{"id":"https://openalex.org/W2547318885","doi":"https://doi.org/10.1145/2908446.2908502","title":"Minimal privacy disclosure for Accessing Web services","display_name":"Minimal privacy disclosure for Accessing Web services","publication_year":2016,"publication_date":"2016-05-09","ids":{"openalex":"https://openalex.org/W2547318885","doi":"https://doi.org/10.1145/2908446.2908502","mag":"2547318885"},"language":"en","primary_location":{"id":"doi:10.1145/2908446.2908502","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2908446.2908502","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Informatics and Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048831016","display_name":"Ali Meligy","orcid":null},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Ali Meligy","raw_affiliation_strings":["Math and Computer Science Department, Faculty of Science, Menoufia University, Egypt"],"affiliations":[{"raw_affiliation_string":"Math and Computer Science Department, Faculty of Science, Menoufia University, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081419024","display_name":"Emad Elabd","orcid":"https://orcid.org/0000-0001-7278-1465"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Emad Elabd","raw_affiliation_strings":["Information System Department, Faculty of Computers and Information, Menoufia University, Egypt"],"affiliations":[{"raw_affiliation_string":"Information System Department, Faculty of Computers and Information, Menoufia University, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063888778","display_name":"Sahar Kootb","orcid":null},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Sahar Kootb","raw_affiliation_strings":["Math and Computer Science Department, Faculty of Science, Menoufia University, Egypt"],"affiliations":[{"raw_affiliation_string":"Math and Computer Science Department, Faculty of Science, Menoufia University, Egypt","institution_ids":["https://openalex.org/I63601056"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048831016"],"corresponding_institution_ids":["https://openalex.org/I63601056"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07295156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"336","last_page":"337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7239022254943848},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.678584098815918},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.588666558265686},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.5675010681152344},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.545164167881012},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5274394154548645},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.4835059940814972},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47878941893577576},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.43384304642677307},{"id":"https://openalex.org/keywords/service-oriented-architecture","display_name":"Service-oriented architecture","score":0.4249371886253357},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.4158036708831787},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4141790270805359},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.1891542673110962},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08973383903503418}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7239022254943848},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.678584098815918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.588666558265686},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.5675010681152344},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.545164167881012},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5274394154548645},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.4835059940814972},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47878941893577576},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.43384304642677307},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.4249371886253357},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4158036708831787},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4141790270805359},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.1891542673110962},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08973383903503418}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2908446.2908502","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2908446.2908502","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Informatics and Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W161908751","https://openalex.org/W2006891491","https://openalex.org/W2163442079","https://openalex.org/W2486514318"],"related_works":["https://openalex.org/W2159325866","https://openalex.org/W1996017820","https://openalex.org/W3003650144","https://openalex.org/W2940702331","https://openalex.org/W2096205497","https://openalex.org/W4225340788","https://openalex.org/W2580533662","https://openalex.org/W3126181123","https://openalex.org/W2116847780","https://openalex.org/W4243339578"],"abstract_inverted_index":{"Web":[0],"services":[1],"are":[2,44],"considered":[3],"as":[4,76,102],"a":[5,23,77,83],"powerful":[6],"solution":[7],"for":[8,46,61,86],"information":[9],"systems":[10],"integration":[11],"which":[12],"is":[13,22,38,65,90,94,108,120],"based":[14,95],"on":[15,96],"the":[16,50,56,70,97,116,123],"service":[17,33],"oriented":[18],"architecture":[19],"(SOA).":[20],"Privacy":[21],"big":[24],"obstacle":[25],"when":[26],"using":[27,73],"web":[28,32,62],"services.":[29],"Therefore,":[30],"accessing":[31],"with":[34],"minimal":[35,87,117],"privacy":[36,47,58,88,118],"disclosure":[37,89,119],"an":[39],"important":[40],"challenge.":[41],"Credentials":[42],"encryption":[43,72,98],"used":[45],"preserving.":[48],"To":[49],"best":[51],"of":[52],"our":[53],"knowledge,":[54],"in":[55,122],"current":[57],"preserving":[59],"approaches":[60],"services,":[63],"there":[64],"no":[66],"technique":[67],"that":[68,115],"uses":[69],"credentials":[71],"certificate":[74,100],"authority":[75],"third":[78,103],"party.":[79],"In":[80],"this":[81],"paper,":[82],"proposed":[84,106,124],"approach":[85,93,107],"proposed.":[91],"This":[92],"and":[99,110],"authorities":[101],"parties.":[104],"The":[105,112],"implemented":[109],"tested.":[111],"results":[113],"show":[114],"achieved":[121],"approach.":[125]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
