Class information for: |
Basic class information |
| ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
|---|---|---|---|
| 10330 | 1007 | 23.9 | 20% |
Classes in level above (level 2) |
| ID, lev. above |
Publications | Label for level above |
|---|---|---|
| 2639 | 3012 | PRIVACY CALCULUS//ACCESS CONTROL//INFORMATION PRIVACY |
Terms with highest relevance score |
| Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|---|
| 1 | CONTROLLED QUERY EVALUATION | Author keyword | 15 | 82% | 1% | 9 |
| 2 | ROLE BASED ACCESS CONTROL | Author keyword | 10 | 19% | 4% | 45 |
| 3 | RBAC | Author keyword | 8 | 15% | 5% | 50 |
| 4 | AUTHORIZATION MODELS | Author keyword | 6 | 80% | 0% | 4 |
| 5 | ROLE MAPPING | Author keyword | 5 | 60% | 1% | 6 |
| 6 | ROLE BASED ACCESS CONTROL RBAC | Author keyword | 5 | 32% | 1% | 14 |
| 7 | SECURE INTEROPERATION | Author keyword | 5 | 55% | 1% | 6 |
| 8 | DISTRIBUTED SYSTEM SECURITY | Author keyword | 4 | 67% | 0% | 4 |
| 9 | AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURE | Author keyword | 4 | 75% | 0% | 3 |
| 10 | NESTOR | Address | 4 | 75% | 0% | 3 |
Web of Science journal categories |
Author Key Words |
Key Words Plus |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | RBAC | 17 | 72% | 1% | 13 |
| 2 | ACCESS CONTROL | 8 | 12% | 6% | 62 |
| 3 | ACCESS CONTROL MODEL | 7 | 44% | 1% | 12 |
| 4 | METHOD SCHEMAS | 6 | 100% | 0% | 4 |
| 5 | ACCESS CONTROL MODELS | 2 | 33% | 1% | 6 |
| 6 | TRUST MANAGEMENT | 2 | 15% | 1% | 14 |
| 7 | SCHEMATIC PROTECTION MODEL | 2 | 50% | 0% | 3 |
| 8 | AUTHORIZATION MODEL | 2 | 40% | 0% | 4 |
| 9 | INTEROPERATION | 2 | 33% | 0% | 5 |
| 10 | CONTROL MODELS | 2 | 27% | 1% | 6 |
Journals |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 3 | 12% | 2% | 22 |
Reviews |
| Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
|---|---|---|---|---|
| DATABASE-SECURITY - RESEARCH AND PRACTICE | 1995 | 16 | 1 | 100% |
| Cloud authorization: exploring techniques and approach towards effective access control framework | 2015 | 0 | 5 | 60% |
Address terms |
| Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | NESTOR | 4 | 75% | 0.3% | 3 |
| 2 | CERIAS | 2 | 14% | 1.4% | 14 |
| 3 | INFORMAT EC | 2 | 40% | 0.4% | 4 |
| 4 | SECURE INFORMAT SYST | 2 | 14% | 1.1% | 11 |
| 5 | COORDINAMENTO PROGETTI INTERSETTORIALI | 1 | 100% | 0.2% | 2 |
| 6 | DIGITAL SECUR UNIT | 1 | 50% | 0.2% | 2 |
| 7 | MULTIMEDIA SERV SECUR CERTIFICAT | 1 | 100% | 0.2% | 2 |
| 8 | NCE UFRJ COMP | 1 | 100% | 0.2% | 2 |
| 9 | MATHS COMP | 1 | 24% | 0.4% | 4 |
| 10 | DATABASES INFORMAT SYST GRP | 1 | 40% | 0.2% | 2 |
Related classes at same level (level 1) |
| Rank | Relatedness score | Related classes |
|---|---|---|
| 1 | 0.0000267006 | CREDENTIAL VALIDATION SERVICE//ROLE BASED ACCESS CONTROLS//ACCESS CONTROL IN COLLABORATION ENVIRONMENTS |
| 2 | 0.0000144700 | TRUST NEGOTIATION//DISTRIBUTED PROVING//JAVA BASED MOBILE PHONE APPLICATION |
| 3 | 0.0000135722 | FEATURE INTERACTION//POLICY ANOMALIES//CALL PROCESSING LANGUAGE |
| 4 | 0.0000123119 | LERSAIS//WEB BASED SOCIAL NETWORKS//FERTIGATION SIMULATOR |
| 5 | 0.0000117140 | TRUSTED PERSONAL DEVICE//HIMALIS//LIBERTY ALLIANCE |
| 6 | 0.0000098967 | EDGE PREDICTION//FLEXRFID//HIPPOCRATIC DATABASES |
| 7 | 0.0000085776 | COMPETENCE DESCRIPTION//DATABASE EDUC//ADV E SERV KNOWLEDGE SOC UNIT |
| 8 | 0.0000075727 | BYTECODE VERIFICATION//PREVENT INFORMATION LEAKAGE//SEPARATION LOGIC |
| 9 | 0.0000073359 | USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT |
| 10 | 0.0000068046 | CHAIR MOBILE COMMERCE MULTILATERAL SECUR//QUERY AUTHENTICATION//CSYSEC |