{"id":"https://openalex.org/W2295497821","doi":"https://doi.org/10.5220/0005575604350440","title":"Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations","display_name":"Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2295497821","doi":"https://doi.org/10.5220/0005575604350440","mag":"2295497821"},"language":"en","primary_location":{"id":"doi:10.5220/0005575604350440","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005575604350440","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005575604350440","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078871025","display_name":"Eduardo B. Fern\u00e1ndez","orcid":"https://orcid.org/0000-0002-5109-4591"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eduardo B. Fernandez","raw_affiliation_strings":["Florida Atlantic University, United States"],"affiliations":[{"raw_affiliation_string":"Florida Atlantic University, United States","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027148061","display_name":"Dereje Yimam","orcid":null},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dereje Yimam","raw_affiliation_strings":["Florida Atlantic University, United States"],"affiliations":[{"raw_affiliation_string":"Florida Atlantic University, United States","institution_ids":["https://openalex.org/I63772739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078871025"],"corresponding_institution_ids":["https://openalex.org/I63772739"],"apc_list":null,"apc_paid":null,"fwci":1.5991,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86822494,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"435","last_page":"440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.724168062210083},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6400970816612244},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.11526027321815491},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.06257838010787964}],"concepts":[{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.724168062210083},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6400970816612244},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11526027321815491},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.06257838010787964}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005575604350440","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005575604350440","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005575604350440","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005575604350440","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W181692423","https://openalex.org/W2025932641","https://openalex.org/W2129527513","https://openalex.org/W2164880965"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2410395228","https://openalex.org/W2390279801","https://openalex.org/W3125941065","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W4366371796","https://openalex.org/W2350741829"],"abstract_inverted_index":{"Business":[0],"software":[1,17,25],"is":[2],"subject":[3],"to":[4,70,81,88,91],"a":[5,102],"variety":[6],"of":[7,13,19,40,57],"regulations":[8,46,58],"depending":[9],"on":[10],"the":[11,41],"type":[12],"application.":[14],"For":[15],"example,":[16],"handling":[18],"medical":[20],"records":[21],"must":[22,29],"follow":[23],"HIPAA;":[24],"for":[26,110,125],"financial":[27],"applications":[28],"comply":[30],"with":[31],"Sarbanes":[32],"Oxley,":[33],"and":[34,52,84,98,112],"so":[35],"on.":[36],"A":[37],"close":[38],"examination":[39],"policies":[42],"included":[43],"in":[44,74,101],"those":[45],"shows":[47],"that":[48],"they":[49],"have":[50],"analog":[51],"common":[53],"aspects.":[54],"Analog":[55],"parts":[56,73,78],"can":[59,68,85,105,120],"be":[60,86,121],"expressed":[61],"as":[62,123],"Semantic":[63],"Analysis":[64],"Patterns":[65],"(SAPs),":[66],"which":[67],"lead":[69],"building":[71,126],"similar":[72],"other":[75,92],"regulations.":[76,93,114],"Overlapping":[77],"usually":[79],"correspond":[80],"security":[82,90,99],"patterns":[83,100],"used":[87,122],"add":[89],"If":[94],"we":[95,104],"collect":[96],"SAPs":[97],"catalog":[103],"build":[106],"reference":[107],"architectures":[108],"(RAs)":[109],"existing":[111],"new":[113],"The":[115],"resultant":[116],"Compliant":[117],"RAs":[118],"(CRAs)":[119],"guidelines":[124],"compliant":[127],"applications.":[128]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
