{"id":"https://openalex.org/W2057299140","doi":"https://doi.org/10.1145/1161023.1161031","title":"Human-centric network security management","display_name":"Human-centric network security management","publication_year":2006,"publication_date":"2006-09-29","ids":{"openalex":"https://openalex.org/W2057299140","doi":"https://doi.org/10.1145/1161023.1161031","mag":"2057299140"},"language":"en","primary_location":{"id":"doi:10.1145/1161023.1161031","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1161023.1161031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083367917","display_name":"Ghita Kouadri Most\u00e9faoui","orcid":"https://orcid.org/0000-0001-5414-8615"},"institutions":[{"id":"https://openalex.org/I154338468","display_name":"University of Fribourg","ror":"https://ror.org/022fs9h90","country_code":"CH","type":"education","lineage":["https://openalex.org/I154338468"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Ghita Kouadri Most\u00e9faoui","raw_affiliation_strings":["Fribourg University, Switzerland"],"affiliations":[{"raw_affiliation_string":"Fribourg University, Switzerland","institution_ids":["https://openalex.org/I154338468"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078341390","display_name":"Patrick Br\u00e9zillon","orcid":"https://orcid.org/0000-0003-4009-2934"},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Patrick Br\u00e9zillon","raw_affiliation_strings":["Universit\u00e9 Pierre et Marie Curie, France"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Pierre et Marie Curie, France","institution_ids":["https://openalex.org/I39804081"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083367917"],"corresponding_institution_ids":["https://openalex.org/I154338468"],"apc_list":null,"apc_paid":null,"fwci":0.8208,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83464718,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"47","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8528834581375122},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7455955743789673},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7267912030220032},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6535187363624573},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5923062562942505},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.5919849276542664},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5039243102073669},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.5028793215751648},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.49647146463394165},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4686868488788605},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4635566473007202},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.4191974401473999},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3052809238433838},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.09036093950271606}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8528834581375122},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7455955743789673},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7267912030220032},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6535187363624573},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5923062562942505},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.5919849276542664},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5039243102073669},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.5028793215751648},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.49647146463394165},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4686868488788605},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4635566473007202},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.4191974401473999},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3052809238433838},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09036093950271606},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1161023.1161031","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1161023.1161031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W109903335","https://openalex.org/W1516346799","https://openalex.org/W1547802228","https://openalex.org/W2117826841","https://openalex.org/W2125998563","https://openalex.org/W2135550767","https://openalex.org/W2147500904"],"related_works":["https://openalex.org/W4256374004","https://openalex.org/W88610236","https://openalex.org/W4361855476","https://openalex.org/W2062353301","https://openalex.org/W4246428902","https://openalex.org/W833563683","https://openalex.org/W2379320583","https://openalex.org/W2894900144","https://openalex.org/W1829795994","https://openalex.org/W2360685500"],"abstract_inverted_index":{"In":[0,79],"most":[1],"current":[2],"systems,":[3],"managing":[4],"access":[5,39],"to":[6,54,76],"networks":[7],"rely":[8],"on":[9,13],"static":[10],"rules":[11],"implemented":[12],"firewalls":[14],"and":[15,124],"IDS":[16],"(Intrusion":[17],"Detection":[18],"Systems).":[19],"These":[20],"measures":[21],"lack":[22],"a":[23,69,84,108,111],"systematic":[24],"consideration":[25],"of":[26,72,119,122,126],"the":[27,46,51,56,61,131],"context":[28],"within":[29],"which":[30,50],"an":[31],"attack":[32],"occurs.":[33],"Indeed,":[34],"we":[35,82],"argue":[36],"that":[37,87,129],"network":[38],"management":[40,71],"must":[41],"be":[42,105],"enforced":[43],"by":[44,107],"identifying":[45],"sensible":[47,90,99],"contexts":[48,91],"in":[49],"hacker":[52],"tries":[53],"drive":[55],"system":[57],"to,":[58],"before":[59],"performing":[60],"potential":[62],"dangerous":[63],"action.":[64],"Thus,":[65],"our":[66,114],"claim":[67],"concerns":[68],"human-centered":[70],"security":[73,133,137],"as":[74],"opposed":[75],"computing-centered":[77],"security.":[78],"this":[80],"direction,":[81],"propose":[83],"visual":[85],"model":[86],"allows":[88,116],"expressing":[89],"for":[92],"blocking":[93],"hackers":[94],"when":[95],"they":[96],"enter":[97],"such":[98],"contexts.":[100,138],"This":[101],"surveillance":[102],"operation":[103],"could":[104],"lead":[106],"human":[109],"or":[110],"system.":[112],"Additionally,":[113],"solution":[115],"interlocked":[117],"processes":[118],"incremental":[120],"acquisition":[121],"knowledge":[123],"learning":[125],"new":[127,136],"practices":[128],"enriches":[130],"initial":[132],"policy":[134],"with":[135]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
