{"id":"https://openalex.org/W2074691980","doi":"https://doi.org/10.1145/2037252.2037274","title":"Contextualizing security for digital long-term preservation","display_name":"Contextualizing security for digital long-term preservation","publication_year":2011,"publication_date":"2011-09-29","ids":{"openalex":"https://openalex.org/W2074691980","doi":"https://doi.org/10.1145/2037252.2037274","mag":"2074691980"},"language":"en","primary_location":{"id":"doi:10.1145/2037252.2037274","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2037252.2037274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047946128","display_name":"Kun Qian","orcid":"https://orcid.org/0000-0003-2702-9500"},"institutions":[{"id":"https://openalex.org/I95793202","display_name":"Otto-von-Guericke University Magdeburg","ror":"https://ror.org/00ggpsq73","country_code":"DE","type":"education","lineage":["https://openalex.org/I95793202"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Kun Qian","raw_affiliation_strings":["Otto-von-Guericke University Magdeburg, Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"Otto-von-Guericke University Magdeburg, Magdeburg, Germany","institution_ids":["https://openalex.org/I95793202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040941561","display_name":"Maik Schott","orcid":null},"institutions":[{"id":"https://openalex.org/I95793202","display_name":"Otto-von-Guericke University Magdeburg","ror":"https://ror.org/00ggpsq73","country_code":"DE","type":"education","lineage":["https://openalex.org/I95793202"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maik Schott","raw_affiliation_strings":["Otto-von-Guericke University Magdeburg, Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"Otto-von-Guericke University Magdeburg, Magdeburg, Germany","institution_ids":["https://openalex.org/I95793202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062570664","display_name":"Christian Kraetzer","orcid":"https://orcid.org/0000-0002-0138-4638"},"institutions":[{"id":"https://openalex.org/I95793202","display_name":"Otto-von-Guericke University Magdeburg","ror":"https://ror.org/00ggpsq73","country_code":"DE","type":"education","lineage":["https://openalex.org/I95793202"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christian Kraetzer","raw_affiliation_strings":["Otto-von-Guericke University Magdeburg, Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"Otto-von-Guericke University Magdeburg, Magdeburg, Germany","institution_ids":["https://openalex.org/I95793202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086429143","display_name":"Matthias Hemmje","orcid":"https://orcid.org/0000-0001-8293-2802"},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthias Hemmje","raw_affiliation_strings":["University of Hagen, Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"University of Hagen, Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047946128"],"corresponding_institution_ids":["https://openalex.org/I95793202"],"apc_list":null,"apc_paid":null,"fwci":0.3501,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62975983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"14721","issue":null,"first_page":"115","last_page":"120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-preservation","display_name":"Digital preservation","score":0.7740631103515625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.721245527267456},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5856966972351074},{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.5781981945037842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5442131161689758},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5314565896987915},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4597606360912323},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4351278245449066},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4245086908340454},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.41061824560165405},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1784566044807434}],"concepts":[{"id":"https://openalex.org/C2778674798","wikidata":"https://www.wikidata.org/wiki/Q632897","display_name":"Digital preservation","level":2,"score":0.7740631103515625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.721245527267456},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5856966972351074},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.5781981945037842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5442131161689758},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5314565896987915},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4597606360912323},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4351278245449066},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4245086908340454},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.41061824560165405},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1784566044807434},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2037252.2037274","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2037252.2037274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1552063456","https://openalex.org/W1562643504","https://openalex.org/W1574222638","https://openalex.org/W1975244837","https://openalex.org/W1977178568","https://openalex.org/W1994949697","https://openalex.org/W1998208223","https://openalex.org/W2000667443","https://openalex.org/W2032933169","https://openalex.org/W2038425697","https://openalex.org/W2077092580","https://openalex.org/W2098609353","https://openalex.org/W2116817369","https://openalex.org/W2131000182","https://openalex.org/W2132819770","https://openalex.org/W2142233683","https://openalex.org/W2152505375","https://openalex.org/W2154911336","https://openalex.org/W2170270083","https://openalex.org/W2585105539"],"related_works":["https://openalex.org/W2188814192","https://openalex.org/W2114705216","https://openalex.org/W3094039898","https://openalex.org/W2151761340","https://openalex.org/W1555133226","https://openalex.org/W2173238669","https://openalex.org/W1519114293","https://openalex.org/W2130339907","https://openalex.org/W2188404590","https://openalex.org/W2020340787"],"abstract_inverted_index":{"Nowadays":[0],"a":[1,95,107,143],"growing":[2],"amount":[3],"of":[4,51,86],"information":[5],"not":[6],"only":[7],"exists":[8],"in":[9,59,72],"digital":[10],"form":[11],"but":[12],"was":[13],"actually":[14],"born-digital.":[15],"Digital":[16,35],"long-term":[17,52,108],"preservation":[18,53,74],"becomes":[19],"continuously":[20],"important":[21],"and":[22,28,38,117,129,147,159],"is":[23,54,67],"tackled":[24],"by":[25,94,119],"several":[26],"international":[27],"national":[29],"projects":[30],"like":[31],"the":[32,42,55,73,82,87,131,157],"US":[33],"National":[34],"Information":[36,90],"Infrastructure":[37],"Preservation":[39],"Program":[40],"or":[41],"EU":[43],"FP7":[44],"SHAMAN":[45],"Integrated":[46],"Project.":[47],"The":[48,111],"very":[49],"essence":[50],"preserved":[56],"data,":[57],"which":[58,66],"turn":[60,125],"requires":[61],"an":[62,121,152],"appropriate":[63],"security":[64,83,99],"model,":[65],"so":[68],"far":[69],"often":[70],"neglected":[71],"community.":[75],"To":[76],"address":[77],"this":[78,136],"problem,":[79],"we":[80,138],"extend":[81],"relevant":[84],"parts":[85],"Open":[88],"Archival":[89],"System":[91],"(OAIS)":[92],"standard":[93],"concept":[96],"for":[97,106],"hierarchical":[98],"policy":[100],"development":[101],"based":[102],"on":[103],"given":[104],"use-cases":[105],"archival":[109],"system.":[110],"corresponding":[112,144],"policies":[113,150],"are":[114,133],"then":[115,130],"distributed":[116],"implemented":[118],"applying":[120],"iterative":[122,153],"procedure":[123],"to":[124,127,141,155],"them":[126],"rules,":[128],"rules":[132],"enforced.":[134],"In":[135],"paper":[137],"describe":[139],"how":[140],"construct":[142],"context":[145],"model":[146],"derive":[148],"such":[149],"using":[151],"approach":[154],"assure":[156],"system":[158],"data":[160],"security.":[161]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
