{"id":"https://openalex.org/W1967291545","doi":"https://doi.org/10.1145/2047456.2047459","title":"PKI and access control in office environments","display_name":"PKI and access control in office environments","publication_year":2011,"publication_date":"2011-09-30","ids":{"openalex":"https://openalex.org/W1967291545","doi":"https://doi.org/10.1145/2047456.2047459","mag":"1967291545"},"language":"en","primary_location":{"id":"doi:10.1145/2047456.2047459","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2047456.2047459","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 Information Security Curriculum Development Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052392034","display_name":"C. Woodward","orcid":"https://orcid.org/0000-0003-4850-3101"},"institutions":[{"id":"https://openalex.org/I2799342587","display_name":"Erlanger Health System","ror":"https://ror.org/04sz0rs34","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I2799342587"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Christopher Woodward","raw_affiliation_strings":["Baker St. Suite, Erlanger KY"],"affiliations":[{"raw_affiliation_string":"Baker St. Suite, Erlanger KY","institution_ids":["https://openalex.org/I2799342587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086450980","display_name":"Wasim A. Al-Hamdani","orcid":"https://orcid.org/0000-0003-3249-6883"},"institutions":[{"id":"https://openalex.org/I88447708","display_name":"Kentucky State University","ror":"https://ror.org/05xh8jn56","country_code":"US","type":"education","lineage":["https://openalex.org/I88447708"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wasim A. Al-Hamdani","raw_affiliation_strings":["Kentucky State University, East Main, KY","Kentucky State University, East Main, KY#TAB#"],"affiliations":[{"raw_affiliation_string":"Kentucky State University, East Main, KY","institution_ids":["https://openalex.org/I88447708"]},{"raw_affiliation_string":"Kentucky State University, East Main, KY#TAB#","institution_ids":["https://openalex.org/I88447708"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052392034"],"corresponding_institution_ids":["https://openalex.org/I2799342587"],"apc_list":null,"apc_paid":null,"fwci":0.5826,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67484493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"20","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10470","display_name":"Usability and User Interface Design","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10470","display_name":"Usability and User Interface Design","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12481","display_name":"Digital Accessibility for Disabilities","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/3307","display_name":"Human Factors and Ergonomics"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7496764659881592},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6765739917755127},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.60310959815979},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.5673860907554626},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5212810039520264},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.5162701606750488},{"id":"https://openalex.org/keywords/physical-access","display_name":"Physical access","score":0.4543827772140503},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.45197343826293945},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44421958923339844},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.4285052418708801},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4275584816932678},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.41179585456848145},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.27132487297058105},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.264965295791626},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.26381662487983704},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23232311010360718},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1143602728843689}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7496764659881592},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6765739917755127},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.60310959815979},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.5673860907554626},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5212810039520264},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.5162701606750488},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.4543827772140503},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.45197343826293945},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44421958923339844},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.4285052418708801},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4275584816932678},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.41179585456848145},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.27132487297058105},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.264965295791626},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26381662487983704},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23232311010360718},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1143602728843689},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2047456.2047459","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2047456.2047459","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 Information Security Curriculum Development Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W587280059","https://openalex.org/W1485200701"],"related_works":["https://openalex.org/W2404921573","https://openalex.org/W2368931217","https://openalex.org/W2379389012","https://openalex.org/W2744631404","https://openalex.org/W2093477862","https://openalex.org/W3015787821","https://openalex.org/W1519114293","https://openalex.org/W2389213063","https://openalex.org/W2378885848","https://openalex.org/W2382223981"],"abstract_inverted_index":{"One":[0],"of":[1,21,64,75,97,160,180],"the":[2,16,89,103,114,128,139,149,157,166,178,183],"most":[3],"common":[4,38],"problems":[5],"associated":[6],"with":[7,49,169],"network":[8,68,172],"security":[9,35,115,159,167],"is":[10,15,25,43,45,54,109,124,143],"access":[11,41,60],"control.":[12],"Access":[13,57],"control":[14,42,58],"key":[17],"to":[18,61,88,118,173],"all":[19,100],"aspects":[20],"security,":[22],"and":[23,47,52,72,78,105,131,135,175],"it":[24,93],"a":[26,73,95,161],"point":[27],"that":[28,44,80,107],"should":[29],"be":[30,82,86],"well":[31],"considered":[32],"by":[33],"any":[34],"team.":[36],"A":[37],"misconception":[39],"about":[40],"begins":[46],"ends":[48],"locked":[50],"doors,":[51],"this":[53],"sadly":[55],"mistaken.":[56],"limits":[59],"specific":[62],"area":[63],"buildings,":[65],"which":[66],"house":[67],"servers,":[69],"offices,":[70],"terminals,":[71],"host":[74],"other":[76],"devices":[77],"data":[79,181],"must":[81],"protected.":[83],"PKI":[84],"would":[85,155],"useful":[87],"Security":[90],"Professional,":[91],"as":[92],"creates":[94],"Web":[96],"Trust":[98],"between":[99],"users":[101],"on":[102],"network,":[104,164],"when":[106],"trust":[108],"violated,":[110],"only":[111],"then":[112],"does":[113],"team":[116],"have":[117],"jump":[119],"into":[120],"action.":[121],"This":[122,153],"technique":[123],"being":[125],"used":[126],"within":[127,182],"medical":[129],"field":[130],"in":[132,146,148],"many":[133],"research":[134],"development":[136],"departments":[137],"across":[138],"United":[140],"States,":[141],"but":[142],"not":[144],"currently":[145],"place":[147],"typical":[150],"office":[151,163,184],"environment.":[152,185],"method":[154],"enhance":[156],"overall":[158],"given":[162],"provide":[165],"teams":[168],"an":[170],"easier":[171],"maintain,":[174],"speed":[176],"up":[177],"flow":[179]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
