{"id":"https://openalex.org/W4308562563","doi":"https://doi.org/10.1145/3560835.3563444","title":"Strength, Trust, and Harmony","display_name":"Strength, Trust, and Harmony","publication_year":2022,"publication_date":"2022-11-08","ids":{"openalex":"https://openalex.org/W4308562563","doi":"https://doi.org/10.1145/3560835.3563444"},"language":"en","primary_location":{"id":"doi:10.1145/3560835.3563444","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3560835.3563444","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058491728","display_name":"Trevor Rosen","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Trevor Rosen","raw_affiliation_strings":["GitHub, San Francisco, CA, USA"],"affiliations":[{"raw_affiliation_string":"GitHub, San Francisco, CA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5058491728"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21977647,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.17759999632835388,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.17759999632835388,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.09049999713897705,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.06830000132322311,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/harmony","display_name":"Harmony (color)","score":0.6922849416732788},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47882845997810364},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.09230124950408936},{"id":"https://openalex.org/keywords/visual-arts","display_name":"Visual arts","score":0.06865209341049194}],"concepts":[{"id":"https://openalex.org/C2776453491","wikidata":"https://www.wikidata.org/wiki/Q5659234","display_name":"Harmony (color)","level":2,"score":0.6922849416732788},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47882845997810364},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.09230124950408936},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.06865209341049194}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3560835.3563444","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3560835.3563444","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4321448422","https://openalex.org/W2382969832","https://openalex.org/W2348535019","https://openalex.org/W963778612","https://openalex.org/W2376836472","https://openalex.org/W2379879936","https://openalex.org/W2388675254","https://openalex.org/W620586615","https://openalex.org/W2383761002"],"abstract_inverted_index":{"As":[0],"we":[1],"think":[2],"about":[3],"enhancing":[4],"software":[5],"supply":[6,105],"chain":[7,106],"security,":[8],"what":[9,55],"does":[10,29],"the":[11,25,30,33,41,57,66,91,94,135],"landscape":[12,137],"of":[13,61,93],"threats":[14],"and":[15,27,59,65,97,122],"opportunities":[16],"look":[17],"like?":[18],"What":[19],"are":[20,56],"useful":[21],"ways":[22],"for":[23],"framing":[24],"problem,":[26],"how":[28],"industry":[31,75],"view":[32],"challenge?":[34],"Where":[35],"do":[36],"responsibilities":[37,60],"lie?":[38],"Who":[39],"has":[40],"power":[42],"to":[43,48,83,114,123,127,138],"make":[44],"positive":[45],"changes":[46],"or":[47],"act":[49],"with":[50,130],"malice?":[51],"And":[52],"most":[53],"importantly,":[54],"roles":[58],"industry,":[62],"academia,":[63],"government,":[64],"open":[67],"source":[68],"community":[69],"at":[70,90,109],"large?":[71],"In":[72],"this":[73],"keynote,":[74],"veteran":[76],"Trevor":[77],"Rosen":[78],"will":[79],"offer":[80],"some":[81,116,119],"answers":[82],"these":[84],"questions":[85],"borne":[86],"from":[87,132],"his":[88,98],"time":[89],"center":[92],"SolarWinds/SUNBURST":[95],"breach":[96],"experience":[99],"in":[100,145],"standing":[101],"up":[102],"a":[103,140],"new":[104],"integrity":[107],"practice":[108],"GitHub.":[110],"You":[111],"can":[112],"expect":[113],"hear":[115],"war":[117],"stories,":[118],"strong":[120],"opinions,":[121],"walk":[124],"away":[125],"inspired":[126],"join":[128],"hands":[129],"colleagues":[131],"all":[133],"over":[134],"technical":[136],"solve":[139],"huge":[141],"(but":[142],"tractable!)":[143],"problem":[144],"information":[146],"security.":[147]},"counts_by_year":[],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2025-10-10T00:00:00"}
