iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1145/320384.320392
{"id":"https://openalex.org/W2295471304","doi":"https://doi.org/10.1145/320384.320392","title":"Confined types","display_name":"Confined types","publication_year":1999,"publication_date":"1999-10-01","ids":{"openalex":"https://openalex.org/W2295471304","doi":"https://doi.org/10.1145/320384.320392","mag":"2295471304"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/320384.320392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/320385.320392","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/320385.320392","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084307280","display_name":"Jan V\u00edtek","orcid":"https://orcid.org/0000-0003-4052-3458"},"institutions":[{"id":"https://openalex.org/I2801333002","display_name":"Purdue University System","ror":"https://ror.org/05p8z3f47","country_code":"US","type":"education","lineage":["https://openalex.org/I2801333002"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jan Vitek","raw_affiliation_strings":["Purdue University, Dept. of Computer Sciences"],"affiliations":[{"raw_affiliation_string":"Purdue University, Dept. of Computer Sciences","institution_ids":["https://openalex.org/I2801333002"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013957789","display_name":"Boris Bokowski","orcid":null},"institutions":[{"id":"https://openalex.org/I75951250","display_name":"Freie Universit\u00e4t Berlin","ror":"https://ror.org/046ak2485","country_code":"DE","type":"education","lineage":["https://openalex.org/I75951250"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Boris Bokowski","raw_affiliation_strings":["Freie Universit\u00e4t Berlin, GMD-FIRST Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Freie Universit\u00e4t Berlin, GMD-FIRST Berlin, Germany","institution_ids":["https://openalex.org/I75951250"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.093,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":139,"citation_normalized_percentile":{"value":0.861143,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"82","last_page":"96"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encapsulation","display_name":"Encapsulation","score":0.5494213}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86631066},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6728194},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.61355245},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5899646},{"id":"https://openalex.org/C73752529","wikidata":"https://www.wikidata.org/wiki/Q79872","display_name":"Object-oriented programming","level":2,"score":0.571881},{"id":"https://openalex.org/C81147070","wikidata":"https://www.wikidata.org/wiki/Q1172449","display_name":"Encapsulation (networking)","level":2,"score":0.5494213},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.53160834},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.4368719},{"id":"https://openalex.org/C512554520","wikidata":"https://www.wikidata.org/wiki/Q815844","display_name":"Method","level":3,"score":0.42768824},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.422453},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.41240674},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37558836},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.34660956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26580846},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15187001}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/320384.320392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/320385.320392","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/320384.320392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/320385.320392","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.62,"display_name":"Quality education"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":41,"referenced_works":["https://openalex.org/W1483872283","https://openalex.org/W1491466960","https://openalex.org/W1518533182","https://openalex.org/W1520961854","https://openalex.org/W1551178922","https://openalex.org/W1569578717","https://openalex.org/W1602897534","https://openalex.org/W1644882639","https://openalex.org/W1649645444","https://openalex.org/W1769535108","https://openalex.org/W1787843929","https://openalex.org/W1996360405","https://openalex.org/W2006872422","https://openalex.org/W2012755172","https://openalex.org/W2016017569","https://openalex.org/W2020841721","https://openalex.org/W2021538392","https://openalex.org/W2049962807","https://openalex.org/W2049984112","https://openalex.org/W2057503672","https://openalex.org/W2058602146","https://openalex.org/W2073407646","https://openalex.org/W2094873755","https://openalex.org/W2102654013","https://openalex.org/W2110012131","https://openalex.org/W2110542534","https://openalex.org/W2117534212","https://openalex.org/W2122127397","https://openalex.org/W2133546079","https://openalex.org/W2136839747","https://openalex.org/W2137417304","https://openalex.org/W2139272205","https://openalex.org/W2147765687","https://openalex.org/W2158126684","https://openalex.org/W2276797782","https://openalex.org/W4211079902","https://openalex.org/W4232836212","https://openalex.org/W4234055316","https://openalex.org/W4247699568","https://openalex.org/W4285719527","https://openalex.org/W79777781"],"related_works":["https://openalex.org/W636365802","https://openalex.org/W55128154","https://openalex.org/W2895480205","https://openalex.org/W2357940286","https://openalex.org/W214703013","https://openalex.org/W2132560534","https://openalex.org/W1882317559","https://openalex.org/W149935530","https://openalex.org/W1494774170","https://openalex.org/W1481087101"],"abstract_inverted_index":{"Sharing":[0],"and":[1,42,117],"transfer":[2],"of":[3,32,46,78,114],"object":[4,61],"references":[5,62],"is":[6,124],"difficult":[7],"to":[8,55,98],"control":[9],"in":[10,22,39],"object-oriented":[11,23,40],"languages.":[12,24],"Unconstrained":[13],"sharing":[14],"poses":[15],"serious":[16],"problems":[17],"for":[18,64],"writing":[19],"secure":[20,47],"components":[21],"In":[25],"this":[26],"paper,":[27],"we":[28],"present":[29,127],"a":[30,107,111,119],"set":[31],"inexpensive":[33],"syntactic":[34],"constraints":[35],"that":[36,72,122],"strengthen":[37],"encapsulation":[38],"programs":[41,116],"facilitate":[43],"the":[44,76,79],"implementation":[45],"systems.":[48],"We":[49,104,126],"introduce":[50],"two":[51],"mechanisms:":[52],"confined":[53,102],"types":[54,84],"impose":[56],"static":[57,120],"scoping":[58],"on":[59],"dynamic":[60],"and,":[63],"technical":[65],"reasons,":[66],"anonymous":[67,93],"methods":[68,71,94],"which":[69,109],"are":[70],"do":[73],"not":[74],"reveal":[75],"identity":[77],"current":[80],"instance":[81],"(this).":[82],"Confined":[83],"protect":[85],"objects":[86],"from":[87,101],"use":[88],"by":[89],"untrusted":[90],"code,":[91],"while":[92],"allow":[95],"standard":[96],"classes":[97],"be":[99],"reused":[100],"classes.":[103],"have":[105],"implemented":[106],"verifier":[108],"performs":[110],"modular":[112],"analysis":[113],"Java":[115],"provides":[118],"guarantee":[121],"confinement":[123],"respected.":[125],"security":[128],"related":[129],"programming":[130],"examples.":[131]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2295471304","counts_by_year":[{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":4}],"updated_date":"2024-12-12T02:40:56.825313","created_date":"2016-06-24"}