{"id":"https://openalex.org/W2030184176","doi":"https://doi.org/10.1145/2536146.2536190","title":"Information security aspects of public software","display_name":"Information security aspects of public software","publication_year":2013,"publication_date":"2013-10-28","ids":{"openalex":"https://openalex.org/W2030184176","doi":"https://doi.org/10.1145/2536146.2536190","mag":"2030184176"},"language":"en","primary_location":{"id":"doi:10.1145/2536146.2536190","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2536146.2536190","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073401474","display_name":"Henrique Frota Soares","orcid":null},"institutions":[{"id":"https://openalex.org/I4210150679","display_name":"Secretaria da Seguran\u00e7a P\u00fablica","ror":"https://ror.org/0591czb14","country_code":"BR","type":"government","lineage":["https://openalex.org/I4210150679"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Henrique Soares","raw_affiliation_strings":["Clavis Seguran\u00e7a da Informa\u00e7\u00e3o, Rio de Janeiro -- RJ -- Brazil"],"affiliations":[{"raw_affiliation_string":"Clavis Seguran\u00e7a da Informa\u00e7\u00e3o, Rio de Janeiro -- RJ -- Brazil","institution_ids":["https://openalex.org/I4210150679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036855105","display_name":"Raphael C. S. Machado","orcid":"https://orcid.org/0000-0003-3339-9735"},"institutions":[{"id":"https://openalex.org/I4210150679","display_name":"Secretaria da Seguran\u00e7a P\u00fablica","ror":"https://ror.org/0591czb14","country_code":"BR","type":"government","lineage":["https://openalex.org/I4210150679"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Raphael Machado","raw_affiliation_strings":["Clavis Seguran\u00e7a da Informa\u00e7\u00e3o, Rio de Janeiro -- RJ -- Brazil"],"affiliations":[{"raw_affiliation_string":"Clavis Seguran\u00e7a da Informa\u00e7\u00e3o, Rio de Janeiro -- RJ -- Brazil","institution_ids":["https://openalex.org/I4210150679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075678751","display_name":"Bruno Salgado","orcid":null},"institutions":[{"id":"https://openalex.org/I4210150679","display_name":"Secretaria da Seguran\u00e7a P\u00fablica","ror":"https://ror.org/0591czb14","country_code":"BR","type":"government","lineage":["https://openalex.org/I4210150679"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Bruno Salgado","raw_affiliation_strings":["Clavis Seguran\u00e7a da Informa\u00e7\u00e3o, Rio de Janeiro -- RJ -- Brazil"],"affiliations":[{"raw_affiliation_string":"Clavis Seguran\u00e7a da Informa\u00e7\u00e3o, Rio de Janeiro -- RJ -- Brazil","institution_ids":["https://openalex.org/I4210150679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008498313","display_name":"Rafael Soares","orcid":"https://orcid.org/0009-0006-5544-9798"},"institutions":[{"id":"https://openalex.org/I4210150679","display_name":"Secretaria da Seguran\u00e7a P\u00fablica","ror":"https://ror.org/0591czb14","country_code":"BR","type":"government","lineage":["https://openalex.org/I4210150679"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Rafael Soares","raw_affiliation_strings":["Clavis Seguran\u00e7a da Informa\u00e7\u00e3o, Rio de Janeiro -- RJ -- Brazil"],"affiliations":[{"raw_affiliation_string":"Clavis Seguran\u00e7a da Informa\u00e7\u00e3o, Rio de Janeiro -- RJ -- Brazil","institution_ids":["https://openalex.org/I4210150679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079513965","display_name":"Jarbas Lopes Cardoso","orcid":null},"institutions":[{"id":"https://openalex.org/I135428043","display_name":"Cisco Systems (United States)","ror":"https://ror.org/03yt1ez60","country_code":"US","type":"company","lineage":["https://openalex.org/I135428043"]},{"id":"https://openalex.org/I4210142333","display_name":"Centro de Tecnologia da Informa\u00e7\u00e3o Renato Archer","ror":"https://ror.org/044nfga98","country_code":"BR","type":"government","lineage":["https://openalex.org/I4210142333","https://openalex.org/I4210151455"]}],"countries":["BR","US"],"is_corresponding":false,"raw_author_name":"Jarbas Lopes Cardoso","raw_affiliation_strings":["CTI Renato Archer, Campinas -- SP -- Brasil","CTI Renato Archer, Campinas -- SP -- Brasil#TAB#"],"affiliations":[{"raw_affiliation_string":"CTI Renato Archer, Campinas -- SP -- Brasil","institution_ids":["https://openalex.org/I4210142333"]},{"raw_affiliation_string":"CTI Renato Archer, Campinas -- SP -- Brasil#TAB#","institution_ids":["https://openalex.org/I135428043"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058870990","display_name":"Luis Felipe Coimbra Costa","orcid":"https://orcid.org/0000-0002-0633-3290"},"institutions":[{"id":"https://openalex.org/I4210091872","display_name":"Ministry of Planning, Budget and Management","ror":"https://ror.org/00bkc1729","country_code":"BR","type":"government","lineage":["https://openalex.org/I2801200668","https://openalex.org/I4210091872"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Luis Felipe Costa","raw_affiliation_strings":["Minist\u00e9rio do Planejamento, Or\u00e7amento e Gest\u00e3o, Secretaria de Log\u00edstica e Tecnologia da Informa\u00e7\u00e3o"],"affiliations":[{"raw_affiliation_string":"Minist\u00e9rio do Planejamento, Or\u00e7amento e Gest\u00e3o, Secretaria de Log\u00edstica e Tecnologia da Informa\u00e7\u00e3o","institution_ids":["https://openalex.org/I4210091872"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5073401474"],"corresponding_institution_ids":["https://openalex.org/I4210150679"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16875401,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"336","last_page":"339"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9465000033378601,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6321195960044861},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5992568135261536},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5548824667930603},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4756222069263458},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.46499648690223694},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.45732370018959045},{"id":"https://openalex.org/keywords/social-software-engineering","display_name":"Social software engineering","score":0.43674755096435547},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.40421435236930847},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3774174451828003},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3322044014930725},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1654881238937378},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07003498077392578}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6321195960044861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5992568135261536},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5548824667930603},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4756222069263458},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.46499648690223694},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.45732370018959045},{"id":"https://openalex.org/C182500959","wikidata":"https://www.wikidata.org/wiki/Q7551380","display_name":"Social software engineering","level":5,"score":0.43674755096435547},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.40421435236930847},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3774174451828003},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3322044014930725},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1654881238937378},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07003498077392578}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2536146.2536190","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2536146.2536190","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W220935706","https://openalex.org/W400660839","https://openalex.org/W2170267084","https://openalex.org/W4236273482"],"related_works":["https://openalex.org/W246089850","https://openalex.org/W2520111506","https://openalex.org/W4312927049","https://openalex.org/W2757929269","https://openalex.org/W39186842","https://openalex.org/W2183585111","https://openalex.org/W2032832792","https://openalex.org/W2167467693","https://openalex.org/W2562660387","https://openalex.org/W4254637097"],"abstract_inverted_index":{"Public":[0,13,26,72,83,156,170,175,227,230],"Software":[1,27,228,231],"can":[2,177],"be":[3,64,178],"defined":[4],"as":[5],"any":[6],"software":[7,51,76,95,165,210],"that":[8,34,93,117,129,154,180],"is":[9,28,36,53,86,130,141,152],"endorsed":[10],"by":[11,20,66,106],"a":[12,54,71,75,126,137,142,164,169,200],"Agent":[14,73,157,176],"and":[15,45,77,101,123,144,148,183,214],"distributed":[16],"for":[17,40,172],"wide":[18,104],"use":[19,105],"the":[21,32,41,67,80,107,110,115,155,159,188,197,206,221,225],"society.":[22],"The":[23],"concept":[24],"of":[25,31,43,56,82,163,199,209,233],"an":[29,37],"outspread":[30],"idea":[33],"\"software\"":[35],"important":[38],"asset":[39],"welfare":[42],"society,":[44,189],"therefore":[46],"providing":[47],"citizens":[48],"with":[49,97,224],"proper":[50],"tools":[52],"task":[55],"public":[57],"interest,":[58],"which":[59],"in":[60,187,191],"some":[61],"cases":[62],"should":[63],"performed":[65],"government":[68],"itself.":[69],"When":[70],"endorses":[74],"gives":[78],"it":[79,151,168],"\"seal\"":[81],"Software,":[84,171],"he":[85],"--":[87,91],"explicitly":[88],"or":[89],"implicitly":[90],"declaring":[92,167],"such":[94,118],"complies":[96],"minimum":[98],"technical":[99],"requirements,":[100],"stimulates":[102],"its":[103,212],"society":[108],"In":[109,136],"present":[111],"paper,":[112],"we":[113,124],"discuss":[114,196],"importance":[116,198],"requirements":[119],"encompasses":[120],"Information":[121,160,215],"Security":[122,161,216],"propose":[125],"validation":[127,202],"model":[128],"strongly":[131],"based":[132],"on":[133],"security":[134,181],"evaluation.":[135],"world":[138],"where":[139],"cyber-crime":[140],"reality":[143],"cyber-war":[145],"becomes":[146],"more":[147,149],"relevant,":[150],"fundamental":[153],"verify":[158],"aspects":[162],"before":[166],"otherwise,":[173],"this":[174],"stimulating":[179],"flaws":[182],"vulnerabilities":[184],"are":[185],"spread":[186],"possibly":[190],"critical":[192],"applications.":[193],"We":[194,218],"additionally":[195],"strong":[201],"procedure":[203],"to":[204],"assure":[205],"appropriate":[207],"behavior":[208],"regarding":[211],"functionalities":[213],"aspects.":[217],"conclude":[219],"describing":[220],"Brazilian":[222],"experience":[223],"\"Brazilian":[226],"Portal\"":[229],"repository":[232],"open-source":[234],"software.":[235]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
