740479},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6548619270324707},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.6393803358078003},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.5822352170944214},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5545837879180908},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5398250818252563},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5285360217094421},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5147619247436523},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5064641237258911},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.49897241592407227},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45887792110443115},{"id":"https://openalex.org/keywords/personal-information-management","display_name":"Personal information management","score":0.4159201979637146},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3319306969642639},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.2965905964374542},{"id":"https://openalex.org/keywords/management-information-systems","display_name":"Management information systems","score":0.1147470474243164},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07456427812576294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8256791234016418},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.6957933902740479},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6548619270324707},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.6393803358078003},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.5822352170944214},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5545837879180908},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5398250818252563},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5285360217094421},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5147619247436523},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5064641237258911},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.49897241592407227},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45887792110443115},{"id":"https://openalex.org/C194695470","wikidata":"https://www.wikidata.org/wiki/Q1081067","display_name":"Personal information management","level":4,"score":0.4159201979637146},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3319306969642639},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.2965905964374542},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.1147470474243164},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07456427812576294},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1145/1102199.1102202","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1102199.1102202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM workshop on Privacy in the electronic society","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/45f047c1-8499-4328-abdd-455f55998bdf","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/45f047c1-8499-4328-abdd-455f55998bdf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Zannone, N, Jajodia, S, Massacci, F & Wijesekera, D 2005, Maintaining privacy on derived objects. in V Atluri, S De Capitani di Vimercati & R Dingledine (eds), Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES 2005, Alexandria VA, USA, November 7, 2005). Association for Computing Machinery, Inc., New York NY, pp. 10-19.","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.62.111","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://dit.unitn.it/~zannone/publication/zann-jajo-mass-wije-05-WPES.pdf","raw_type":"text"},{"id":"pmh:oai:iris.unitn.it:11572/44109","is_oa":false,"landing_page_url":"http://hdl.handle.net/11572/44109","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:pure.tue.nl:publications/45f047c1-8499-4328-abdd-455f55998bdf","is_oa":false,"landing_page_url":"http://doi.acm.org/10.1145/1102199.1102202","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Zannone, N, Jajodia, S, Massacci, F & Wijesekera, D 2005, Maintaining privacy on derived objects. in V Atluri, S De Capitani di Vimercati & R Dingledine (eds), Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES 2005, Alexandria VA, USA, November 7, 2005). Association for Computing Machinery, Inc., New York NY, pp. 10-19.","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/45f047c1-8499-4328-abdd-455f55998bdf","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/45f047c1-8499-4328-abdd-455f55998bdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES 2005, Alexandria VA, USA, November 7, 2005), 10 - 19","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W180333208","https://openalex.org/W1557915535","https://openalex.org/W1568555283","https://openalex.org/W1589232796","https://openalex.org/W1594745575","https://openalex.org/W1976055110","https://openalex.org/W2012419258","https://openalex.org/W2015315002","https://openalex.org/W2081578468","https://openalex.org/W2097404228","https://openalex.org/W2103647628","https://openalex.org/W2109339603","https://openalex.org/W2113427031","https://openalex.org/W2114917462","https://openalex.org/W2121988324","https://openalex.org/W2122049982","https://openalex.org/W2125419198","https://openalex.org/W2135600671","https://openalex.org/W2138916465","https://openalex.org/W2144786703","https://openalex.org/W2164950969","https://openalex.org/W2166602595","https://openalex.org/W2168884369","https://openalex.org/W2738444131","https://openalex.org/W2839980303","https://openalex.org/W2914418376"],"related_works":["https://openalex.org/W2123296434","https://openalex.org/W2555738791","https://openalex.org/W2104547074","https://openalex.org/W4298042445","https://openalex.org/W2586694115","https://openalex.org/W2132693790","https://openalex.org/W2367441718","https://openalex.org/W2017616439","https://openalex.org/W2017675414","https://openalex.org/W1593822213"],"abstract_inverted_index":{"Protecting":[0],"privacy":[1,44],"means":[2],"to":[3,8,23],"ensure":[4],"users":[5,47],"that":[6,27],"access":[7,55,62,72],"their":[9,14,56,66],"personal":[10,57],"data":[11],"complies":[12],"with":[13],"preferences.":[15,87],"However,":[16],"information":[17,38,63,82],"can":[18],"be":[19],"manipulated":[20],"in":[21],"order":[22],"derive":[24],"new":[25],"objects":[26],"may":[28],"disclose":[29],"part":[30],"of":[31,37,81],"the":[32],"original":[33],"information.":[34],"Therefore,":[35],"control":[36,51,73],"flow":[39],"is":[40],"necessary":[41],"for":[42,71,78,84],"guaranteeing":[43],"protection":[45],"since":[46],"should":[48],"know":[49],"and":[50,83],"not":[52,75],"only":[53],"who":[54,61],"data,":[58],"but":[59],"also":[60],"derived":[64],"from":[65],"data.":[67],"Actually,":[68],"current":[69],"approaches":[70],"do":[74],"provide":[76],"support":[77],"managing":[79],"propagation":[80],"representing":[85],"user":[86],"This":[88],"paper":[89]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
