{"id":"https://openalex.org/W2789879955","doi":"https://doi.org/10.1145/3176258.3176311","title":"A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System","display_name":"A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System","publication_year":2018,"publication_date":"2018-03-13","ids":{"openalex":"https://openalex.org/W2789879955","doi":"https://doi.org/10.1145/3176258.3176311","mag":"2789879955"},"language":"en","primary_location":{"id":"doi:10.1145/3176258.3176311","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3176258.3176311","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044512882","display_name":"Oyindamola Oluwatimi","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Oyindamola Oluwatimi","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044512882"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.1651,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.40323543,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"10","issue":null,"first_page":"256","last_page":"266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.7513247132301331},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6833534240722656},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6456116437911987},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.6383864879608154},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5930167436599731},{"id":"https://openalex.org/keywords/containerization","display_name":"Containerization","score":0.5309441089630127},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.41026726365089417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35201597213745117},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3515205979347229},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2775733470916748},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16499534249305725},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13340583443641663}],"concepts":[{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.7513247132301331},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6833534240722656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6456116437911987},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.6383864879608154},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5930167436599731},{"id":"https://openalex.org/C2779821363","wikidata":"https://www.wikidata.org/wiki/Q428072","display_name":"Containerization","level":3,"score":0.5309441089630127},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.41026726365089417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35201597213745117},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3515205979347229},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2775733470916748},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16499534249305725},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13340583443641663},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3176258.3176311","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3176258.3176311","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1018939436","https://openalex.org/W1457125068","https://openalex.org/W1502051944","https://openalex.org/W1507297365","https://openalex.org/W1542283487","https://openalex.org/W1724301876","https://openalex.org/W1747229408","https://openalex.org/W1875062215","https://openalex.org/W1990085310","https://openalex.org/W1991724394","https://openalex.org/W2018357111","https://openalex.org/W2043108579","https://openalex.org/W2050379150","https://openalex.org/W2060692877","https://openalex.org/W2066219627","https://openalex.org/W2070881494","https://openalex.org/W2071717677","https://openalex.org/W2077858486","https://openalex.org/W2095396347","https://openalex.org/W2101188359","https://openalex.org/W2107283899","https://openalex.org/W2115873741","https://openalex.org/W2125855750","https://openalex.org/W2156245716","https://openalex.org/W2157921329","https://openalex.org/W2160769609","https://openalex.org/W2161651101","https://openalex.org/W2165689165","https://openalex.org/W2170411923","https://openalex.org/W2294068577","https://openalex.org/W2409101089","https://openalex.org/W2418861874","https://openalex.org/W2588227557","https://openalex.org/W3006602635","https://openalex.org/W3099019051","https://openalex.org/W3136699861","https://openalex.org/W4205865454"],"related_works":["https://openalex.org/W2922530654","https://openalex.org/W4379386225","https://openalex.org/W2354950134","https://openalex.org/W2383352889","https://openalex.org/W2252666847","https://openalex.org/W583632459","https://openalex.org/W3035018060","https://openalex.org/W3112503661","https://openalex.org/W2604905709","https://openalex.org/W852113252"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,53],"present":[4],"our":[5,90,96],"position-based,":[6],"Multi-EnterpRise":[7],"Containerization":[8],"(MERC)":[9],"architecture":[10,16],"for":[11,44,108],"BYOD":[12,109],"security.":[13,110],"The":[14],"MERC":[15,79,101],"leverages":[17],"positional":[18],"data":[19],"to":[20,24,46,65,83],"grant":[21,28],"context-aware":[22,63],"capabilities":[23],"container-based":[25],"systems.":[26],"We":[27,88],"enterprises":[29],"the":[30,78],"ability":[31],"of":[32],"defining":[33],"location-":[34],"and":[35,68,71,95,105],"proximity-based":[36,81],"conditions":[37],"that":[38,59,100],"must":[39],"be":[40],"met":[41],"in":[42],"order":[43],"users":[45],"securely":[47,66],"access":[48],"enterprise":[49,62],"container":[50],"content.":[51],"First,":[52],"provide":[54],"a":[55,85],"scalable":[56],"location-based":[57],"scheme":[58],"allows":[60],"multiple":[61],"systems":[64],"coexist":[67],"activate":[69],"policies":[70],"personas":[72],"on":[73],"an":[74,103],"end-user's":[75],"device.":[76],"Second,":[77],"incorporates":[80],"constraints":[82],"modify":[84],"persona's":[86],"behavior.":[87],"evaluate":[89],"prototype":[91],"using":[92],"preexisting":[93],"infrastructures,":[94],"experimental":[97],"results":[98],"show":[99],"is":[102],"effective":[104],"practical":[106],"solution":[107]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
