{"id":"https://openalex.org/W1883554934","doi":"https://doi.org/10.1145/2657460.2657464","title":"Security &amp; privacy column","display_name":"Security &amp; privacy column","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W1883554934","doi":"https://doi.org/10.1145/2657460.2657464","mag":"1883554934"},"language":"en","primary_location":{"id":"doi:10.1145/2657460.2657464","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2657460.2657464","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2657460.2657464?download=true","source":{"id":"https://openalex.org/S4210221220","display_name":"ACM SIGLOG News","issn_l":"2372-3491","issn":["2372-3491"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGLOG News","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/2657460.2657464?download=true","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059351004","display_name":"Matteo Maffei","orcid":"https://orcid.org/0000-0001-8061-1685"},"institutions":[{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Matteo Maffei","raw_affiliation_strings":["Saarland University","saarland university"],"affiliations":[{"raw_affiliation_string":"Saarland University","institution_ids":["https://openalex.org/I91712215"]},{"raw_affiliation_string":"saarland university","institution_ids":["https://openalex.org/I91712215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5059351004"],"corresponding_institution_ids":["https://openalex.org/I91712215"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14155427,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":"1","first_page":"6","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6401755213737488},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5818697810173035},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5252522826194763},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5188401937484741},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.483566015958786},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4640781879425049},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.46357184648513794},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.33397355675697327}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6401755213737488},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5818697810173035},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5252522826194763},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5188401937484741},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.483566015958786},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4640781879425049},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.46357184648513794},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.33397355675697327},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2657460.2657464","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2657460.2657464","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2657460.2657464?download=true","source":{"id":"https://openalex.org/S4210221220","display_name":"ACM SIGLOG News","issn_l":"2372-3491","issn":["2372-3491"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGLOG News","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/2657460.2657464","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2657460.2657464","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2657460.2657464?download=true","source":{"id":"https://openalex.org/S4210221220","display_name":"ACM SIGLOG News","issn_l":"2372-3491","issn":["2372-3491"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGLOG News","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1883554934.pdf","grobid_xml":"https://content.openalex.org/works/W1883554934.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2531442779","https://openalex.org/W2101582069","https://openalex.org/W2994243660","https://openalex.org/W3091445850","https://openalex.org/W2675231964","https://openalex.org/W2118333568","https://openalex.org/W2747442008","https://openalex.org/W2127814706","https://openalex.org/W315296216","https://openalex.org/W2549995367"],"abstract_inverted_index":{"Security":[0],"and":[1,35,42,64,83,89,106,109,130,134,143,164,179,187,207,215,229,237,263,273,293,309],"data":[2,116,307],"privacy":[3,93,135,216,230],"play":[4],"today":[5],"a":[6,27,49,56,81,137,161,194,235,248],"central":[7],"role":[8],"in":[9,117,174,217],"the":[10,23,30,59,97,102,112,118,124,128,189,218,222,233,253,281,298],"digital":[11,119,125,219],"society.":[12,220],"For":[13],"instance,":[14,302],"cyber":[15,90],"attacks":[16],"against":[17],"nuclear":[18],"power":[19],"plants,":[20],"such":[21,257],"as":[22,76,78,258],"Stuxnet":[24],"virus,":[25],"shed":[26],"light":[28],"on":[29,37,69,197,277],"disruptive":[31],"potential":[32],"of":[33,52,62,87,99,114,123,132,152,191,199,224,250,255,270],"cyberwarfare":[34],"cyberterrorism":[36],"our":[38],"society,":[39],"pushing":[40],"governments":[41],"industries":[43],"to":[44,47,148,185,204,285],"make":[45],"plans":[46],"protect":[48],"large":[50],"spectrum":[51],"critical":[53,110],"sectors.":[54],"As":[55],"further":[57],"example,":[58],"widespread":[60],"adoption":[61],"web":[63,303],"mobile":[65,305],"technologies":[66],"for":[67,155,210,227,301],"carrying":[68],"commercial":[70],"activities":[71],"has":[72,172,243,268],"made":[73],"client":[74],"devices":[75],"well":[77],"service":[79],"providers":[80],"profitable,":[82],"unfortunately":[84],"frequent,":[85],"target":[86],"hackers":[88],"criminals.":[91],"Finally,":[92],"scandals":[94],"systematically":[95],"gain":[96],"headlines":[98],"newspapers,":[100],"making":[101],"public":[103],"opinion":[104],"more":[105,107],"conscious":[108],"about":[111,213],"exposure":[113],"sensitive":[115],"world.":[120],"The":[121,169],"complexity":[122],"ecosystem":[126],"makes":[127],"definition":[129],"enforcement":[131],"security":[133,214,228],"properties":[136],"formidable":[138],"challenge,":[139],"which":[140,200,242],"manual":[141],"design":[142,223],"analysis":[144],"techniques":[145],"proved":[146,231],"inadequate":[147],"tackle.":[149],"This":[150,265],"state":[151],"affairs":[153],"calls":[154],"rigorous":[156],"approaches,":[157],"backed":[158],"up":[159],"by":[160,166],"formal":[162,225],"reasoning":[163,212],"supported":[165],"mechanized":[167],"procedures.":[168],"scientific":[170],"research":[171,240,266],"shown,":[173],"particular,":[175],"how":[176],"logical":[177],"frameworks":[178],"program":[180],"verification":[181],"techniques,":[182],"originally":[183],"developed":[184],"define":[186],"certify":[188],"correctness":[190],"programs,":[192],"constitute":[193],"solid":[195],"basis":[196],"top":[198],"it":[201],"is":[202],"possible":[203],"build":[205],"powerful":[206],"innovative":[208],"tools":[209],"rigorously":[211],"Indeed,":[221],"methods":[226],"over":[232],"years":[234],"flowering":[236],"extraordinarily":[238],"active":[239],"area,":[241],"seen":[244],"exciting":[245],"contributions":[246],"from":[247],"variety":[249],"disciplines":[251],"at":[252],"core":[254],"SIGLOG,":[256],"logic,":[259],"semantics,":[260],"automated":[261],"deduction,":[262],"verification.":[264],"field":[267],"tons":[269],"success":[271],"stories":[272],"many":[274],"open":[275],"challenges":[276],"its":[278],"horizon:":[279],"among":[280],"former,":[282],"I":[283],"like":[284],"mention":[286],"cryptographic":[287],"protocol":[288],"analysis,":[289],"access":[290],"control":[291],"models,":[292],"information":[294],"flow":[295],"security,":[296,304,306],"while":[297],"latter":[299],"include,":[300],"privacy,":[308],"cybersecurity.":[310]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
