{"id":"https://openalex.org/W2759593431","doi":"https://doi.org/10.1145/3322431.3325101","title":"CAOS","display_name":"CAOS","publication_year":2019,"publication_date":"2019-05-28","ids":{"openalex":"https://openalex.org/W2759593431","doi":"https://doi.org/10.1145/3322431.3325101","mag":"2759593431"},"language":"en","primary_location":{"id":"doi:10.1145/3322431.3325101","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3325101","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3325101","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3325101","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057447722","display_name":"Mihai Ordean","orcid":"https://orcid.org/0000-0002-8951-9196"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mihai Ordean","raw_affiliation_strings":["University of Birmingham, Birmingham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Birmingham, Birmingham, United Kingdom","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055690957","display_name":"Mark Ryan","orcid":"https://orcid.org/0000-0002-1632-497X"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mark Ryan","raw_affiliation_strings":["University of Birmingham, Birmingham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Birmingham, Birmingham, United Kingdom","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011572026","display_name":"David Galindo","orcid":"https://orcid.org/0000-0003-3563-5551"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David Galindo","raw_affiliation_strings":["University of Birmingham &amp; Fetch.AI, Birmingham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Birmingham &amp; Fetch.AI, Birmingham, United Kingdom","institution_ids":["https://openalex.org/I79619799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057447722"],"corresponding_institution_ids":["https://openalex.org/I79619799"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00342106,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8882250785827637},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8055769205093384},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.7238609194755554},{"id":"https://openalex.org/keywords/concurrency-control","display_name":"Concurrency control","score":0.467301607131958},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.451959490776062},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4412067234516144},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3927191197872162},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3835626244544983},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3823346495628357},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.22965312004089355},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1831740140914917},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.1255069375038147}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8882250785827637},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8055769205093384},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.7238609194755554},{"id":"https://openalex.org/C84511453","wikidata":"https://www.wikidata.org/wiki/Q2914952","display_name":"Concurrency control","level":3,"score":0.467301607131958},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.451959490776062},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4412067234516144},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3927191197872162},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3835626244544983},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3823346495628357},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.22965312004089355},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1831740140914917},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.1255069375038147}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3322431.3325101","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3325101","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3325101","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1709.10412","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1709.10412","pdf_url":"https://arxiv.org/pdf/1709.10412","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:pure.atira.dk:Publications/3aa389e2-64a6-434a-bb5d-6552eb62f5c6","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/3aa389e2-64a6-434a-bb5d-6552eb62f5c6","is_oa":true,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/3aa389e2-64a6-434a-bb5d-6552eb62f5c6","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ordean, M, Ryan, M & Galindo Chacon, D 2019, CAOS : Concurrent-Access Obfuscated Store. in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019). Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, Association for Computing Machinery (ACM), pp. 13-24, 24th ACM Symposium on Access Control Models and Technologies, Toronto, Ontario, Canada, 4/06/19. https://doi.org/10.1145/3322431.3325101","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.atira.dk:publications/3aa389e2-64a6-434a-bb5d-6552eb62f5c6","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85067212850&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.1145/3322431.3325101","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3325101","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3325101","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G8682795926","display_name":null,"funder_award_id":"EP/R007128/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2759593431.pdf","grobid_xml":"https://content.openalex.org/works/W2759593431.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1516512945","https://openalex.org/W1586184796","https://openalex.org/W1678962037","https://openalex.org/W1821700043","https://openalex.org/W1887472920","https://openalex.org/W1988374166","https://openalex.org/W2000461888","https://openalex.org/W2001945363","https://openalex.org/W2005756274","https://openalex.org/W2014465787","https://openalex.org/W2074599161","https://openalex.org/W2101755029","https://openalex.org/W2145426052","https://openalex.org/W2146828512","https://openalex.org/W2150307013","https://openalex.org/W2154448764","https://openalex.org/W2161214567","https://openalex.org/W2162567660","https://openalex.org/W2170993700","https://openalex.org/W2184702105","https://openalex.org/W2294070790","https://openalex.org/W2404098708","https://openalex.org/W2517979719","https://openalex.org/W2964133768","https://openalex.org/W4231247593","https://openalex.org/W4297822135","https://openalex.org/W4379532428"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W2150179797","https://openalex.org/W2170147831","https://openalex.org/W4242696047"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"Concurrent-Access":[3],"Obfuscated":[4],"Store":[5],"(CAOS),":[6],"a":[7,18,47,54,136,139,147],"construction":[8],"for":[9,24,49],"remote":[10],"data":[11,72],"storage":[12],"that":[13,41,68,88],"provides":[14],"access-pattern":[15],"obfuscation":[16,127],"in":[17,108],"honest-but-curious":[19],"adversarial":[20],"model,":[21],"while":[22],"allowing":[23],"low":[25],"bandwidth":[26],"overhead":[27],"and":[28,53,98,138],"client":[29,82],"storage.":[30],"Compared":[31],"to":[32,83,94,112,124],"other":[33],"approaches,":[34],"the":[35,71,77,85,95,103,110,121],"main":[36],"advantage":[37],"of":[38,105,142],"CAOS":[39,109],"is":[40,60,73,118],"it":[42],"supports":[43],"concurrent":[44],"access":[45,59,93,114],"without":[46],"proxy,":[48],"multiple":[50],"read-only":[51],"clients":[52,64,89],"single":[55],"read-write":[56],"client.":[57],"Concurrent":[58],"achieved":[61,101],"by":[62,120],"letting":[63],"maintain":[65],"independent":[66],"maps":[67,78],"describe":[69],"how":[70],"stored.":[74],"Even":[75],"though":[76],"might":[79],"diverge":[80],"from":[81],"client,":[84],"protocol":[86],"guarantees":[87],"will":[90],"always":[91],"have":[92],"data.":[96],"Efficiency":[97],"concurrency":[99],"are":[100,116],"at":[102,151],"expense":[104],"perfect":[106],"obfuscation:":[107],"extent":[111],"which":[113],"patterns":[115],"hidden":[117],"determined":[119],"resources":[122],"allocated":[123],"its":[125],"built-in":[126],"mechanism.":[128],"To":[129],"assess":[130],"this":[131],"trade-off":[132],"we":[133],"provide":[134,146],"both":[135],"security":[137],"performance":[140],"analysis":[141],"CAOS.":[143],"We":[144],"additionally":[145],"proof-of-concept":[148],"implementation":[149],"available":[150],"https://github.com/meehien/caos.":[152]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2017-10-06T00:00:00"}
