{"id":"https://openalex.org/W2092047635","doi":"https://doi.org/10.1145/1667502.1667504","title":"The role of security in scientific data management","display_name":"The role of security in scientific data management","publication_year":2009,"publication_date":"2009-11-03","ids":{"openalex":"https://openalex.org/W2092047635","doi":"https://doi.org/10.1145/1667502.1667504","mag":"2092047635"},"language":"en","primary_location":{"id":"doi:10.1145/1667502.1667504","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1667502.1667504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061021795","display_name":"Michael Gertz","orcid":"https://orcid.org/0000-0003-4530-6110"},"institutions":[{"id":"https://openalex.org/I223822909","display_name":"Heidelberg University","ror":"https://ror.org/038t36y30","country_code":"DE","type":"education","lineage":["https://openalex.org/I223822909"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Michael Gertz","raw_affiliation_strings":["University of Heidelberg, Heidelberg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Heidelberg, Heidelberg, Germany","institution_ids":["https://openalex.org/I223822909"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5061021795"],"corresponding_institution_ids":["https://openalex.org/I223822909"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18497179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7235605716705322},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.6522135138511658},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6496291756629944},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6002206206321716},{"id":"https://openalex.org/keywords/data-management","display_name":"Data management","score":0.5475999116897583},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.48203906416893005},{"id":"https://openalex.org/keywords/data-virtualization","display_name":"Data virtualization","score":0.41358932852745056},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20442286133766174},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.17771467566490173},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.15998077392578125},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15333399176597595}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7235605716705322},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.6522135138511658},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6496291756629944},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6002206206321716},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.5475999116897583},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.48203906416893005},{"id":"https://openalex.org/C80344994","wikidata":"https://www.wikidata.org/wiki/Q5227369","display_name":"Data virtualization","level":4,"score":0.41358932852745056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20442286133766174},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17771467566490173},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.15998077392578125},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15333399176597595},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1667502.1667504","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1667502.1667504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3198250195","https://openalex.org/W2496730672","https://openalex.org/W2766886300","https://openalex.org/W2735209534","https://openalex.org/W3155741067","https://openalex.org/W4367303911","https://openalex.org/W4233909116","https://openalex.org/W2392387560","https://openalex.org/W4210522788","https://openalex.org/W4315641392"],"abstract_inverted_index":{"In":[0,241],"the":[1,10,26,34,68,78,81,85,99,192,200,253,258,261,296,301,325,338,381,408,424,467,470],"past":[2],"three":[3],"decades,":[4],"research":[5],"and":[6,28,36,52,84,95,114,138,171,175,196,227,238,257,263,279,289,320,329,345,360,365,374,383,387,434,472],"development":[7],"activities":[8,108],"in":[9,21,46,50,72,161,168,190,199,221,231,272,276,286,300,347,349,362,367,419,427,436,444,452,466],"area":[11],"of":[12,70,202,233,260,295,298,303,310,369,385,455,469,474],"data":[13,54,71,106,116,134,183,188,193,203,210,223,236,262,264,278,305,314,321,342,354,373,386,388,393,430,438],"security":[14,19,55,64,92,117,243,299,315,334,343,463],"have":[15,245],"primarily":[16],"concentrated":[17],"on":[18,63,333],"aspects":[20,65,465],"traditional":[22,100,398],"domains,":[23,48],"such":[24,76,163],"as":[25,77],"business":[27],"financial":[29],"sectors,":[30],"and,":[31],"more":[32],"recently,":[33],"medical":[35],"health":[37],"care":[38],"sectors.":[39],"Interestingly,":[40],"compared":[41],"to":[42,67,213,246,270,283,313,379,391],"major":[43],"advancements":[44],"made":[45],"these":[47],"resulting":[49],"comprehensive":[51],"flexible":[53,288],"frameworks,":[56],"there":[57],"is":[58,135,155,179],"only":[59],"little":[60],"work":[61],"focusing":[62],"specific":[66],"management":[69,107,184,464],"natural":[73],"science":[74,164],"domains":[75,101,165,319],"physical":[79,326],"sciences,":[80,83,327],"life":[82],"geosciences.":[86],"Although":[87],"one":[88],"can":[89,102,158,377,416,431],"argue":[90],"that":[91,336],"models,":[93],"techniques,":[94],"architectures":[96],"developed":[97,396],"for":[98,130,172,340,372,397,411,447],"be":[103,159,247,284,417,432],"adopted,":[104],"scientific":[105,133,182,219,304,412,429,475],"posses":[109],"some":[110,461],"characteristics":[111],"where":[112],"important":[113,462],"necessary":[115],"features":[118],"are":[119,123,127,229],"either":[120],"non-existent":[121],"or":[122,143],"poorly":[124],"developed.":[125],"There":[126],"several":[128],"reasons":[129],"this.":[131],"First,":[132],"often":[136,185,216],"complex":[137,187,214,353],"go":[139],"beyond":[140],"simple":[141],"record-":[142],"XML-based":[144],"representations,":[145],"thus":[146],"requiring":[147],"sophisticated":[148],"access":[149,177],"control":[150,178],"models.":[151],"A":[152],"typical":[153],"example":[154],"imagery,":[156],"which":[157,173,191,222,277,414,428,450],"found":[160],"many":[162],"(e.g.,":[166],"GIS-layers":[167],"geoscience":[169],"applications)":[170],"fine-grained":[174],"context-dependent":[176],"non-trivial.":[180],"Second,":[181],"involves":[186],"life-cycles":[189,206],"undergo":[194],"transformations":[195],"enrichment,":[197],"especially":[198],"context":[201,302,468],"integration.":[204],"Such":[205],"range":[207],"from":[208,225,324],"diverse":[209,234],"collection":[211],"methods":[212],"computations,":[215,256],"supported":[217],"by":[218],"workflows,":[220],"collected":[224],"observations":[226],"experiments":[228],"combined":[230,433],"support":[232,368],"longitudinal":[235,437],"analysis":[237,439],"exploration":[239],"tasks.":[240,440],"general,":[242],"mechanisms":[244],"employed":[248],"at":[249,407],"all":[250],"stages,":[251],"covering":[252,307],"data,":[254,413,449],"processes,":[255],"archival":[259],"products.":[265],"All":[266],"this":[267],"typically":[268],"has":[269],"occur":[271,451],"a":[273,287,308,404,420,453],"collaborative":[274],"environment":[275],"computation":[280],"results":[281],"need":[282,339],"shared":[285],"dynamic":[290],"manner.We":[291],"present":[292],"an":[293],"overview":[294],"role":[297],"management,":[306],"number":[309],"issues":[311],"related":[312],"aspects.":[316],"Using":[317],"application":[318,456],"usage":[322],"scenarios":[323],"geosciences":[328],"life-sciences,":[330],"we":[331,357,459],"elaborate":[332],"risks":[335],"indicate":[337],"advanced":[341],"models":[344,364,371],"techniques":[346,366],"particular":[348,445],"E-Science":[350],"settings.":[351],"For":[352],"processing":[355],"scenarios,":[356],"discuss":[358],"opportunities":[359],"challenges":[361],"developing":[363],"authentication":[370],"computations":[375],"researchers":[376],"use":[378],"verify":[380],"correctness":[382],"completeness":[384],"products,":[389],"similar":[390],"authenticated":[392],"publication":[394],"schemes":[395],"relational":[399],"database.":[400],"We":[401],"also":[402],"take":[403],"closer":[405],"look":[406],"inference":[409],"problem":[410],"now":[415],"seen":[418],"new":[421],"light,":[422],"given":[423],"various":[425],"ways":[426],"explored":[435],"This":[441],"aspect":[442],"holds":[443],"true":[446],"geo-referenced":[448],"variety":[454],"domains.":[457],"Finally,":[458],"outline":[460],"stewardship":[471],"preservation":[473],"data.":[476]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
