{"id":"https://openalex.org/W2141062967","doi":"https://doi.org/10.1145/1626195.1626259","title":"<i>Notice of Removal February 26, 2026:</i> A semantic-based access control mechanism using semantic technologies","display_name":"<i>Notice of Removal February 26, 2026:</i> A semantic-based access control mechanism using semantic technologies","publication_year":2009,"publication_date":"2009-10-06","ids":{"openalex":"https://openalex.org/W2141062967","doi":"https://doi.org/10.1145/1626195.1626259","mag":"2141062967"},"language":"en","primary_location":{"id":"doi:10.1145/1626195.1626259","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1626195.1626259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd international conference on Security of information and networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086967516","display_name":"Moussa Ehsan","orcid":"https://orcid.org/0000-0002-0016-8343"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Moussa Amir Ehsan","raw_affiliation_strings":["Sharif University of Technology, Tehran, Iran","Sharif University of Technology , Tehran , Iran"],"affiliations":[{"raw_affiliation_string":"Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Sharif University of Technology , Tehran , Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021345633","display_name":"Morteza Amini","orcid":"https://orcid.org/0000-0001-7269-779X"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Morteza Amini","raw_affiliation_strings":["Sharif University of Technology, Tehran, Iran","Sharif University of Technology , Tehran , Iran"],"affiliations":[{"raw_affiliation_string":"Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Sharif University of Technology , Tehran , Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073154692","display_name":"Rasool Jalili","orcid":"https://orcid.org/0000-0002-9853-1955"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Rasool Jalili","raw_affiliation_strings":["Sharif University of Technology, Tehran, Iran","Sharif University of Technology , Tehran , Iran"],"affiliations":[{"raw_affiliation_string":"Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Sharif University of Technology , Tehran , Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086967516"],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":0.9768,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.86419521,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"258","last_page":"267"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8623601794242859},{"id":"https://openalex.org/keywords/semantic-web","display_name":"Semantic Web","score":0.7154406905174255},{"id":"https://openalex.org/keywords/semantic-analytics","display_name":"Semantic analytics","score":0.701980471611023},{"id":"https://openalex.org/keywords/semantic-grid","display_name":"Semantic grid","score":0.6929468512535095},{"id":"https://openalex.org/keywords/social-semantic-web","display_name":"Social Semantic Web","score":0.6627576351165771},{"id":"https://openalex.org/keywords/semantic-web-stack","display_name":"Semantic Web Stack","score":0.6049494743347168},{"id":"https://openalex.org/keywords/semantic-technology","display_name":"Semantic technology","score":0.5341379046440125},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.5214366316795349},{"id":"https://openalex.org/keywords/owl-s","display_name":"OWL-S","score":0.5164923667907715},{"id":"https://openalex.org/keywords/semantic-web-rule-language","display_name":"Semantic Web Rule Language","score":0.5131950974464417},{"id":"https://openalex.org/keywords/semantic-computing","display_name":"Semantic computing","score":0.5045379400253296},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4470481872558594},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.44130030274391174},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.43099308013916016},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41852283477783203},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3757827579975128},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1247648298740387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8623601794242859},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.7154406905174255},{"id":"https://openalex.org/C148792806","wikidata":"https://www.wikidata.org/wiki/Q7449046","display_name":"Semantic analytics","level":4,"score":0.701980471611023},{"id":"https://openalex.org/C103692084","wikidata":"https://www.wikidata.org/wiki/Q1765824","display_name":"Semantic grid","level":3,"score":0.6929468512535095},{"id":"https://openalex.org/C534406577","wikidata":"https://www.wikidata.org/wiki/Q7550843","display_name":"Social Semantic Web","level":3,"score":0.6627576351165771},{"id":"https://openalex.org/C167379230","wikidata":"https://www.wikidata.org/wiki/Q1026884","display_name":"Semantic Web Stack","level":3,"score":0.6049494743347168},{"id":"https://openalex.org/C6881194","wikidata":"https://www.wikidata.org/wiki/Q7449091","display_name":"Semantic technology","level":4,"score":0.5341379046440125},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.5214366316795349},{"id":"https://openalex.org/C50382505","wikidata":"https://www.wikidata.org/wiki/Q2553356","display_name":"OWL-S","level":4,"score":0.5164923667907715},{"id":"https://openalex.org/C71695816","wikidata":"https://www.wikidata.org/wiki/Q3478367","display_name":"Semantic Web Rule Language","level":5,"score":0.5131950974464417},{"id":"https://openalex.org/C511149849","wikidata":"https://www.wikidata.org/wiki/Q7449051","display_name":"Semantic computing","level":3,"score":0.5045379400253296},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4470481872558594},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.44130030274391174},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.43099308013916016},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41852283477783203},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3757827579975128},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1247648298740387},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1626195.1626259","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1626195.1626259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd international conference on Security of information and networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W97866617","https://openalex.org/W127848418","https://openalex.org/W187959817","https://openalex.org/W1485734161","https://openalex.org/W1495891279","https://openalex.org/W1582965336","https://openalex.org/W1586967724","https://openalex.org/W1859131989","https://openalex.org/W1964211122","https://openalex.org/W2005025525","https://openalex.org/W2108873398","https://openalex.org/W2134713066","https://openalex.org/W2164441047","https://openalex.org/W2406158806"],"related_works":["https://openalex.org/W2280628760","https://openalex.org/W2495387725","https://openalex.org/W4229736327","https://openalex.org/W4243025272","https://openalex.org/W2387349142","https://openalex.org/W2369014150","https://openalex.org/W2084998560","https://openalex.org/W2108020129","https://openalex.org/W2391080608","https://openalex.org/W2382508873"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,98,106],"overcome":[3],"the":[4,7,42,47,58,71,74,100,114,123,128,131],"shortcomings":[5],"of":[6,130,137],"recent":[8],"frameworks":[9],"and":[10,22,64,88],"mechanisms":[11],"for":[12,32],"semantic-based":[13,28],"access":[14,29,36],"control,":[15],"this":[16],"paper":[17,126],"presents":[18],"a":[19,27,89,93],"semantic-based,":[20],"context-aware,":[21],"multi-domain":[23],"enabled":[24],"framework":[25,38,56,75],"implementing":[26],"control":[30,37],"mechanism":[31,110,133],"Semantic":[33,59,77],"Web.":[34],"The":[35,55,109,125],"is":[39,97,105,111],"based":[40],"on":[41],"MA(DL)2":[43,72],"model,":[44,73],"which":[45,83,117],"takes":[46],"semantic":[48,115],"relationships":[49],"among":[50],"different":[51],"entities":[52],"into":[53],"account.":[54],"handles":[57],"Web":[60,78],"context":[61],"by":[62],"classifying":[63],"representing":[65],"it":[66,119],"through":[67,134],"an":[68,86,138],"ontology.":[69],"Considering":[70],"assumes":[76],"having":[79],"some":[80,135],"overlapped":[81],"domains,":[82],"each":[84],"contains":[85],"authority":[87,95],"security":[90],"agent.":[91],"As":[92],"domain":[94,101],"responsibility":[96],"specify":[99],"policies,":[102],"its":[103],"agent":[104],"enforce":[107],"them.":[108],"designed":[112,132],"using":[113],"technologies,":[116],"make":[118],"fully":[120],"consistent":[121],"with":[122],"environment.":[124],"clarifies":[127],"usability":[129],"examples":[136],"elections":[139],"system":[140],"case":[141],"study.":[142]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2026-02-27T06:17:20.405678","created_date":"2025-10-10T00:00:00"}
