{"id":"https://openalex.org/W2016841547","doi":"https://doi.org/10.1145/2462410.2462420","title":"A storage-efficient cryptography-based access control solution for subversion","display_name":"A storage-efficient cryptography-based access control solution for subversion","publication_year":2013,"publication_date":"2013-06-05","ids":{"openalex":"https://openalex.org/W2016841547","doi":"https://doi.org/10.1145/2462410.2462420","mag":"2016841547"},"language":"en","primary_location":{"id":"doi:10.1145/2462410.2462420","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002179645","display_name":"Dominik Leibenger","orcid":null},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Dominik Leibenger","raw_affiliation_strings":["University of Paderborn, Paderborn, Germany","University of Paderborn,, Paderborn, Germany"],"affiliations":[{"raw_affiliation_string":"University of Paderborn, Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]},{"raw_affiliation_string":"University of Paderborn,, Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062413463","display_name":"Christoph Sorge","orcid":null},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Sorge","raw_affiliation_strings":["University of Paderborn, Paderborn, Germany","University of Paderborn,, Paderborn, Germany"],"affiliations":[{"raw_affiliation_string":"University of Paderborn, Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]},{"raw_affiliation_string":"University of Paderborn,, Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002179645"],"corresponding_institution_ids":["https://openalex.org/I206945453"],"apc_list":null,"apc_paid":null,"fwci":0.9618,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81553276,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7617678642272949},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.656109094619751},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5969123244285583},{"id":"https://openalex.org/keywords/software-versioning","display_name":"Software versioning","score":0.5127521753311157},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5008201599121094},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4834531247615814},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4761490821838379},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4666467010974884},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4508003890514374},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4366755187511444},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4248446822166443},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3324255347251892}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7617678642272949},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.656109094619751},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5969123244285583},{"id":"https://openalex.org/C198140048","wikidata":"https://www.wikidata.org/wiki/Q10859422","display_name":"Software versioning","level":3,"score":0.5127521753311157},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5008201599121094},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4834531247615814},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4761490821838379},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4666467010974884},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4508003890514374},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4366755187511444},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4248446822166443},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3324255347251892}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2462410.2462420","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W100863554","https://openalex.org/W119362848","https://openalex.org/W1493795471","https://openalex.org/W1572593068","https://openalex.org/W1892798954","https://openalex.org/W1979664098","https://openalex.org/W2009191935","https://openalex.org/W2052267638","https://openalex.org/W2056980397","https://openalex.org/W2061194392","https://openalex.org/W2123845384","https://openalex.org/W2148606310","https://openalex.org/W2150182417","https://openalex.org/W2156186849","https://openalex.org/W2271588051","https://openalex.org/W2275561544"],"related_works":["https://openalex.org/W2335638861","https://openalex.org/W3169163307","https://openalex.org/W2949380405","https://openalex.org/W3200904625","https://openalex.org/W3204260572","https://openalex.org/W2774208179","https://openalex.org/W3023042109","https://openalex.org/W2985761010","https://openalex.org/W2411306012","https://openalex.org/W2236177458"],"abstract_inverted_index":{"Version":[0],"control":[1,40],"systems":[2],"are":[3],"widely":[4],"used":[5],"in":[6,29,50],"software":[7],"development":[8],"and":[9,87,91],"document":[10],"management.":[11],"Unfortunately,":[12],"versioning":[13,45],"confidential":[14,47],"files":[15,48],"is":[16,98],"not":[17],"normally":[18],"supported:":[19],"Existing":[20],"solutions":[21],"encrypt":[22],"the":[23,51,83,108],"transport":[24],"channel,":[25],"but":[26],"store":[27],"data":[28],"plaintext":[30],"within":[31],"a":[32,54,62],"repository.":[33],"We":[34,75],"come":[35],"up":[36],"with":[37,100],"an":[38,77],"access":[39],"solution":[41],"that":[42],"allows":[43],"secure":[44,73],"of":[46,53,69,79,93],"even":[49],"presence":[52],"malicious":[55],"server":[56],"administrator.":[57],"Using":[58],"convergent":[59],"encryption":[60],"as":[61],"building":[63],"block,":[64],"we":[65],"enable":[66],"space-efficient":[67],"storage":[68,89,109],"version":[70],"histories":[71],"despite":[72],"encryption.":[74],"describe":[76],"implementation":[78,97],"our":[80],"concept":[81],"for":[82],"Subversion":[84],"(SVN)":[85],"system,":[86],"evaluate":[88],"efficiency":[90],"runtime":[92],"this":[94],"implementation.":[95],"Our":[96],"compatible":[99],"existing":[101],"SVN":[102],"versions":[103],"without":[104],"requiring":[105],"changes":[106],"to":[107],"backend.":[110]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
