{"id":"https://openalex.org/W2059181837","doi":"https://doi.org/10.1145/1143549.1143618","title":"An enterprise policy-based security protocol for protecting relational database network objects","display_name":"An enterprise policy-based security protocol for protecting relational database network objects","publication_year":2006,"publication_date":"2006-07-03","ids":{"openalex":"https://openalex.org/W2059181837","doi":"https://doi.org/10.1145/1143549.1143618","mag":"2059181837"},"language":"en","primary_location":{"id":"doi:10.1145/1143549.1143618","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084077872","display_name":"Wassim Itani","orcid":"https://orcid.org/0000-0002-2311-6263"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Wassim Itani","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074578100","display_name":"Ayman Kayssi","orcid":"https://orcid.org/0000-0002-0569-1395"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ayman Kayssi","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060737319","display_name":"Ali Chehab","orcid":"https://orcid.org/0000-0002-1939-2740"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ali Chehab","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084077872"],"corresponding_institution_ids":["https://openalex.org/I98635879"],"apc_list":null,"apc_paid":null,"fwci":1.8805,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.85576728,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"343","last_page":"348"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8084357976913452},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6437762379646301},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.5747761130332947},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5178268551826477},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4871928095817566},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.485258549451828},{"id":"https://openalex.org/keywords/database-tuning","display_name":"Database tuning","score":0.43842872977256775},{"id":"https://openalex.org/keywords/view","display_name":"View","score":0.43339988589286804},{"id":"https://openalex.org/keywords/database-design","display_name":"Database design","score":0.32162749767303467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8084357976913452},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6437762379646301},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.5747761130332947},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5178268551826477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4871928095817566},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.485258549451828},{"id":"https://openalex.org/C107535962","wikidata":"https://www.wikidata.org/wiki/Q2459880","display_name":"Database tuning","level":4,"score":0.43842872977256775},{"id":"https://openalex.org/C54239708","wikidata":"https://www.wikidata.org/wiki/Q1329910","display_name":"View","level":3,"score":0.43339988589286804},{"id":"https://openalex.org/C148840519","wikidata":"https://www.wikidata.org/wiki/Q1049878","display_name":"Database design","level":2,"score":0.32162749767303467}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1143549.1143618","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1520715875","https://openalex.org/W1573231949","https://openalex.org/W1733713784","https://openalex.org/W2021375260","https://openalex.org/W2133632268","https://openalex.org/W2159203458","https://openalex.org/W6633935076","https://openalex.org/W6637297404"],"related_works":["https://openalex.org/W204909595","https://openalex.org/W2129469317","https://openalex.org/W2188578519","https://openalex.org/W2079992169","https://openalex.org/W318284924","https://openalex.org/W979175841","https://openalex.org/W584886505","https://openalex.org/W2391630783","https://openalex.org/W1501195592","https://openalex.org/W2357102580"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3],"present":[4],"ESCORT,":[5],"an":[6,19],"Enterprise,":[7],"policy-baSed":[8],"seCurity":[9],"prOtocol":[10],"for":[11,75,180,236],"protecting":[12],"relational":[13,47,130],"daTabase":[14],"network":[15,35],"objects.":[16],"ESCORT":[17,66,175,202,237],"is":[18,67],"efficient":[20,178],"end-to-end":[21],"security":[22,73,121,157,207],"architecture":[23,125],"that":[24,145],"ensures":[25],"the":[26,38,51,71,85,101,109,113,129,147,151,164,206,212,217,223],"confidentiality":[27],"and":[28,50,64,88,96,98,112,139,142,191,199],"integrity":[29],"of":[30,59,79,103,128,132,208,219,234],"database":[31,48,133,152,171,213,220],"objects":[32,134,221],"flowing":[33],"over":[34],"links":[36],"between":[37],"Enterprise":[39],"Information":[40],"System":[41],"(EIS)":[42],"layer":[43,53],"represented":[44,54],"mainly":[45],"in":[46,150,168,182,211],"servers":[49],"client":[52],"by":[55,116,187,231],"a":[56,76,118,176,228,232],"large":[57],"variety":[58],"devices":[60,195],"with":[61,196,205],"diverse":[62],"capabilities":[63],"resources.":[65],"designed":[68],"to":[69,135,162,240],"provide":[70,136],"suitable":[72],"strength":[74],"wide":[77],"range":[78],"enterprise":[80,184],"application":[81],"configurations":[82],"without":[83],"compromising":[84],"application's":[86],"efficiency":[87],"performance.":[89],"It":[90],"secures":[91],"data":[92,210],"based":[93],"on":[94],"content":[95],"sensitivity":[97],"highly":[99],"surpasses":[100],"performance":[102,229],"bulk":[104,241],"encryption":[105,141,218],"protocols":[106],"such":[107],"as":[108,238],"SSL":[110],"protocol":[111,115],"TLS":[114],"utilizing":[117],"customizable":[119],"policy-based":[120,124],"architecture.":[122],"This":[123,173],"makes":[126,174],"use":[127],"structure":[131],"flexible,":[137],"multi-level,":[138],"fine-grained":[140],"hashing":[143],"methodologies":[144],"target":[146],"field":[148],"level":[149,166],"result":[153],"object.":[154],"Moreover,":[155],"ESCORT's":[156],"policy":[158],"can":[159],"be":[160],"configured":[161],"hit":[163],"byte-":[165],"granularity":[167],"securing":[169],"individual":[170],"fields.":[172],"very":[177],"choice":[179],"operation":[181],"wireless":[183,189,194],"environments":[185],"characterized":[186],"low-bandwidth":[188],"networks":[190],"supporting":[192],"limited-resource":[193],"low":[197],"memory":[198],"processing":[200],"power.":[201],"neither":[203],"deals":[204],"static":[209],"store":[214],"nor":[215],"requires":[216],"at":[222],"storage":[224],"level.":[225],"Results":[226],"show":[227],"gain":[230],"factor":[233],"three":[235],"compared":[239],"encryption.":[242]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
