{"id":"https://openalex.org/W2746749421","doi":"https://doi.org/10.1145/3107411.3107477","title":"Secure Cloud Computing for Pairwise Sequence Alignment","display_name":"Secure Cloud Computing for Pairwise Sequence Alignment","publication_year":2017,"publication_date":"2017-08-20","ids":{"openalex":"https://openalex.org/W2746749421","doi":"https://doi.org/10.1145/3107411.3107477","mag":"2746749421"},"language":"en","primary_location":{"id":"doi:10.1145/3107411.3107477","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3107411.3107477","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM International Conference on Bioinformatics, Computational Biology,and Health Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110045208","display_name":"Sergio Salinas","orcid":null},"institutions":[{"id":"https://openalex.org/I39587148","display_name":"Wichita State University","ror":"https://ror.org/00c4e7y75","country_code":"US","type":"education","lineage":["https://openalex.org/I39587148"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sergio Salinas","raw_affiliation_strings":["Wichita State University, Wichita, KS, USA"],"affiliations":[{"raw_affiliation_string":"Wichita State University, Wichita, KS, USA","institution_ids":["https://openalex.org/I39587148"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100455171","display_name":"Pan Li","orcid":"https://orcid.org/0000-0001-6522-2446"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pan Li","raw_affiliation_strings":["Case Western Reserve University, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, Cleveland, OH, USA","institution_ids":["https://openalex.org/I58956616"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110045208"],"corresponding_institution_ids":["https://openalex.org/I39587148"],"apc_list":null,"apc_paid":null,"fwci":0.219,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58453235,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"178","last_page":"183"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.9069758057594299},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8235198855400085},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7346590161323547},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6672787666320801},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6059948801994324},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.5444761514663696},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5290730595588684},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.4960537850856781},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4120275676250458},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33267533779144287},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.17741486430168152},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15560248494148254}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.9069758057594299},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8235198855400085},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7346590161323547},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6672787666320801},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6059948801994324},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.5444761514663696},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5290730595588684},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.4960537850856781},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4120275676250458},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33267533779144287},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17741486430168152},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15560248494148254},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3107411.3107477","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3107411.3107477","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM International Conference on Bioinformatics, Computational Biology,and Health Informatics","raw_type":"proceedings-article"},{"id":"pmh:oai:soar.wichita.edu:10057/14780","is_oa":false,"landing_page_url":"http://hdl.handle.net/10057/14780","pdf_url":null,"source":{"id":"https://openalex.org/S4306401479","display_name":"Holmes Museum Of Anthropology (Wichita State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39587148","host_organization_name":"Wichita State University","host_organization_lineage":["https://openalex.org/I39587148"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W119362848","https://openalex.org/W1557386445","https://openalex.org/W1563556756","https://openalex.org/W1610688607","https://openalex.org/W1762430620","https://openalex.org/W1892798954","https://openalex.org/W2013623332","https://openalex.org/W2037158686","https://openalex.org/W2037578863","https://openalex.org/W2078416735","https://openalex.org/W2092952360","https://openalex.org/W2104422209","https://openalex.org/W2104846587","https://openalex.org/W2110173188","https://openalex.org/W2119948977","https://openalex.org/W2130479394","https://openalex.org/W2131772137","https://openalex.org/W2135846084","https://openalex.org/W2145166073","https://openalex.org/W2165785801","https://openalex.org/W2166971704","https://openalex.org/W2233233025","https://openalex.org/W2462204796","https://openalex.org/W4245668478","https://openalex.org/W4300349690","https://openalex.org/W6637924259","https://openalex.org/W6639476995"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Today's":[0],"massive":[1],"amount":[2,50],"of":[3,15,51,103,176,193,197],"biological":[4,21,81,113],"sequence":[5,114,118],"data":[6,39,71],"has":[7],"the":[8,84,104,128,140,157,181,211],"potential":[9],"to":[10,36,47,67,79,83,138,143,152,171],"rapidly":[11],"advance":[12],"our":[13,187],"understanding":[14],"life's":[16],"processes.":[17],"However,":[18,73],"since":[19],"analyzing":[20],"sequences":[22,82],"is":[23,61,116],"a":[24,31,48,62,164,194],"very":[25],"expensive":[26],"computing":[27,44,52,191,208],"task,":[28],"users":[29,150,170],"face":[30],"formidable":[32],"challenge":[33],"in":[34,54,146,156,178],"trying":[35],"analyze":[37,68],"these":[38,69],"on":[40],"their":[41],"own.":[42],"Cloud":[43],"offers":[45],"access":[46],"large":[49,195],"resources":[53],"an":[55,173],"on-demand":[56],"and":[57,99,107],"pay-per-use":[58],"fashion,":[59],"which":[60],"practical":[63],"way":[64],"for":[65,96,112,123],"people":[66,75],"huge":[70],"sets.":[72],"many":[74],"are":[76,136],"still":[77],"reluctant":[78],"outsource":[80],"cloud":[85,129],"because":[86,148],"they":[87,135],"contain":[88],"sensitive":[89],"information":[90],"that":[91,168],"should":[92],"be":[93,153],"kept":[94],"secret":[95],"ethical,":[97],"security,":[98],"legal":[100],"reasons.":[101],"One":[102],"most":[105],"fundamental":[106],"frequently":[108],"used":[109],"computational":[110],"tools":[111],"analysis":[115],"pairwise":[117],"alignment":[119],"(PSA).":[120],"Previous":[121],"works":[122],"securely":[124],"solving":[125],"PSAs":[126,145,177,198],"at":[127,180,210],"suffer":[130],"from":[131],"poor":[132],"scalability,":[133],"i.e.,":[134],"unable":[137],"exploit":[139],"cloud's":[141],"infrastructure":[142],"solve":[144,172],"parallel":[147,179],"resource-limited":[149],"need":[151],"constantly":[154],"involved":[155],"computations.":[158],"In":[159],"this":[160],"paper,":[161],"we":[162],"develop":[163],"secure":[165],"outsourcing":[166],"algorithm":[167,188],"allows":[169],"arbitrary":[174],"number":[175,196],"cloud.":[182,212],"Compared":[183],"with":[184,203],"previous":[185],"works,":[186],"can":[189],"reduce":[190],"time":[192],"by":[199],"more":[200],"than":[201],"50%":[202],"as":[204,206],"few":[205],"5":[207],"nodes":[209]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2017-08-31T00:00:00"}
