{"id":"https://openalex.org/W4249536876","doi":"https://doi.org/10.1145/1867635","title":"Proceedings of the fifth ACM workshop on Scalable trusted computing","display_name":"Proceedings of the fifth ACM workshop on Scalable trusted computing","publication_year":2010,"publication_date":"2010-10-04","ids":{"openalex":"https://openalex.org/W4249536876","doi":"https://doi.org/10.1145/1867635"},"language":"en","primary_location":{"id":"doi:10.1145/1867635","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1867635","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.8468000292778015,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.8468000292778015,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.8127999901771545,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.7734373807907104},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7470622062683105},{"id":"https://openalex.org/keywords/ibm","display_name":"IBM","score":0.7003869414329529},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.678165853023529},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5450080633163452},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4928474426269531},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3693162202835083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30161792039871216},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2520800232887268},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2152758240699768}],"concepts":[{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.7734373807907104},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7470622062683105},{"id":"https://openalex.org/C70388272","wikidata":"https://www.wikidata.org/wiki/Q5968558","display_name":"IBM","level":2,"score":0.7003869414329529},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.678165853023529},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5450080633163452},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4928474426269531},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3693162202835083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30161792039871216},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2520800232887268},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2152758240699768},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1867635","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1867635","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3126131865","https://openalex.org/W2044344400","https://openalex.org/W4253186488","https://openalex.org/W1996938127","https://openalex.org/W2083611981","https://openalex.org/W2043380045","https://openalex.org/W4231814374","https://openalex.org/W2099557065","https://openalex.org/W2024908920","https://openalex.org/W1984382557"],"abstract_inverted_index":{"The":[0,72,102],"fifth":[1],"ACM":[2],"workshop":[3],"on":[4,19,116,122],"Scalable":[5],"Trusted":[6],"Computing":[7],"(STC)":[8],"continues":[9],"in":[10,25,32,111],"the":[11,126,142,155],"footsteps":[12],"of":[13,22,40,47,88],"past":[14],"STC":[15,49],"workshops.":[16],"It":[17],"focuses":[18],"fundamental":[20],"technologies":[21],"trusted":[23,96,99],"computing":[24,97],"a":[26,55,86],"broad":[27],"sense":[28],"and":[29,42,65,69,81,94,119,131],"its":[30],"applications":[31],"large-scale":[33],"systems":[34,118],"--":[35],"those":[36],"involving":[37],"large":[38],"number":[39],"users":[41],"parties":[43],"with":[44],"varying":[45],"degrees":[46],"trust.":[48],"is":[50],"intended":[51],"to":[52,63,98],"serve":[53],"as":[54,59,61],"forum":[56],"for":[57,152],"researchers":[58],"well":[60],"practitioners":[62],"disseminate":[64],"discuss":[66],"recent":[67],"advances":[68],"emerging":[70],"issues.":[71],"program":[73,127],"committee":[74],"accepted":[75],"five":[76],"full":[77],"papers":[78,84,107],"(29%":[79],"acceptance)":[80],"four":[82],"short":[83],"covering":[85],"variety":[87],"topics":[89],"ranging":[90],"from":[91],"hardware":[92],"security":[93],"mobile":[95],"virtual":[100],"domains.":[101],"proceedings":[103],"include":[104],"two":[105,129],"invited":[106],"by":[108],"leading":[109],"experts":[110],"related":[112],"fields:":[113],"Gernot":[114],"Heiser":[115],"trustworthy":[117],"David":[120],"Lie":[121],"virtualization.":[123],"In":[124],"addition,":[125],"features":[128],"wellestablished":[130],"well-known":[132],"keynote":[133],"addresses:":[134],"Paul":[135],"van":[136],"Oorschot":[137],"(Carleton":[138],"University,":[139],"Canada)":[140],"delivers":[141,154],"academic":[143],"keynote,":[144],"while":[145],"Michael":[146],"Waidner":[147],"(IBM":[148],"Chief":[149],"Technology":[150],"Officer":[151],"Security)":[153],"industrial":[156],"keynote.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
