{"id":"https:\/\/openalex.org\/W2977637860","doi":"https:\/\/doi.org\/10.1109\/cscloud\/edgecom.2019.00018","title":"A Flexible and Compatible Model for Supporting Assurance Level through a Central Proxy","display_name":"A Flexible and Compatible Model for Supporting Assurance Level through a Central Proxy","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https:\/\/openalex.org\/W2977637860","doi":"https:\/\/doi.org\/10.1109\/cscloud\/edgecom.2019.00018","mag":"2977637860"},"language":"en","primary_location":{"id":"doi:10.1109\/cscloud\/edgecom.2019.00018","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/cscloud\/edgecom.2019.00018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https:\/\/resolver.sub.uni-goettingen.de\/purl?gro-2\/135511","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5089543007","display_name":"Shirin Dabbaghi Varnosfaderani","orcid":"https:\/\/orcid.org\/0000-0002-5355-5320"},"institutions":[{"id":"https:\/\/openalex.org\/I4210091733","display_name":"Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen","ror":"https:\/\/ror.org\/00cd95c65","country_code":"DE","type":"other","lineage":["https:\/\/openalex.org\/I4210091733","https:\/\/openalex.org\/I74656192"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Shirin Dabbaghi Varnosfaderani","raw_affiliation_strings":["Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG), G\u00f6ttingen, Germany"],"affiliations":[{"raw_affiliation_string":"Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG), G\u00f6ttingen, Germany","institution_ids":["https:\/\/openalex.org\/I4210091733"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5019245868","display_name":"Piotr Kasprzak","orcid":"https:\/\/orcid.org\/0000-0002-8911-4682"},"institutions":[{"id":"https:\/\/openalex.org\/I4210091733","display_name":"Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen","ror":"https:\/\/ror.org\/00cd95c65","country_code":"DE","type":"other","lineage":["https:\/\/openalex.org\/I4210091733","https:\/\/openalex.org\/I74656192"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Piotr Kasprzak","raw_affiliation_strings":["Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG), G\u00f6ttingen, Germany"],"affiliations":[{"raw_affiliation_string":"Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG), G\u00f6ttingen, Germany","institution_ids":["https:\/\/openalex.org\/I4210091733"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5058037869","display_name":"Christof Pohl","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I4210091733","display_name":"Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen","ror":"https:\/\/ror.org\/00cd95c65","country_code":"DE","type":"other","lineage":["https:\/\/openalex.org\/I4210091733","https:\/\/openalex.org\/I74656192"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christof Pohl","raw_affiliation_strings":["Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG), G\u00f6ttingen, Germany"],"affiliations":[{"raw_affiliation_string":"Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG), G\u00f6ttingen, Germany","institution_ids":["https:\/\/openalex.org\/I4210091733"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5010508067","display_name":"Ramin Yahyapour","orcid":"https:\/\/orcid.org\/0000-0002-9057-4395"},"institutions":[{"id":"https:\/\/openalex.org\/I4210091733","display_name":"Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen","ror":"https:\/\/ror.org\/00cd95c65","country_code":"DE","type":"other","lineage":["https:\/\/openalex.org\/I4210091733","https:\/\/openalex.org\/I74656192"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ramin Yahyapour","raw_affiliation_strings":["Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG), G\u00f6ttingen, Germany"],"affiliations":[{"raw_affiliation_string":"Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG), G\u00f6ttingen, Germany","institution_ids":["https:\/\/openalex.org\/I4210091733"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https:\/\/openalex.org\/A5089543007"],"corresponding_institution_ids":["https:\/\/openalex.org\/I4210091733"],"apc_list":null,"apc_paid":null,"fwci":1.0624,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.8558552,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"46","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/3312","display_name":"Sociology and Political Science"},"field":{"id":"https:\/\/openalex.org\/fields\/33","display_name":"Social Sciences"},"domain":{"id":"https:\/\/openalex.org\/domains\/2","display_name":"Social Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/3312","display_name":"Sociology and Political Science"},"field":{"id":"https:\/\/openalex.org\/fields\/33","display_name":"Social Sciences"},"domain":{"id":"https:\/\/openalex.org\/domains\/2","display_name":"Social Sciences"}},{"id":"https:\/\/openalex.org\/T11614","display_name":"Cloud Data Security Solutions","score":0.9980000257492065,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11424","display_name":"Security and Verification in Computing","score":0.9959999918937683,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.611286997795105},{"id":"https:\/\/openalex.org\/keywords\/information-assurance","display_name":"Information assurance","score":0.599205493927002},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.5904563665390015},{"id":"https:\/\/openalex.org\/keywords\/proxy","display_name":"Proxy (statistics)","score":0.5864160060882568},{"id":"https:\/\/openalex.org\/keywords\/access-control","display_name":"Access control","score":0.5863170027732849},{"id":"https:\/\/openalex.org\/keywords\/software-deployment","display_name":"Software deployment","score":0.5722475647926331},{"id":"https:\/\/openalex.org\/keywords\/nist","display_name":"NIST","score":0.5636007785797119},{"id":"https:\/\/openalex.org\/keywords\/service-provider","display_name":"Service provider","score":0.4581567049026489},{"id":"https:\/\/openalex.org\/keywords\/authentication","display_name":"Authentication (law)","score":0.4532117545604706},{"id":"https:\/\/openalex.org\/keywords\/service","display_name":"Service (business)","score":0.4085472822189331},{"id":"https:\/\/openalex.org\/keywords\/information-security","display_name":"Information security","score":0.37325185537338257},{"id":"https:\/\/openalex.org\/keywords\/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3580501079559326},{"id":"https:\/\/openalex.org\/keywords\/business","display_name":"Business","score":0.3054913282394409},{"id":"https:\/\/openalex.org\/keywords\/software-engineering","display_name":"Software engineering","score":0.14405161142349243}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.611286997795105},{"id":"https:\/\/openalex.org\/C2780795517","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q6030997","display_name":"Information assurance","level":3,"score":0.599205493927002},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.5904563665390015},{"id":"https:\/\/openalex.org\/C2780148112","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5864160060882568},{"id":"https:\/\/openalex.org\/C527821871","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q228502","display_name":"Access control","level":2,"score":0.5863170027732849},{"id":"https:\/\/openalex.org\/C105339364","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2297740","display_name":"Software deployment","level":2,"score":0.5722475647926331},{"id":"https:\/\/openalex.org\/C111219384","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q6954384","display_name":"NIST","level":2,"score":0.5636007785797119},{"id":"https:\/\/openalex.org\/C116537","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2169973","display_name":"Service provider","level":3,"score":0.4581567049026489},{"id":"https:\/\/openalex.org\/C148417208","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4532117545604706},{"id":"https:\/\/openalex.org\/C2780378061","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q25351891","display_name":"Service (business)","level":2,"score":0.4085472822189331},{"id":"https:\/\/openalex.org\/C527648132","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q189900","display_name":"Information security","level":2,"score":0.37325185537338257},{"id":"https:\/\/openalex.org\/C112930515","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3580501079559326},{"id":"https:\/\/openalex.org\/C144133560","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4830453","display_name":"Business","level":0,"score":0.3054913282394409},{"id":"https:\/\/openalex.org\/C115903868","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q80993","display_name":"Software engineering","level":1,"score":0.14405161142349243},{"id":"https:\/\/openalex.org\/C119857082","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2539","display_name":"Machine learning","level":1,"score":0},{"id":"https:\/\/openalex.org\/C204321447","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q30642","display_name":"Natural language processing","level":1,"score":0},{"id":"https:\/\/openalex.org\/C162853370","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q39809","display_name":"Marketing","level":1,"score":0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109\/cscloud\/edgecom.2019.00018","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/cscloud\/edgecom.2019.00018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","raw_type":"proceedings-article"},{"id":"pmh:oai:publications.goettingen-research-online.de:2\/135511","is_oa":true,"landing_page_url":"https:\/\/resolver.sub.uni-goettingen.de\/purl?gro-2\/135511","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306401634","display_name":"GoeScholar  The Publication Server of the Georg-August-Universit\u00e4t G\u00f6ttingen (Georg-August-Universit\u00e4t G\u00f6ttingen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I4210122495","host_organization_name":"Asklepios Klinik St. Georg","host_organization_lineage":["https:\/\/openalex.org\/I4210122495"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https:\/\/openalex.org\/licenses\/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo\/semantics\/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:publications.goettingen-research-online.de:2\/135511","is_oa":true,"landing_page_url":"https:\/\/resolver.sub.uni-goettingen.de\/purl?gro-2\/135511","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306401634","display_name":"GoeScholar  The Publication Server of the Georg-August-Universit\u00e4t G\u00f6ttingen (Georg-August-Universit\u00e4t G\u00f6ttingen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I4210122495","host_organization_name":"Asklepios Klinik St. Georg","host_organization_lineage":["https:\/\/openalex.org\/I4210122495"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https:\/\/openalex.org\/licenses\/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo\/semantics\/conferenceObject"},"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https:\/\/metadata.un.org\/sdg\/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https:\/\/openalex.org\/W1501658549","https:\/\/openalex.org\/W2051634573","https:\/\/openalex.org\/W2079223927","https:\/\/openalex.org\/W2162789043","https:\/\/openalex.org\/W2607130138","https:\/\/openalex.org\/W2662464606","https:\/\/openalex.org\/W2741048352","https:\/\/openalex.org\/W2741957260","https:\/\/openalex.org\/W2784237397","https:\/\/openalex.org\/W2914841899","https:\/\/openalex.org\/W6629865735"],"related_works":["https:\/\/openalex.org\/W1761928473","https:\/\/openalex.org\/W2488601579","https:\/\/openalex.org\/W2991148700","https:\/\/openalex.org\/W2391901998","https:\/\/openalex.org\/W2066272013","https:\/\/openalex.org\/W4241003180","https:\/\/openalex.org\/W1573839549","https:\/\/openalex.org\/W2351247954","https:\/\/openalex.org\/W4232461742","https:\/\/openalex.org\/W2474014892"],"abstract_inverted_index":{"Generally,":[0],"methods":[1],"of":[2,14,81,92,110],"authentication":[3],"and":[4,27,46,54,63,79,108,116,123],"identification":[5],"utilized":[6],"in":[7,57],"asserting":[8],"users'":[9],"credentials":[10,26],"directly":[11],"affect":[12],"security":[13],"offered":[15],"services.":[16],"In":[17],"a":[18,52,113,128],"federated":[19],"environment,":[20],"service":[21,71],"owners":[22],"must":[23],"trust":[24],"external":[25],"make":[28],"access":[29],"control":[30],"decisions":[31],"based":[32],"on":[33],"Assurance":[34,61,65],"Information":[35,62],"received":[36],"from":[37],"remote":[38],"Identity":[39],"Providers":[40],"(IdPs).":[41],"Communities":[42],"(e.g.":[43],"NIST,":[44],"IETF":[45],"etc.)":[47],"have":[48],"tried":[49],"to":[50,59,74,99,121],"provide":[51],"coherent":[53],"justifiable":[55],"architecture":[56],"order":[58],"evaluate":[60],"define":[64,75],"Levels":[66],"(AL).":[67],"Expensive":[68],"deployment,":[69],"limited":[70],"owners'":[72],"authority":[73],"their":[76],"own":[77],"requirements":[78],"lack":[80],"compatibility":[82],"between":[83],"heterogeneous":[84],"existing":[85],"standards":[86],"can":[87],"be":[88],"considered":[89],"as":[90],"some":[91],"the":[93,106],"unsolved":[94],"concerns":[95],"that":[96],"hinder":[97],"developers":[98],"openly":[100],"accept":[101],"published":[102],"works.":[103],"By":[104],"assessing":[105],"advantages":[107],"disadvantages":[109],"well-known":[111],"models,":[112],"comprehensive,":[114],"flexible":[115],"compatible":[117],"solution":[118],"is":[119],"proposed":[120],"value":[122],"deploy":[124],"assurance":[125],"levels":[126],"through":[127],"central":[129],"entity":[130],"called":[131],"Proxy.":[132]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-10-10T00:00:00"}