{"id":"https://openalex.org/W1970041192","doi":"https://doi.org/10.1145/1478462.1478493","title":"Fast \"infinite-key\" privacy transformation for resource-sharing systems","display_name":"Fast \"infinite-key\" privacy transformation for resource-sharing systems","publication_year":1970,"publication_date":"1970-01-01","ids":{"openalex":"https://openalex.org/W1970041192","doi":"https://doi.org/10.1145/1478462.1478493","mag":"1970041192"},"language":"en","primary_location":{"id":"doi:10.1145/1478462.1478493","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1478462.1478493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the November 17-19, 1970, fall joint computer conference on - AFIPS '70 (Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054610664","display_name":"John M. Carroll","orcid":"https://orcid.org/0000-0001-5189-337X"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"J. M. Carroll","raw_affiliation_strings":["The University of Western Ontario, London, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"The University of Western Ontario, London, Ontario, Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014561372","display_name":"P. M. McLelland","orcid":null},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"P. M. McLelland","raw_affiliation_strings":["The University of Western Ontario, London, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"The University of Western Ontario, London, Ontario, Canada","institution_ids":["https://openalex.org/I125749732"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054610664"],"corresponding_institution_ids":["https://openalex.org/I125749732"],"apc_list":null,"apc_paid":null,"fwci":23.4894,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.99118834,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"223","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7336552143096924},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7121070623397827},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.6777727603912354},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5748730897903442},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.5136120319366455},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49902844429016113},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49167853593826294},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.48320138454437256},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28520530462265015},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17038944363594055},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15709897875785828}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7336552143096924},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7121070623397827},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.6777727603912354},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5748730897903442},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.5136120319366455},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49902844429016113},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49167853593826294},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.48320138454437256},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28520530462265015},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17038944363594055},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15709897875785828},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1478462.1478493","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1478462.1478493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the November 17-19, 1970, fall joint computer conference on - AFIPS '70 (Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1971781329","https://openalex.org/W2004046270","https://openalex.org/W2010687459","https://openalex.org/W2025467229","https://openalex.org/W2077972399","https://openalex.org/W2087703546","https://openalex.org/W2105806064","https://openalex.org/W2117064901","https://openalex.org/W2123533505","https://openalex.org/W2145328936","https://openalex.org/W2157018930"],"related_works":["https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W2730112582","https://openalex.org/W2110696645","https://openalex.org/W2358580169","https://openalex.org/W2351310358","https://openalex.org/W2364109809","https://openalex.org/W2388204182","https://openalex.org/W2372939722","https://openalex.org/W2360837505"],"abstract_inverted_index":{"In":[0],"all":[1],"systems":[2],"affording":[3],"real-time":[4],"multiple":[5],"access":[6],"to":[7,18,23,28,81,107],"shared":[8],"computing":[9],"resources,":[10],"there":[11,32],"exists":[12],"the":[13,34,42,66,68,71,86,91,95],"risk":[14,36],"that":[15,37],"information":[16,49,74],"belonging":[17],"one":[19],"user,":[20],"may,":[21],"contrary":[22],"his":[24],"intent,":[25],"become":[26],"available":[27],"other":[29],"users,":[30],"and":[31,44,57,98,103],"is":[33,62,94],"additional":[35],"outside":[38],"agencies":[39],"may":[40],"infiltrate":[41],"system":[43],"obtain":[45],"information.":[46],"Protection":[47],"of":[48,65,73,90,100,110],"within":[50],"central":[51],"processors,":[52],"auxiliary":[53],"storage":[54,60],"(disk,":[55],"drum),":[56],"on-site":[58],"bulk":[59],"(tape),":[61],"a":[63],"responsibility":[64,69],"system;":[67],"for":[70],"protection":[72],"in":[75],"external":[76],"communication":[77],"links":[78],"seems":[79],"presently":[80],"devolve":[82],"by":[83],"default":[84],"upon":[85],"user.":[87],"The":[88],"crux":[89],"privacy":[92],"issue":[93],"design,":[96],"evaluation,":[97],"implementation":[99],"hardware,":[101],"software,":[102],"operating":[104],"procedures":[105],"contrived":[106],"discharge":[108],"both":[109],"these":[111],"responsibilities.":[112]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
