{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:13:09Z","timestamp":1743145989703,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030494421"},{"type":"electronic","value":"9783030494438"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49443-8_18","type":"book-chapter","created":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T12:02:48Z","timestamp":1593259368000},"page":"382-402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving Interoperability in Multi-domain Enterprise Right Management Applications"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,28]]},"reference":[{"key":"18_CR1","unstructured":"FUSE: Filesystem in userspace. \nhttp:\/\/fuse.sourceforge.net"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-01004-0_10","volume-title":"Transactions on Computational Science IV","author":"S Aich","year":"2009","unstructured":"Aich, S., Mondal, S., Sural, S., Majumdar, A.K.: Role based access control with spatiotemporal context for mobile applications. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 177\u2013199. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-01004-0_10"},{"key":"18_CR3","unstructured":"ARM Ltd.: ARM TrustZone. \nhttp:\/\/www.arm.com\/trustzone\n\n. Accessed 24 June 2018"},{"issue":"3","key":"18_CR4","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191\u2013233 (2001). \nhttps:\/\/doi.org\/10.1145\/501978.501979","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"4","key":"18_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535929","volume":"9","author":"A Bessani","year":"2013","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., Sousa, P.: DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage 9(4), 1\u201333 (2013). \nhttps:\/\/doi.org\/10.1145\/2535929","journal-title":"ACM Trans. Storage"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Blaze, M.: A cryptographic file system for UNIX. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 9\u201316. ACM (1993)","DOI":"10.1145\/168588.168590"},{"issue":"6","key":"18_CR7","doi-asserted-by":"publisher","first-page":"709","DOI":"10.3233\/JCS-150539","volume":"23","author":"P Bonatti","year":"2015","unstructured":"Bonatti, P., Galdi, C., Torres, D.: Event-driven RBAC. J. Comput. Secur. 23(6), 709\u2013757 (2015). \nhttps:\/\/doi.org\/10.3233\/JCS-150539","journal-title":"J. Comput. Secur."},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Bonatti, P.A., Galdi, C., Torres, D.: ERBAC: event-driven RBAC. In: Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT 2013, Amsterdam, The Netherlands, 12\u201314 June 2013, pp. 125\u2013136 (2013). \nhttps:\/\/doi.org\/10.1145\/2462410.2462415\n\n. \nhttp:\/\/doi.acm.org\/10.1145\/2462410.2462415","DOI":"10.1145\/2462410.2462415"},{"issue":"3","key":"18_CR9","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s11227-013-0975-y","volume":"67","author":"A Castiglione","year":"2013","unstructured":"Castiglione, A., Catuogno, L., Del Sorbo, A., Fiore, U., Palmieri, F.: A secure file sharing service for distributed computing environments. J. Supercomput. 67(3), 691\u2013710 (2013). \nhttps:\/\/doi.org\/10.1007\/s11227-013-0975-y","journal-title":"J. Supercomput."},{"key":"18_CR10","unstructured":"Cattaneo, G., Catuogno, L., Sorbo, A.D., Persiano, P.: The design and implementation of a transparent cryptographic file system for UNIX. In: USENIX Annual Technical Conference, FREENIX Track, pp. 199\u2013212. USENIX (2001)"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Catuogno, L., Galdi, C.: A fine-grained general purpose secure storage facility for trusted execution environment. In: Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 588\u2013595. INSTICC, SciTePress (2019). \nhttps:\/\/doi.org\/10.5220\/0007578605880595","DOI":"10.5220\/0007578605880595"},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Catuogno, L., Galdi, C., Riccio, D.: Flexible and robust enterprise right management. In: IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, 27\u201330 June 2016, pp. 1257\u20131262 (2016). \nhttps:\/\/doi.org\/10.1109\/ISCC.2016.7543909\n\n. \nhttp:\/\/doi.ieeecomputersociety.org\/10.1109\/ISCC.2016.7543909","DOI":"10.1109\/ISCC.2016.7543909"},{"key":"18_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1023-9","author":"L Catuogno","year":"2018","unstructured":"Catuogno, L., Galdi, C., Riccio, D.: Off-line enterprise rights management leveraging biometric key binding and secure hardware. J. Ambient Intell. Humaniz. Comput. (2018). \nhttps:\/\/doi.org\/10.1007\/s12652-018-1023-9","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.jnca.2013.05.006","volume":"38","author":"L Catuogno","year":"2014","unstructured":"Catuogno, L., L\u00f6hr, H., Winandy, M., Sadeghi, A.R.: A trusted versioning file system for passive mobile storage devices. J. Netw. Comput. Appl. 38, 65\u201375 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"18_CR15","unstructured":"Filament, P.S.A., Klensin, K.: Uniform Resource Names (URNs). RFC 8141, IETF, April 2017. \nhttp:\/\/www.rfc-editor.org\/rfc\/rfc8141.txt"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Fitzek, A., Achleitner, F., Winter, J., Hein, D.: The ANDIX research OS\u2014ARM TrustZone meets industrial control systems security. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), pp. 88\u201393. IEEE (2015)","DOI":"10.1109\/INDIN.2015.7281715"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Garg, D., Pfenning, F.: A proof-carrying file system. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 349\u2013364. IEEE (2010)","DOI":"10.1109\/SP.2010.28"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Geambasu, R., John, J.P., Gribble, S.D., Kohno, T., Levy, H.M.: Keypad: an auditing file system for theft-prone devices. In: Proceedings of the 6th Conference on Computer Systems, pp. 1\u201316. ACM (2011)","DOI":"10.1145\/1966445.1966447"},{"key":"18_CR19","unstructured":"GlobalPlatform: TEE system architecture v1.0, December 2011. \nhttp:\/\/globalplatform.org"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Hein, D., Winter, J., Fitzek, A.: Secure block device\u2013secure, flexible, and efficient data storage for ARM TrustZone systems. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1, pp. 222\u2013229. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.378"},{"key":"18_CR21","unstructured":"Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: Chase, J. (ed.) Proceedings of the FAST 2003 Conference on File and Storage Technologies, 31 March\u20132 April 2003, Cathedral Hill Hotel, San Francisco, California, USA, pp. 29\u201342. USENIX (2003)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Li, X., Hu, H., Bai, G., Jia, Y., Liang, Z., Saxena, P.: Droidvault: a trusted data vault for android devices. In: 2014 19th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 29\u201338. IEEE (2014)","DOI":"10.1109\/ICECCS.2014.13"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Li, Z., Liang, M., O\u2019brien, L., Zhang, H.: The cloud\u2019s cloudy moment: a systematic survey of public cloud service outage. arXiv preprint \narXiv:1312.6485\n\n (2013)","DOI":"10.11591\/closer.v2i5.5125"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Matos, D.R., Pardal, M.L., Carle, G., Correia, M.: Rockfs: cloud-backed file system resilience to client-side attacks. In: Proceedings of the 19th International Middleware Conference, pp. 107\u2013119. ACM (2018)","DOI":"10.1145\/3274808.3274817"},{"key":"18_CR25","unstructured":"Pei, M., Tschofenig, H., Wheeler, D., Atyeo, A., Dapeng, L.: Trusted execution environment provisioning architecture (TEEP). Internet-draft, IETF (2019). \nhttps:\/\/tools.ietf.org\/pdf\/draft-ietf-teep-architecture-02.pdf"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Pereira, S., Alves, A., Santos, N., Chaves, R.: Storekeeper: a security-enhanced cloud storage aggregation service. In: 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), pp. 111\u2013120. IEEE (2016)","DOI":"10.1109\/SRDS.2016.023"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Peters, T., Gondree, M., Peterson, Z.N.J.: DEFY: a deniable, encrypted file system for log-structured storage. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, 8\u201311 February 2014. The Internet Society (2015)","DOI":"10.14722\/ndss.2015.23078"},{"key":"18_CR28","doi-asserted-by":"publisher","unstructured":"Riccio, D., Galdi, C., Manzo, R.: Biometric\/cryptographic keys binding based on function minimization. In: 12th International Conference on Signal-Image Technology & Internet-Based Systems, SITIS 2016, Naples, Italy, 28 November - 1 December 2016, pp. 144\u2013150 (2016). \nhttps:\/\/doi.org\/10.1109\/SITIS.2016.31","DOI":"10.1109\/SITIS.2016.31"},{"key":"18_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-61770-1_28","volume-title":"Computer Security \u2014 ESORICS 96","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R.: Role hierarchies and constraints for lattice-based access controls. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 65\u201379. Springer, Heidelberg (1996). \nhttps:\/\/doi.org\/10.1007\/3-540-61770-1_28"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Stefanov, E., van Dijk, M., Juels, A., Oprea, A.: Iris: a scalable cloud file system with efficient integrity checks. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 229\u2013238. ACM (2012)","DOI":"10.1145\/2420950.2420985"},{"issue":"6","key":"18_CR31","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"18_CR32","unstructured":"Vrable, M., Savage, S., Voelker, G.M.: BlueSky: a cloud-backed file system for the enterprise. In: Proceedings of the 10th USENIX Conference on File and Storage Technologies, pp. 19\u201319. USENIX Association (2012)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Z., Murmuria, R., Stavrou, A.: Implementing and optimizing an encryption filesystem on android. In: 2012 IEEE 13th International Conference on Mobile Data Management (MDM), pp. 52\u201362. IEEE (2012)","DOI":"10.1109\/MDM.2012.31"},{"issue":"4","key":"18_CR34","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1357010.1352602","volume":"42","author":"C Weinhold","year":"2008","unstructured":"Weinhold, C., H\u00e4rtig, H.: VPFS: building a virtual private file system with a small trusted computing base. ACM SIGOPS Oper. Syst. Rev. 42(4), 81\u201393 (2008)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Yun, A., Shi, C., Kim, Y.: On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 67\u201376. ACM (2009)","DOI":"10.1145\/1655008.1655017"}],"container-title":["Communications in Computer and Information Science","Information Systems Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49443-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T12:29:58Z","timestamp":1593260998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49443-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030494421","9783030494438"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49443-8_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icissp2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icissp.org\/?y=2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}