{"id":"https://openalex.org/W2621327022","doi":"https://doi.org/10.1145/3592626.3592657","title":"CCI-Based Web Security: A Design Using PGP","display_name":"CCI-Based Web Security: A Design Using PGP","publication_year":1995,"publication_date":"1995-12-11","ids":{"openalex":"https://openalex.org/W2621327022","doi":"https://doi.org/10.1145/3592626.3592657","mag":"2621327022"},"language":"en","primary_location":{"id":"doi:10.1145/3592626.3592657","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3592626.3592657","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3592626.3592657","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth International Conference on World Wide Web","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3592626.3592657","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004000063","display_name":"Judson D. Weeks","orcid":null},"institutions":[{"id":"https://openalex.org/I4210135837","display_name":"National Center for Supercomputing Applications","ror":"https://ror.org/03r10zj06","country_code":"US","type":"facility","lineage":["https://openalex.org/I157725225","https://openalex.org/I4210135837"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Judson D. Weeks","raw_affiliation_strings":["Software Development Group, National Center for Supercomputing Applications, Champaign, IL"],"affiliations":[{"raw_affiliation_string":"Software Development Group, National Center for Supercomputing Applications, Champaign, IL","institution_ids":["https://openalex.org/I4210135837"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032651120","display_name":"Adam Cain","orcid":null},"institutions":[{"id":"https://openalex.org/I4210135837","display_name":"National Center for Supercomputing Applications","ror":"https://ror.org/03r10zj06","country_code":"US","type":"facility","lineage":["https://openalex.org/I157725225","https://openalex.org/I4210135837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adam Cain","raw_affiliation_strings":["Software Development Group, National Center for Supercomputing Applications, Champaign, IL"],"affiliations":[{"raw_affiliation_string":"Software Development Group, National Center for Supercomputing Applications, Champaign, IL","institution_ids":["https://openalex.org/I4210135837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091374819","display_name":"Briand Sanderson","orcid":null},"institutions":[{"id":"https://openalex.org/I4210135837","display_name":"National Center for Supercomputing Applications","ror":"https://ror.org/03r10zj06","country_code":"US","type":"facility","lineage":["https://openalex.org/I157725225","https://openalex.org/I4210135837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Briand Sanderson","raw_affiliation_strings":["Software Development Group, National Center for Supercomputing Applications, Champaign, IL"],"affiliations":[{"raw_affiliation_string":"Software Development Group, National Center for Supercomputing Applications, Champaign, IL","institution_ids":["https://openalex.org/I4210135837"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004000063"],"corresponding_institution_ids":["https://openalex.org/I4210135837"],"apc_list":null,"apc_paid":null,"fwci":1.5686,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83969796,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"381","last_page":"395"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9599000215530396,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9404000043869019,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7712992429733276},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7129780650138855},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5676108002662659},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.5601828694343567},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5503119230270386},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.48631009459495544},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46168914437294006},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45200297236442566},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.44027912616729736},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41762053966522217},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.3970223069190979},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3694879412651062},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2783399224281311},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.25831156969070435}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7712992429733276},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7129780650138855},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5676108002662659},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.5601828694343567},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5503119230270386},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.48631009459495544},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46168914437294006},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45200297236442566},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.44027912616729736},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41762053966522217},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.3970223069190979},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3694879412651062},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2783399224281311},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.25831156969070435},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3592626.3592657","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3592626.3592657","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3592626.3592657","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth International Conference on World Wide Web","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3592626.3592657","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3592626.3592657","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3592626.3592657","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth International Conference on World Wide Web","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2621327022.pdf","grobid_xml":"https://content.openalex.org/works/W2621327022.grobid-xml"},"referenced_works_count":2,"referenced_works":["https://openalex.org/W97951031","https://openalex.org/W3023577457"],"related_works":["https://openalex.org/W2626999804","https://openalex.org/W4250004941","https://openalex.org/W2736202444","https://openalex.org/W2049015391","https://openalex.org/W2137014442","https://openalex.org/W1533158771","https://openalex.org/W122082928","https://openalex.org/W2104288289","https://openalex.org/W2521397622","https://openalex.org/W2156201195"],"abstract_inverted_index":{"We":[0,60],"describe":[1,78],"several":[2],"ways":[3],"of":[4,16,40,102],"using":[5,103],"the":[6,14,19,27,38,49,100],"general-purpose":[7],"Common":[8],"Client":[9],"Interface":[10],"(CCI)":[11],"for":[12,56,82],"enhancing":[13],"security":[15],"communications":[17],"on":[18],"World":[20],"Wide":[21],"Web":[22,28,110],"(WWW).":[23],"In":[24],"this":[25],"approach,":[26],"browser":[29],"communicates":[30],"with":[31],"an":[32],"external":[33],"CCI":[34],"application":[35,106],"that":[36],"handles":[37],"processing":[39],"digitally-signed":[41],"and/or":[42],"encrypted":[43],"data.":[44],"Our":[45],"particular":[46],"design":[47],"uses":[48],"popular":[50],"Pretty":[51],"Good":[52],"Privacy":[53],"(PGP)":[54],"software":[55],"all":[57],"cryptographic":[58],"operations.":[59],"define":[61],"a":[62,79,104,113],"PGP-CCI":[63,105],"protocol":[64],"which":[65,88],"can":[66],"be":[67,90],"used":[68],"to":[69,107],"protect":[70],"any":[71],"HTTP":[72],"message":[73],"exchange,":[74],"and":[75],"we":[76,97],"also":[77],"simpler":[80],"scheme":[81],"PGP-protected":[83],"form":[84],"submissions":[85],"(HTTP":[86],"POSTs)":[87],"may":[89],"implemented":[91],"without":[92],"modifying":[93],"web":[94],"servers.":[95],"Additionally,":[96],"point":[98],"out":[99],"advantage":[101],"handle":[108],"pre-encrypted/signed":[109],"documents":[111],"in":[112],"user-friendly":[114],"manner.":[115]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
