Panel Session: What Are the Key Challenges in Distributed Security? View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2008

AUTHORS

Steve Barker , David Chadwick , Jason Crampton , Emil Lupu , Bhavani Thuraisingham

ABSTRACT

The principal motivation for organizing a panel session at DBSEC’08 was to invite a number of distinguished researchers in data security to present their thoughts and to stimulate conference debate on a question of major importance: what are the key future challenges in distributed data security? The thoughts of the panellists on this issue are summarized in this article. More... »

PAGES

219-221

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-70567-3_17

DOI

http://dx.doi.org/10.1007/978-3-540-70567-3_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1053426075


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Dept. of Computer Science, King\u2019s College London, UK", 
          "id": "http://www.grid.ac/institutes/grid.13097.3c", 
          "name": [
            "Dept. of Computer Science, King\u2019s College London, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Barker", 
        "givenName": "Steve", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Computing Laboratory, University of Kent, UK", 
          "id": "http://www.grid.ac/institutes/grid.9759.2", 
          "name": [
            "Computing Laboratory, University of Kent, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chadwick", 
        "givenName": "David", 
        "id": "sg:person.015215206233.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015215206233.21"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ISG, Royal Holloway, University of London, UK", 
          "id": "http://www.grid.ac/institutes/grid.4970.a", 
          "name": [
            "ISG, Royal Holloway, University of London, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Crampton", 
        "givenName": "Jason", 
        "id": "sg:person.07726274655.09", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07726274655.09"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. of Computing, Imperial College London, UK", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Dept. of Computing, Imperial College London, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lupu", 
        "givenName": "Emil", 
        "id": "sg:person.013404167044.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Texas at Dallas, USA", 
          "id": "http://www.grid.ac/institutes/grid.267323.1", 
          "name": [
            "University of Texas at Dallas, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Thuraisingham", 
        "givenName": "Bhavani", 
        "id": "sg:person.013354331435.86", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013354331435.86"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2008", 
    "datePublishedReg": "2008-01-01", 
    "description": "The principal motivation for organizing a panel session at DBSEC\u201908 was to invite a number of distinguished researchers in data security to present their thoughts and to stimulate conference debate on a question of major importance: what are the key future challenges in distributed data security? The thoughts of the panellists on this issue are summarized in this article.", 
    "editor": [
      {
        "familyName": "Atluri", 
        "givenName": "Vijay", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-70567-3_17", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-70566-6", 
        "978-3-540-70567-3"
      ], 
      "name": "Data and Applications Security XXII", 
      "type": "Book"
    }, 
    "keywords": [
      "data security", 
      "security", 
      "key challenges", 
      "key future challenges", 
      "panel session", 
      "distinguished researchers", 
      "challenges", 
      "principal motivation", 
      "future challenges", 
      "researchers", 
      "issues", 
      "conference debates", 
      "motivation", 
      "number", 
      "sessions", 
      "major importance", 
      "article", 
      "questions", 
      "thought", 
      "importance", 
      "panelists", 
      "debate"
    ], 
    "name": "Panel Session: What Are the Key Challenges in Distributed Security?", 
    "pagination": "219-221", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1053426075"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-70567-3_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-70567-3_17", 
      "https://app.dimensions.ai/details/publication/pub.1053426075"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:13", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_218.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-70567-3_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70567-3_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70567-3_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70567-3_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70567-3_17'


 

This table displays all metadata directly associated to this object as RDF triples.

120 TRIPLES      22 PREDICATES      47 URIs      40 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-70567-3_17 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N5923c0439ffb4af9b1eeeb3b27b9bdc2
4 schema:datePublished 2008
5 schema:datePublishedReg 2008-01-01
6 schema:description The principal motivation for organizing a panel session at DBSEC’08 was to invite a number of distinguished researchers in data security to present their thoughts and to stimulate conference debate on a question of major importance: what are the key future challenges in distributed data security? The thoughts of the panellists on this issue are summarized in this article.
7 schema:editor Nf110460564be4c299c8f4fb06f010345
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nf6a5527c0fff4ae4ab4437044384c216
11 schema:keywords article
12 challenges
13 conference debates
14 data security
15 debate
16 distinguished researchers
17 future challenges
18 importance
19 issues
20 key challenges
21 key future challenges
22 major importance
23 motivation
24 number
25 panel session
26 panelists
27 principal motivation
28 questions
29 researchers
30 security
31 sessions
32 thought
33 schema:name Panel Session: What Are the Key Challenges in Distributed Security?
34 schema:pagination 219-221
35 schema:productId Nbc1a232e38c349ff93f84d8a8a951577
36 Ne037857fbfd1472d850e1a0ac5a1d963
37 schema:publisher N30a24ab0f44a4e37a70d3417e2f8ead8
38 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053426075
39 https://doi.org/10.1007/978-3-540-70567-3_17
40 schema:sdDatePublished 2022-09-02T16:13
41 schema:sdLicense https://scigraph.springernature.com/explorer/license/
42 schema:sdPublisher N33b46b9ea213484a83fd540dcddded64
43 schema:url https://doi.org/10.1007/978-3-540-70567-3_17
44 sgo:license sg:explorer/license/
45 sgo:sdDataset chapters
46 rdf:type schema:Chapter
47 N01c685a61c0a4e4ba05de8e8cfcd2f82 schema:familyName Atluri
48 schema:givenName Vijay
49 rdf:type schema:Person
50 N24a4c2d994214c14ba3a3afc3ffaef7a rdf:first sg:person.015215206233.21
51 rdf:rest N7e7a741d6d024ba98efc1bf6d4b8d435
52 N30a24ab0f44a4e37a70d3417e2f8ead8 schema:name Springer Nature
53 rdf:type schema:Organisation
54 N33b46b9ea213484a83fd540dcddded64 schema:name Springer Nature - SN SciGraph project
55 rdf:type schema:Organization
56 N5923c0439ffb4af9b1eeeb3b27b9bdc2 rdf:first Nccd66faf21a3411fa7ddb8d7d0d3ed27
57 rdf:rest N24a4c2d994214c14ba3a3afc3ffaef7a
58 N5b7b70fe8a694f94af15e0e03c4b37d5 rdf:first sg:person.013404167044.28
59 rdf:rest Nc9aff7aa69ec481890390d318955a31f
60 N7e7a741d6d024ba98efc1bf6d4b8d435 rdf:first sg:person.07726274655.09
61 rdf:rest N5b7b70fe8a694f94af15e0e03c4b37d5
62 Nbc1a232e38c349ff93f84d8a8a951577 schema:name doi
63 schema:value 10.1007/978-3-540-70567-3_17
64 rdf:type schema:PropertyValue
65 Nc9aff7aa69ec481890390d318955a31f rdf:first sg:person.013354331435.86
66 rdf:rest rdf:nil
67 Nccd66faf21a3411fa7ddb8d7d0d3ed27 schema:affiliation grid-institutes:grid.13097.3c
68 schema:familyName Barker
69 schema:givenName Steve
70 rdf:type schema:Person
71 Ne037857fbfd1472d850e1a0ac5a1d963 schema:name dimensions_id
72 schema:value pub.1053426075
73 rdf:type schema:PropertyValue
74 Nf110460564be4c299c8f4fb06f010345 rdf:first N01c685a61c0a4e4ba05de8e8cfcd2f82
75 rdf:rest rdf:nil
76 Nf6a5527c0fff4ae4ab4437044384c216 schema:isbn 978-3-540-70566-6
77 978-3-540-70567-3
78 schema:name Data and Applications Security XXII
79 rdf:type schema:Book
80 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information and Computing Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
84 schema:name Data Format
85 rdf:type schema:DefinedTerm
86 sg:person.013354331435.86 schema:affiliation grid-institutes:grid.267323.1
87 schema:familyName Thuraisingham
88 schema:givenName Bhavani
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013354331435.86
90 rdf:type schema:Person
91 sg:person.013404167044.28 schema:affiliation grid-institutes:grid.7445.2
92 schema:familyName Lupu
93 schema:givenName Emil
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28
95 rdf:type schema:Person
96 sg:person.015215206233.21 schema:affiliation grid-institutes:grid.9759.2
97 schema:familyName Chadwick
98 schema:givenName David
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015215206233.21
100 rdf:type schema:Person
101 sg:person.07726274655.09 schema:affiliation grid-institutes:grid.4970.a
102 schema:familyName Crampton
103 schema:givenName Jason
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07726274655.09
105 rdf:type schema:Person
106 grid-institutes:grid.13097.3c schema:alternateName Dept. of Computer Science, King’s College London, UK
107 schema:name Dept. of Computer Science, King’s College London, UK
108 rdf:type schema:Organization
109 grid-institutes:grid.267323.1 schema:alternateName University of Texas at Dallas, USA
110 schema:name University of Texas at Dallas, USA
111 rdf:type schema:Organization
112 grid-institutes:grid.4970.a schema:alternateName ISG, Royal Holloway, University of London, UK
113 schema:name ISG, Royal Holloway, University of London, UK
114 rdf:type schema:Organization
115 grid-institutes:grid.7445.2 schema:alternateName Dept. of Computing, Imperial College London, UK
116 schema:name Dept. of Computing, Imperial College London, UK
117 rdf:type schema:Organization
118 grid-institutes:grid.9759.2 schema:alternateName Computing Laboratory, University of Kent, UK
119 schema:name Computing Laboratory, University of Kent, UK
120 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...