{"id":"https://openalex.org/W2921460900","doi":"https://doi.org/10.5220/0007344802570265","title":"Maia: A Language for Mandatory Integrity Controls of Structured Data","display_name":"Maia: A Language for Mandatory Integrity Controls of Structured Data","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2921460900","doi":"https://doi.org/10.5220/0007344802570265","mag":"2921460900"},"language":"en","primary_location":{"id":"doi:10.5220/0007344802570265","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007344802570265","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007344802570265","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014692416","display_name":"Wassnaa Al-Mawee","orcid":"https://orcid.org/0000-0001-6536-7338"},"institutions":[{"id":"https://openalex.org/I141649380","display_name":"Western Michigan University","ror":"https://ror.org/04j198w64","country_code":"US","type":"education","lineage":["https://openalex.org/I141649380"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wassnaa Al-Mawee","raw_affiliation_strings":["Department of Computer Science, Western Michigan University, 1903 W. Michigan Ave., Kalamazoo, MI 49008-5466 and U.S.A., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Western Michigan University, 1903 W. Michigan Ave., Kalamazoo, MI 49008-5466 and U.S.A., --- Select a Country ---","institution_ids":["https://openalex.org/I141649380"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036017742","display_name":"Paul J Bonamy","orcid":null},"institutions":[{"id":"https://openalex.org/I137317281","display_name":"Washington State University Vancouver","ror":"https://ror.org/00g2fk805","country_code":"US","type":"education","lineage":["https://openalex.org/I137317281","https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Bonamy","raw_affiliation_strings":["Department of Computer Science, Washington State University, 14204 NE Salmon Creek Ave., Vancouver, WA 98686 and U.S.A., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Washington State University, 14204 NE Salmon Creek Ave., Vancouver, WA 98686 and U.S.A., --- Select a Country ---","institution_ids":["https://openalex.org/I137317281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002599549","display_name":"Steve Carr","orcid":"https://orcid.org/0000-0002-8922-0805"},"institutions":[{"id":"https://openalex.org/I141649380","display_name":"Western Michigan University","ror":"https://ror.org/04j198w64","country_code":"US","type":"education","lineage":["https://openalex.org/I141649380"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steve Carr","raw_affiliation_strings":["Department of Computer Science, Western Michigan University, 1903 W. Michigan Ave., Kalamazoo, MI 49008-5466 and U.S.A., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Western Michigan University, 1903 W. Michigan Ave., Kalamazoo, MI 49008-5466 and U.S.A., --- Select a Country ---","institution_ids":["https://openalex.org/I141649380"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011288040","display_name":"Jean Mayo","orcid":null},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jean Mayo","raw_affiliation_strings":["Department of Computer Science, Michigan Technological University, 1400 Townsend Dr., Hougton, MI 49931-1292 and U.S.A., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Michigan Technological University, 1400 Townsend Dr., Hougton, MI 49931-1292 and U.S.A., --- Select a Country ---","institution_ids":["https://openalex.org/I11957088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014692416"],"corresponding_institution_ids":["https://openalex.org/I141649380"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01964962,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"257","last_page":"265"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.6165030002593994},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5967351794242859},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.3442765772342682},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3226816654205322}],"concepts":[{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.6165030002593994},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5967351794242859},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3442765772342682},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3226816654205322}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0007344802570265","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007344802570265","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.mtu.edu:michigantech-p-2337","is_oa":true,"landing_page_url":"https://digitalcommons.mtu.edu/michigantech-p/1340","pdf_url":"https://digitalcommons.mtu.edu/michigantech-p/1340","source":{"id":"https://openalex.org/S4377196391","display_name":"Digital Commons - Michigan Tech (Michigan Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11957088","host_organization_name":"Michigan Technological University","host_organization_lineage":["https://openalex.org/I11957088"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Michigan Tech Publications","raw_type":"text"}],"best_oa_location":{"id":"doi:10.5220/0007344802570265","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007344802570265","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"The":[0],"integrity":[1,27,58,80,186],"of":[2,11,22,77,81,106,124,144,161,175],"systems":[3],"files":[4,166],"is":[5,16,59,88],"necessary":[6],"for":[7],"the":[8,52,64,78,104,142,156],"secure":[9],"functioning":[10],"an":[12,180],"operating":[13],"system.":[14,187],"Integrity":[15],"not":[17,102],"generally":[18],"discussed":[19],"in":[20],"terms":[21],"complete":[23],"computer":[24],"systems.":[25],"Instead,":[26],"issues":[28],"tend":[29],"to":[30,35,47,139,154],"be":[31,48,113,152],"either":[32],"tightly":[33],"coupled":[34],"a":[36,68,74,82,86,91,97,107,114,121,131,137,145,171,184],"particular":[37],"domain":[38],"(e.g.":[39,54],"database":[40],"constraints),":[41],"or":[42,66,95],"else":[43],"so":[44],"broad":[45],"as":[46],"useless":[49],"except":[50],"after":[51],"fact":[53],"backups).":[55],"Often,":[56],"file":[57,65,87,116,147],"determined":[60],"by":[61,67,90],"who":[62],"modifies":[63],"checksum.":[69],"This":[70],"paper":[71],"focuses":[72],"on":[73],"general":[75],"model":[76],"internal":[79],"file.":[83,109],"Even":[84],"if":[85],"modified":[89],"subject":[92],"with":[93,117],"trust":[94],"has":[96],"valid":[98,108,146,159],"checksum,":[99],"it":[100],"may":[101],"meet":[103],"specification":[105],"An":[110],"example":[111],"would":[112],"password":[115],"no":[118],"user":[119,122],"assigned":[120],"id":[123],"0.":[125],"In":[126],"this":[127],"paper,":[128],"we":[129],"describe":[130],"language":[132],"called":[133],"Maia":[134,150],"that":[135],"provides":[136],"means":[138],"specify":[140,155],"what":[141],"contents":[143],"should":[148],"be.":[149],"can":[151],"used":[153],"format":[157],"and":[158,167,178],"properties":[160],"system":[162],"configuration":[163],"files,":[164],"PNG":[165],"others.":[168],"We":[169],"give":[170],"structural":[172],"operational":[173],"semantics":[174],"Ma":[176],"ia":[177],"discuss":[179],"initial":[181],"implementation":[182],"within":[183],"mandatory":[185]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
