{"id":"https://openalex.org/W2083092637","doi":"https://doi.org/10.1145/1739041.1739118","title":"BronzeGate","display_name":"BronzeGate","publication_year":2010,"publication_date":"2010-03-16","ids":{"openalex":"https://openalex.org/W2083092637","doi":"https://doi.org/10.1145/1739041.1739118","mag":"2083092637"},"language":"en","primary_location":{"id":"doi:10.1145/1739041.1739118","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1739041.1739118","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Extending Database Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084960877","display_name":"Shenoda Guirguis","orcid":null},"institutions":[{"id":"https://openalex.org/I170201317","display_name":"University of Pittsburgh","ror":"https://ror.org/01an3r305","country_code":"US","type":"education","lineage":["https://openalex.org/I170201317"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shenoda Guirguis","raw_affiliation_strings":["University of Pittsburgh"],"affiliations":[{"raw_affiliation_string":"University of Pittsburgh","institution_ids":["https://openalex.org/I170201317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018930094","display_name":"Alok Pareek","orcid":"https://orcid.org/0009-0006-6386-3761"},"institutions":[{"id":"https://openalex.org/I1342911587","display_name":"Oracle (United States)","ror":"https://ror.org/006c77m33","country_code":"US","type":"company","lineage":["https://openalex.org/I1342911587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alok Pareek","raw_affiliation_strings":["Oracle Product Development"],"affiliations":[{"raw_affiliation_string":"Oracle Product Development","institution_ids":["https://openalex.org/I1342911587"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5084960877"],"corresponding_institution_ids":["https://openalex.org/I170201317"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.12350413,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"5","issue":null,"first_page":"645","last_page":"650"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7108365297317505},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.6781083941459656},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6617234945297241},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6388741731643677},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5580812096595764},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5552538633346558},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.540208101272583},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5353707671165466},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5326613783836365},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.4816252589225769},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4293665289878845},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4243248701095581},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.42305970191955566},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26267245411872864},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.1494942605495453}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7108365297317505},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.6781083941459656},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6617234945297241},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6388741731643677},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5580812096595764},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5552538633346558},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.540208101272583},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5353707671165466},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5326613783836365},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.4816252589225769},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4293665289878845},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4243248701095581},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.42305970191955566},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26267245411872864},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.1494942605495453},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1739041.1739118","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1739041.1739118","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Extending Database Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W22598454","https://openalex.org/W2047370889","https://openalex.org/W2123357677","https://openalex.org/W2131580514","https://openalex.org/W2138130228","https://openalex.org/W2156583236","https://openalex.org/W2168329935","https://openalex.org/W6631628602"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W4385698614","https://openalex.org/W4252558677","https://openalex.org/W2067228051","https://openalex.org/W3125933069"],"abstract_inverted_index":{"Data":[0,24],"privacy":[1,25,32,115,208],"laws":[2,10],"have":[3],"appeared":[4],"recently,":[5],"such":[6,65],"as":[7,29,74,76],"the":[8,16,31,113,125,140,156,175,201,225],"HIPAA":[9],"for":[11,19,159,205,218],"protecting":[12,20,179],"medical":[13,79],"records,":[14],"and":[15,78,84,162],"PCI":[17],"guidelines":[18],"Credit":[21],"Card":[22],"information.":[23],"can":[26,48],"be":[27,49],"defined":[28],"maintaining":[30,210,230],"of":[33,45,64,90,112],"Personal":[34],"Identifiable":[35],"Information":[36],"(PII)":[37],"from":[38,93,124],"unauthorized":[39,94],"accessing.":[40],"PII":[41],"includes":[42],"any":[43],"piece":[44],"data":[46,85,91,114,167,176,207,211,220],"that":[47,110,120],"used":[50,158],"alone,":[51],"or":[52,133,154],"in":[53],"conjunction":[54],"with":[55],"additional":[56],"information,":[57],"to":[58,130,144,150,222],"uniquely":[59],"identify":[60],"an":[61,122],"individual.":[62],"Examples":[63],"information":[66],"include":[67],"national":[68],"identification":[69],"numbers,":[70,73],"credit":[71],"card":[72],"well":[75],"financial":[77],"records.":[80],"Access":[81],"control":[82],"methods":[83],"encryption":[86],"provide":[87],"a":[88],"level":[89],"protection":[92],"access,":[95],"however,":[96],"it":[97,101],"is":[98,184],"not":[99,103],"enough;":[100],"does":[102],"prohibit":[104],"identity":[105],"thefts.":[106],"It":[107],"was":[108],"reported":[109],"70%":[111],"breaches":[116,119],"are":[117,191],"internal":[118],"involve":[121],"employee":[123],"enterprise":[126],"who":[127],"has":[128],"access":[129,145],"some":[131],"training":[132],"testing":[134,161],"database":[135],"replica,":[136],"which":[137],"contains":[138],"all":[139],"PII.":[141],"In":[142,193],"addition":[143],"control,":[146],"we":[147,196],"need":[148],"techniques":[149],"obfuscate":[151,224],"(i.e.,":[152],"mask":[153],"dim)":[155],"datasets":[157],"training,":[160],"analysis":[163],"purposes.":[164],"A":[165],"good":[166],"obfuscation":[168,216],"technique":[169],"would,":[170],"among":[171],"other":[172],"features,":[173],"preserve":[174],"usability":[177],"while":[178,209,229],"its":[180,231],"privacy.":[181],"This":[182],"challenge":[183],"further":[185],"complicated":[186],"when":[187],"real":[188],"time":[189],"requirements":[190],"added.":[192],"this":[194],"paper":[195],"present":[197],"BronzeGate:":[198],"Obfuscated":[199],"GoldenGate,":[200],"GoldenGate's":[202],"real-time":[203],"solution":[204],"transactional":[206],"usability.":[212],"BronzeGate":[213],"utilizes":[214],"different":[215,219],"functions":[217],"types":[221],"securely":[223],"data,":[226],"on":[227],"real-time,":[228],"statistical":[232],"characteristics.":[233]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
