{"id":"https://openalex.org/W2116752890","doi":"https://doi.org/10.1145/1128817.1128820","title":"Secure information sharing enabled by Trusted Computing and PEI models","display_name":"Secure information sharing enabled by Trusted Computing and PEI models","publication_year":2006,"publication_date":"2006-03-21","ids":{"openalex":"https://openalex.org/W2116752890","doi":"https://doi.org/10.1145/1128817.1128820","mag":"2116752890"},"language":"en","primary_location":{"id":"doi:10.1145/1128817.1128820","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038692973","display_name":"Ravi Sandhu","orcid":"https://orcid.org/0000-0002-3165-1813"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ravi Sandhu","raw_affiliation_strings":["George Mason University and TriCipher Inc"],"affiliations":[{"raw_affiliation_string":"George Mason University and TriCipher Inc","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111910165","display_name":"Kumar Ranganathan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210146682","display_name":"Intel (India)","ror":"https://ror.org/04f2n1245","country_code":"IN","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210146682"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kumar Ranganathan","raw_affiliation_strings":["Intel System Research Center Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Intel System Research Center Bangalore, India","institution_ids":["https://openalex.org/I4210146682"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100711482","display_name":"Xinwen Zhang","orcid":"https://orcid.org/0000-0002-8321-3006"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinwen Zhang","raw_affiliation_strings":["George Mason University"],"affiliations":[{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038692973"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":40.5116,"has_fulltext":false,"cited_by_count":92,"citation_normalized_percentile":{"value":0.99742228,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.724149227142334},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6822597980499268},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5221743583679199},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5106154084205627},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4944462776184082},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.488869845867157},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.4770031273365021},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4677075743675232},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.4472643733024597},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.41306114196777344},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17927446961402893}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.724149227142334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6822597980499268},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5221743583679199},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5106154084205627},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4944462776184082},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.488869845867157},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.4770031273365021},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4677075743675232},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.4472643733024597},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.41306114196777344},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17927446961402893},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1128817.1128820","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.160.9724","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9724","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.list.gmu.edu/confrnc/asiaccs/p2-sandhu.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"},{"id":"https://openalex.org/F4320309029","display_name":"George Mason University","ror":"https://ror.org/02jqj7156"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W36092891","https://openalex.org/W1482030462","https://openalex.org/W1539943797","https://openalex.org/W1746848557","https://openalex.org/W1966825932","https://openalex.org/W1977764760","https://openalex.org/W1984488617","https://openalex.org/W1991895580","https://openalex.org/W1997862012","https://openalex.org/W2007999111","https://openalex.org/W2012849092","https://openalex.org/W2017960359","https://openalex.org/W2021079739","https://openalex.org/W2036790532","https://openalex.org/W2053741629","https://openalex.org/W2068189899","https://openalex.org/W2087080998","https://openalex.org/W2091478576","https://openalex.org/W2094873755","https://openalex.org/W2097404228","https://openalex.org/W2101191741","https://openalex.org/W2111753337","https://openalex.org/W2115175416","https://openalex.org/W2118192163","https://openalex.org/W2128552491","https://openalex.org/W2134296086","https://openalex.org/W2135590247","https://openalex.org/W2137902624","https://openalex.org/W2139275917","https://openalex.org/W2148952798","https://openalex.org/W2149929743","https://openalex.org/W2151909738","https://openalex.org/W2152386079","https://openalex.org/W2154765153","https://openalex.org/W2166602595","https://openalex.org/W2523680761","https://openalex.org/W3167011080","https://openalex.org/W4211218509","https://openalex.org/W4242574860","https://openalex.org/W6796176818"],"related_works":["https://openalex.org/W2389256677","https://openalex.org/W2013502867","https://openalex.org/W2353766896","https://openalex.org/W1986630940","https://openalex.org/W1859642347","https://openalex.org/W2123415650","https://openalex.org/W2063275421","https://openalex.org/W2363630143","https://openalex.org/W4229723392","https://openalex.org/W2097351905"],"abstract_inverted_index":{"The":[0,125,191],"central":[1,126],"goal":[2,45,263],"of":[3,35,71,77,91,95,97,120,128,137,147,154,166,180,185,235,288,308,337],"secure":[4,62,155,188,216,259],"information":[5,52,63,98,156,189,217,260],"sharing":[6,64,99,218],"is":[7,17,131,220,253,267,290],"to":[8,15,18,28,32,132,150,170,255,268,297,320],"\"share":[9],"but":[10],"protect\"":[11],"where":[12],"the":[13,20,30,59,69,72,75,84,88,92,101,109,118,122,135,151,178,206,211,215,250,292,300,311,321,328,338],"motivation":[14],"\"protect\"":[16,123],"safeguard":[19],"sensitive":[21],"content":[22,31],"from":[23],"unauthorized":[24],"disclosure":[25],"(in":[26],"contrast":[27],"protecting":[29],"avoid":[33],"loss":[34],"revenue":[36],"as":[37],"in":[38,83,100,183,264,272,282],"retail":[39],"Digital":[40],"Rights":[41],"Management).":[42],"This":[43,324],"elusive":[44],"has":[46,65,107,115],"been":[47],"a":[48,145,163,305],"major":[49],"driver":[50],"for":[51,54,61,279],"security":[53,103,256],"over":[55],"three":[56,167,192,223,293],"decades.":[57],"Recently,":[58],"need":[60],"dramatically":[66],"increased":[67,117],"with":[68,333],"explosion":[70],"Internet":[73],"and":[74,80,87,173,176,187,201,230,241,276,313,330],"convergence":[76],"outsourcing,":[78],"offshoring":[79],"B2B":[81],"collaboration":[82],"commercial":[85],"arena":[86,275],"real-world":[89],"demonstration":[90],"tragic":[93],"consequences":[94],"lack":[96],"national":[102],"arena.":[104],"As":[105],"technology":[106,143],"made":[108],"\"share\"":[110],"aspect":[111],"ever":[112],"easier":[113],"so":[114],"it":[116],"difficulty":[119],"enforcing":[121],"aspect.":[124],"contribution":[127],"this":[129,159,181,265,273,283],"paper":[130,266,325],"show":[133],"that":[134,291],"emergence":[136],"industrial":[138],"strength":[139],"Trusted":[140],"Computing":[141],"(TC)":[142],"offers":[144],"range":[146],"novel":[148],"solutions":[149],"long-standing":[152],"problem":[153],"sharing.":[157,190],"To":[158],"end":[160],"we":[161,248],"introduce":[162],"new":[164],"framework":[165,182,252],"layered":[168],"models":[169,196,199,203,243],"analyze":[171],"requirements":[172],"develop":[174],"solutions,":[175],"demonstrate":[177,269],"application":[179,271],"context":[184],"TC":[186],"layers":[193,294,332],"are":[194],"policy":[195,212,237,312,329],"(topmost),":[197],"enforcement":[198,240,314,331],"(middle),":[200],"implementation":[202,242,322,339],"(bottom).":[204],"Hence":[205],"name":[207],"PEI":[208,251,289],"models.":[209],"At":[210],"model":[213],"layer":[214],"space":[219],"divided":[221],"into":[222],"categories":[224,238],"called":[225],"password":[226],"based,":[227,229],"device":[228],"credential":[231],"based.":[232],"For":[233],"each":[234],"these":[236],"various":[239],"can":[244],"be":[245],"developed.":[246],"While":[247],"believe":[249],"relevant":[254],"problems":[257],"beyond":[258],"sharing,":[261],"our":[262],"its":[270],"particular":[274],"identify":[277],"questions":[278],"future":[280],"research":[281],"context.":[284],"An":[285],"essential":[286],"benefit":[287],"allow":[295],"us":[296],"focus":[298],"on":[299,327],"more":[301],"important":[302],"issues":[303],"at":[304,310],"higher":[306],"level":[307],"abstraction":[309],"layers,":[315],"while":[316],"leaving":[317],"deep":[318],"detail":[319],"layer.":[323,340],"focusses":[326],"only":[334],"passing":[335],"mention":[336]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":9},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
