{"id":"https://openalex.org/W2005596446","doi":"https://doi.org/10.1145/1128817.1128821","title":"TRUST","display_name":"TRUST","publication_year":2006,"publication_date":"2006-03-21","ids":{"openalex":"https://openalex.org/W2005596446","doi":"https://doi.org/10.1145/1128817.1128821","mag":"2005596446"},"language":"en","primary_location":{"id":"doi:10.1145/1128817.1128821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103101043","display_name":"S. Shankar Sastry","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shankar Sastry","raw_affiliation_strings":["University of California, Berkeley"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5103101043"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.10905127,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6499000191688538,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6499000191688538,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.6684117913246155},{"id":"https://openalex.org/keywords/outreach","display_name":"Outreach","score":0.6678541898727417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.609137773513794},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.535228431224823},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49642354249954224},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.47095781564712524},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.42064979672431946},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.33909136056900024},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3035084009170532},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.24126935005187988},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.14744210243225098}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.6684117913246155},{"id":"https://openalex.org/C2781400479","wikidata":"https://www.wikidata.org/wiki/Q11640","display_name":"Outreach","level":2,"score":0.6678541898727417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.609137773513794},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.535228431224823},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49642354249954224},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.47095781564712524},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.42064979672431946},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.33909136056900024},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3035084009170532},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.24126935005187988},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.14744210243225098}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1128817.1128821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2360897455","https://openalex.org/W2131575257","https://openalex.org/W2377660959","https://openalex.org/W4251169878","https://openalex.org/W2810589793","https://openalex.org/W2527886746"],"abstract_inverted_index":{"There":[0],"is":[1],"an":[2,52],"alarming":[3],"increase":[4,78],"in":[5,51,113,130,209],"the":[6,19,48,61,116,164,187,197,204,210],"number":[7],"of":[8,29,47,163,166,184,196,212],"virus":[9],"and":[10,21,71,82,122,140,150,172,201],"worm":[11],"attacks,":[12],"phishing":[13,55],"emails,":[14],"identity":[15],"theft":[16],"both":[17,68],"on":[18,80],"internet":[20],"physical":[22,86],"infrastructures.":[23],"Indeed,":[24],"cyberspace":[25],"has":[26,118,206],"several":[27],"features":[28],"lawlessness":[30],"which":[31],"make":[32],"it":[33],"difficult":[34],"for":[35,128],"us":[36],"to":[37,84,101],"mirror":[38],"societal":[39,111],"trust":[40],"relationships":[41],"into":[42],"cyberspace.":[43],"A":[44],"cursory":[45],"examination":[46],"issues":[49],"involved":[50],"issue":[53],"like":[54],"or":[56],"electronic":[57],"voting":[58],"reveals":[59],"that":[60,63,97,175,203],"problems":[62],"we":[64,95,176],"are":[65,99],"confronting":[66],"have":[67,177],"a":[69,72,120,160,182,192],"technology":[70,169,199],"policy":[73,173],"component.":[74],"Further,":[75],"with":[76,142],"our":[77],"dependency":[79],"computing":[81],"communication":[83],"instrument":[85],"infrastructures,":[87],"such":[88],"as":[89,104],"electric":[90],"power,":[91],"water,":[92],"gas,":[93],"etc.":[94],"find":[96],"they":[98],"vulnerable":[100],"information":[102],"attack":[103],"well.":[105],"To":[106],"address":[107],"these":[108],"grand":[109],"challenge":[110],"problem,":[112],"June":[114],"2005,":[115],"NSF":[117],"established":[119],"Science":[121],"Technology":[123],"Center":[124,188,205],"entitled":[125],"\"TRUST:":[126],"Team":[127],"Research":[129],"Ubiquitous":[131],"Secure":[132],"Technologies\"":[133],"between":[134],"Berkeley":[135],"(lead),":[136],"CMU,":[137],"Cornell,":[138],"Stanford":[139],"Vanderbilt":[141],"outreach":[143],"partners":[144],"at":[145,186],"San":[146],"Jose":[147],"State,":[148],"Mills":[149],"Smith":[151],"College.":[152],"In":[153],"this":[154],"talk,":[155],"I":[156,189],"will":[157,190],"give":[158,191],"you":[159],"snap":[161],"shot":[162],"kinds":[165],"research,":[167],"education,":[168],"transfer,":[170],"privacy":[171],"work":[174,185],"underway.":[178],"Rather":[179],"than":[180],"present":[181],"smorgasbord":[183],"selected":[193],"few":[194],"examples":[195],"work,":[198],"transfer":[200],"impact":[202],"already":[207],"had":[208],"area":[211],"network":[213],"embedded":[214],"systems:":[215]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
