iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1145/351240.351244
{"id":"https://openalex.org/W2038315427","doi":"https://doi.org/10.1145/351240.351244","title":"Static enforcement of security with types","display_name":"Static enforcement of security with types","publication_year":2000,"publication_date":"2000-09-01","ids":{"openalex":"https://openalex.org/W2038315427","doi":"https://doi.org/10.1145/351240.351244","mag":"2038315427"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/351240.351244","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/357766.351244","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/357766.351244","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019772090","display_name":"Christian Skalka","orcid":"https://orcid.org/0000-0002-0402-809X"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christian Skalka","raw_affiliation_strings":["The Johns Hopkins University ,"],"affiliations":[{"raw_affiliation_string":"The Johns Hopkins University ,","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105925430","display_name":"Scott F. Smith","orcid":"https://orcid.org/0009-0005-0495-2716"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Scott Smith","raw_affiliation_strings":["The Johns Hopkins University ,"],"affiliations":[{"raw_affiliation_string":"The Johns Hopkins University ,","institution_ids":["https://openalex.org/I145311948"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.195,"has_fulltext":false,"cited_by_count":77,"citation_normalized_percentile":{"value":0.860927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Program Analysis and Verification Techniques","score":0.985,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond Nanotechnology and Applications","score":0.9841,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/model-checking","display_name":"Model Checking","score":0.512903},{"id":"https://openalex.org/keywords/hardware-security","display_name":"Hardware Security","score":0.501159},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.4721451},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.42363942}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8644173},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6095727},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.5730091},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5660206},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.4721451},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.46689045},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46303946},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.42363942},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.41592646},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33086613},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.31123692},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26187772},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.21594483},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2156848},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.16144118},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/351240.351244","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/357766.351244","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/351240.351244","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/357766.351244","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1500460345","https://openalex.org/W1886820163","https://openalex.org/W2016017569","https://openalex.org/W2016049804","https://openalex.org/W2022443117","https://openalex.org/W2038677544","https://openalex.org/W2094873755","https://openalex.org/W2102654013","https://openalex.org/W2150174204","https://openalex.org/W2150769115","https://openalex.org/W2160829153","https://openalex.org/W2163636817","https://openalex.org/W2368092000","https://openalex.org/W2996027056","https://openalex.org/W2997271062"],"related_works":["https://openalex.org/W88610236","https://openalex.org/W4238669181","https://openalex.org/W343844859","https://openalex.org/W2883314064","https://openalex.org/W2188404590","https://openalex.org/W2135849267","https://openalex.org/W2112397448","https://openalex.org/W2108147409","https://openalex.org/W2018644264","https://openalex.org/W2017116761"],"abstract_inverted_index":{"A":[0],"number":[1],"of":[2,17,59,109,143],"security":[3,24,80,87,107,129],"systems":[4,12],"for":[5,13,128],"programming":[6],"languages":[7],"have":[8],"recently":[9],"appeared,":[10],"including":[11],"enforcing":[14],"some":[15],"form":[16,58],"access":[18,43],"control.":[19],"The":[20,104],"Java":[21,90,146],"JDK":[22],"1.2":[23],"architecture":[25,38],"is":[26,31,54,62],"one":[27],"such":[28],"system":[29,82,98,105,134],"that":[30,83,132],"widely":[32],"studied":[33],"and":[34,66,122],"used.":[35],"While":[36],"the":[37,85,116,133,136,144],"has":[39,135],"many":[40],"appealing":[41],"features,":[42],"control":[44],"checks":[45],"are":[46],"all":[47],"implemented":[48],"via":[49,94],"dynamic":[50],"method":[51],"calls.":[52],"This":[53],"a":[55,78,95],"highly":[56],"non-declarative":[57],"specification":[60],"which":[61,67],"hard":[63],"to":[64,69,111,138],"read,":[65],"leads":[68],"additional":[70,101],"run-time":[71,102],"overhead.":[72],"In":[73],"this":[74],"paper,":[75],"we":[76],"present":[77],"novel":[79],"type":[81,97],"enforces":[84],"same":[86],"guarantees":[88],"as":[89],"Stack":[91],"Inspection,":[92],"but":[93],"static":[96],"with":[99],"no":[100],"checks.":[103],"allows":[106],"properties":[108],"programs":[110],"be":[112,139],"clearly":[113],"expressed":[114],"within":[115],"types":[117],"themselves.":[118],"We":[119],"also":[120],"define":[121],"prove":[123],"correct":[124],"an":[125],"inference":[126],"algorithm":[127],"types,":[130],"meaning":[131],"potential":[137],"layered":[140],"on":[141],"top":[142],"existing":[145],"architecture,":[147],"without":[148],"requiring":[149],"new":[150],"syntax.":[151]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2038315427","counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":3}],"updated_date":"2024-11-24T18:47:16.185040","created_date":"2016-06-24"}