{"id":"https://openalex.org/W4253576094","doi":"https://doi.org/10.1145/3422337","title":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","display_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","publication_year":2021,"publication_date":"2021-04-10","ids":{"openalex":"https://openalex.org/W4253576094","doi":"https://doi.org/10.1145/3422337"},"language":"en","primary_location":{"id":"doi:10.1145/3422337","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9319000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9319000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9291999936103821,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9180999994277954,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.647627592086792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6474863290786743},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5595083832740784},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5025315284729004},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4994170665740967},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46634596586227417},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4497877061367035},{"id":"https://openalex.org/keywords/homeland-security","display_name":"Homeland security","score":0.4181053638458252},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.40067219734191895},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15281566977500916},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1479821503162384},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.11502212285995483}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.647627592086792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6474863290786743},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5595083832740784},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5025315284729004},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4994170665740967},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46634596586227417},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4497877061367035},{"id":"https://openalex.org/C506469952","wikidata":"https://www.wikidata.org/wiki/Q181467","display_name":"Homeland security","level":3,"score":0.4181053638458252},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.40067219734191895},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15281566977500916},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1479821503162384},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.11502212285995483},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3422337","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2029203054","https://openalex.org/W46718436","https://openalex.org/W2048171465","https://openalex.org/W987014419","https://openalex.org/W2061162787","https://openalex.org/W85836654","https://openalex.org/W1505245844","https://openalex.org/W2993667162","https://openalex.org/W2185946950","https://openalex.org/W4313855404"],"abstract_inverted_index":{"It":[0],"is":[1,243,262],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,37,46,62,105,174,246,258,314],"welcome":[6],"you":[7],"the":[9,13,27,38,53,78,103,109,132,209,268,294],"eleventh":[10],"edition":[11,30],"of":[12,113,137,152,164,172,217,222,293],"ACM":[14],"Conference":[15],"on":[16],"Data":[17,118,297],"and":[18,21,49,55,58,61,70,83,86,96,119,139,142,145,177,185,196,208,220,228,234,251,279,283,298,301],"Application":[19],"Security":[20,278],"Privacy":[22],"(CODASPY":[23],"2021),":[24],"which":[25],"follows":[26],"successful":[28],"tenth":[29],"held":[31],"online":[32],"in":[33,52,127,182,236,267,281,291],"August":[34],"2020":[35],"due":[36],"pandemic.":[39],"This":[40],"conference":[41],"series":[42],"has":[43,303],"been":[44],"founded":[45],"foster":[47],"novel":[48],"exciting":[50],"research":[51,69,308],"data":[54,94,123,138,154,176],"application":[56,295],"security":[57,95,144,229,300],"privacy":[59,97,146,227,280,302],"arena":[60],"help":[63],"generate":[64],"new":[65],"directions":[66],"for":[67,161,256],"further":[68],"development.":[71],"The":[72,214,254],"initial":[73],"concept":[74],"was":[75],"established":[76],"by":[77,88,159,201,264],"two":[79],"cofounders,":[80],"Elisa":[81],"Bertino":[82],"Ravi":[84],"Sandhu,":[85],"sharpened":[87],"subsequent":[89],"discussions":[90],"with":[91,108,310],"several":[92],"fellow":[93],"researchers.":[98],"Their":[99],"enthusiastic":[100],"encouragement":[101],"persuaded":[102],"co-founders":[104],"move":[106],"ahead":[107],"always":[110],"daunting":[111],"task":[112],"creating":[114],"a":[115,162,244,307],"high-quality":[116],"conference.":[117],"applications":[120,189,299],"that":[121,271],"manipulate":[122],"are":[124,155],"crucial":[125],"assets":[126],"today's":[128],"information":[129,260],"age.":[130],"With":[131],"increasing":[133],"drive":[134,245],"towards":[135],"availability":[136],"services":[140,179],"anytime":[141],"anywhere,":[143],"risks":[147],"have":[148],"increased.":[149],"Vast":[150],"amounts":[151],"privacy-sensitive":[153],"being":[156],"collected":[157],"today":[158],"organizations":[160,257],"variety":[163],"reasons.":[165],"Unauthorized":[166],"disclosure,":[167],"modification,":[168],"usage,":[169],"or":[170],"denial":[171],"access":[173],"these":[175,248,282],"corresponding":[178],"may":[180],"result":[181],"high":[183],"human":[184],"financial":[186],"costs.":[187],"Important":[188],"such":[190,239],"as":[191,240,306],"homeland":[192],"security,":[193],"social":[194,197],"networking":[195],"computing":[198],"provide":[199],"value":[200],"aggregating":[202],"input":[203],"from":[204],"numerous":[205],"individual":[206],"users,":[207],"mobile":[210],"devices":[211],"they":[212],"carry.":[213],"emerging":[215],"areas":[216],"Cloud":[218],"Computing":[219],"Internet":[221],"Things":[223],"also":[224],"pose":[225],"serious":[226],"challenges.":[230],"To":[231],"achieve":[232],"efficiency":[233],"effectiveness":[235],"traditional":[237,276],"domains":[238],"healthcare,":[241],"there":[242],"make":[247],"records":[249],"electronic":[250],"highly":[252],"available.":[253],"need":[255],"share":[259],"effectively":[261],"underscored":[263],"rapid":[265],"innovations":[266],"business":[269],"world":[270],"require":[272],"close":[273],"collaboration":[274],"across":[275],"boundaries.":[277],"other":[284],"arenas":[285],"can":[286],"be":[287,315],"meaningfully":[288],"achieved":[289],"only":[290],"context":[292],"domain.":[296],"rapidly":[304],"expanded":[305],"field":[309],"many":[311],"important":[312],"challenges":[313],"addressed.":[316]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
