{"id":"https://openalex.org/W4223889350","doi":"https://doi.org/10.1145/3508398","title":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","display_name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","publication_year":2022,"publication_date":"2022-04-14","ids":{"openalex":"https://openalex.org/W4223889350","doi":"https://doi.org/10.1145/3508398"},"language":"en","primary_location":{"id":"doi:10.1145/3508398","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508398","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9261999726295471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9261999726295471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9214000105857849,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6454106569290161},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.635980486869812},{"id":"https://openalex.org/keywords/homeland-security","display_name":"Homeland security","score":0.5515940189361572},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5305260419845581},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5095322728157043},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5071306228637695},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3946777284145355},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.17563414573669434},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.1271776556968689},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11029893159866333},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1079491674900055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6454106569290161},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.635980486869812},{"id":"https://openalex.org/C506469952","wikidata":"https://www.wikidata.org/wiki/Q181467","display_name":"Homeland security","level":3,"score":0.5515940189361572},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5305260419845581},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5095322728157043},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5071306228637695},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3946777284145355},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.17563414573669434},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.1271776556968689},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11029893159866333},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1079491674900055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3508398","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508398","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3036824589","https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2905822832","https://openalex.org/W2940702331"],"abstract_inverted_index":{"It":[0],"is":[1,289,308],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,37,46,62,105,146,220,292,304,341],"welcome":[6],"you":[7],"the":[9,13,27,38,53,78,103,109,154,178,255,314],"twelfth":[10],"edition":[11,30],"of":[12,113,126,157,183,198,210,218,263,268],"ACM":[14],"Conference":[15],"on":[16,132],"Data":[17,164,324],"and":[18,21,49,55,58,61,70,83,86,96,129,134,141,159,162,165,185,188,191,223,231,242,254,266,274,280,297,325,328],"Application":[19],"Security":[20],"Privacy":[22],"(CODASPY":[23],"2022),":[24],"which":[25],"follows":[26],"successful":[28],"eleventh":[29],"held":[31],"online":[32],"in":[33,52,153,173,228,282,313],"April":[34],"2021":[35],"due":[36],"pandemic.":[39],"This":[40],"conference":[41,138],"series":[42],"has":[43,119,330],"been":[44],"founded":[45],"foster":[47],"novel":[48],"exciting":[50],"research":[51,69,127,335],"data":[54,94,158,169,184,200,222],"application":[56],"security":[57,95,161,190,275,327],"privacy":[59,97,192,273,329],"arena":[60],"help":[63],"generate":[64],"new":[65],"directions":[66],"for":[67,124,207,302],"further":[68],"development.":[71],"The":[72,137,260,300],"initial":[73],"concept":[74],"was":[75],"established":[76],"by":[77,88,205,247,310],"two":[79],"cofounders,":[80],"Elisa":[81],"Bertino":[82],"Ravi":[84],"Sandhu,":[85],"sharpened":[87],"subsequent":[89],"discussions":[90],"with":[91,108,150,337],"several":[92],"fellow":[93],"researchers.":[98],"Their":[99],"enthusiastic":[100],"encouragement":[101],"persuaded":[102],"co-founders":[104],"move":[106],"ahead":[107],"always":[110],"daunting":[111],"task":[112],"creating":[114],"a":[115,121,143,208,290,334],"high-quality":[116],"conference.":[117],"CODASPY":[118],"become":[120],"leading":[122],"forum":[123],"presentation":[125],"results":[128],"experience":[130],"reports":[131],"hardware":[133],"software":[135],"security.":[136],"gives":[139],"researchers":[140],"practitioners":[142],"unique":[144],"opportunity":[145],"share":[147,305],"their":[148],"perspectives":[149],"others":[151],"interested":[152],"various":[155],"aspects":[156],"applications":[160,166,235,326],"privacy.":[163],"that":[167,317],"manipulate":[168],"are":[170,201],"crucial":[171],"assets":[172],"today's":[174],"information":[175,306],"age.":[176],"With":[177],"increasing":[179],"drive":[180,291],"towards":[181],"availability":[182],"services":[186,225],"anytime":[187],"anywhere,":[189],"risks":[193],"have":[194],"increased.":[195],"Vast":[196],"amounts":[197],"privacy-sensitive":[199],"being":[202],"collected":[203],"today":[204],"organizations":[206,303],"variety":[209],"reasons.":[211],"Unauthorized":[212],"disclosure,":[213],"modification,":[214],"usage,":[215],"or":[216],"denial":[217],"access":[219],"these":[221,294],"corresponding":[224],"may":[226],"result":[227],"high":[229],"human":[230],"financial":[232],"costs.":[233],"Important":[234],"such":[236,285],"as":[237,286,333],"homeland":[238],"security,":[239],"social":[240,243],"networking":[241],"computing":[244],"provide":[245],"value":[246],"aggregating":[248],"input":[249],"from":[250],"numerous":[251],"individual":[252],"users,":[253],"mobile":[256],"devices":[257],"they":[258],"carry.":[259],"emerging":[261],"areas":[262],"Cloud":[264],"Computing":[265],"Internet":[267],"Things":[269],"also":[270],"pose":[271],"serious":[272],"challenges.":[276],"To":[277],"achieve":[278],"efficiency":[279],"effectiveness":[281],"traditional":[283,322],"domains":[284],"healthcare,":[287],"there":[288],"make":[293],"records":[295],"electronic":[296],"highly":[298],"available.":[299],"need":[301],"effectively":[307],"underscored":[309],"rapid":[311],"innovations":[312],"business":[315],"world":[316],"require":[318],"close":[319],"collaboration":[320],"across":[321],"boundaries.":[323],"rapidly":[331],"expanded":[332],"field":[336],"many":[338],"important":[339],"challenges":[340],"be":[342],"addressed.":[343]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
