Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
24805 | 251 | 22.5 | 19% |
Classes in level above (level 2) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
2639 | 3012 | PRIVACY CALCULUS//ACCESS CONTROL//INFORMATION PRIVACY |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | TRUST NEGOTIATION | Author keyword | 5 | 32% | 6% | 14 |
2 | DISTRIBUTED PROVING | Author keyword | 2 | 67% | 1% | 2 |
3 | JAVA BASED MOBILE PHONE APPLICATION | Author keyword | 2 | 67% | 1% | 2 |
4 | SOAP PROTOCOL | Author keyword | 2 | 67% | 1% | 2 |
5 | XKMS PROTOCOL | Author keyword | 2 | 67% | 1% | 2 |
6 | AUTOMATED TRUST NEGOTIATION | Author keyword | 2 | 27% | 2% | 6 |
7 | TRUST NEGOTIATIONS | Author keyword | 1 | 50% | 1% | 2 |
8 | INFORMAT TECHNOL INTEGRAT | Address | 1 | 33% | 1% | 2 |
9 | ACCOUNTING AUDIT | Author keyword | 1 | 50% | 0% | 1 |
10 | ATOMIC EXECUTION | Author keyword | 1 | 50% | 0% | 1 |
Web of Science journal categories |
Author Key Words |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | TRUST NEGOTIATION | 5 | 32% | 6% | 14 | Search TRUST+NEGOTIATION | Search TRUST+NEGOTIATION |
2 | DISTRIBUTED PROVING | 2 | 67% | 1% | 2 | Search DISTRIBUTED+PROVING | Search DISTRIBUTED+PROVING |
3 | JAVA BASED MOBILE PHONE APPLICATION | 2 | 67% | 1% | 2 | Search JAVA+BASED+MOBILE+PHONE+APPLICATION | Search JAVA+BASED+MOBILE+PHONE+APPLICATION |
4 | SOAP PROTOCOL | 2 | 67% | 1% | 2 | Search SOAP+PROTOCOL | Search SOAP+PROTOCOL |
5 | XKMS PROTOCOL | 2 | 67% | 1% | 2 | Search XKMS+PROTOCOL | Search XKMS+PROTOCOL |
6 | AUTOMATED TRUST NEGOTIATION | 2 | 27% | 2% | 6 | Search AUTOMATED+TRUST+NEGOTIATION | Search AUTOMATED+TRUST+NEGOTIATION |
7 | TRUST NEGOTIATIONS | 1 | 50% | 1% | 2 | Search TRUST+NEGOTIATIONS | Search TRUST+NEGOTIATIONS |
8 | ACCOUNTING AUDIT | 1 | 50% | 0% | 1 | Search ACCOUNTING+AUDIT | Search ACCOUNTING+AUDIT |
9 | ATOMIC EXECUTION | 1 | 50% | 0% | 1 | Search ATOMIC+EXECUTION | Search ATOMIC+EXECUTION |
10 | AUTHORIZATION CONTROL | 1 | 50% | 0% | 1 | Search AUTHORIZATION+CONTROL | Search AUTHORIZATION+CONTROL |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | TRUST NEGOTIATION | 1 | 50% | 1% | 2 |
2 | DISTRIBUTED SIMULATIONS | 1 | 50% | 0% | 1 |
3 | SPKI SDSI | 1 | 50% | 0% | 1 |
4 | TRUST MODELS | 0 | 33% | 0% | 1 |
5 | PKI | 0 | 15% | 1% | 2 |
6 | SEMIJOINS | 0 | 25% | 0% | 1 |
7 | COMMON INFORMATION MODEL | 0 | 20% | 0% | 1 |
8 | TRUST ESTABLISHMENT | 0 | 20% | 0% | 1 |
9 | USAGE CONTROL | 0 | 20% | 0% | 1 |
10 | METASYSTEMS | 0 | 17% | 0% | 1 |
Journals |
Reviews |
Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
---|---|---|---|---|
Comments on a theorem on grid access control | 2006 | 0 | 4 | 75% |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | INFORMAT TECHNOL INTEGRAT | 1 | 33% | 0.8% | 2 |
2 | CREATE NET | 1 | 50% | 0.4% | 1 |
3 | DIPARTIMENTO SCI CULTURA POLITICHE INFORMAZ | 1 | 50% | 0.4% | 1 |
4 | IBM ADV STUDIES ATLANTIC | 1 | 50% | 0.4% | 1 |
5 | PARIS PROJECT | 1 | 50% | 0.4% | 1 |
6 | PURDUE UNIV SCI | 1 | 50% | 0.4% | 1 |
7 | SIERA | 1 | 50% | 0.4% | 1 |
8 | TELECOMMUN SYST SOFTWARE GRP | 1 | 50% | 0.4% | 1 |
9 | GRP CTO | 0 | 33% | 0.4% | 1 |
10 | LOGIST COMP INTERNETWORKING | 0 | 33% | 0.4% | 1 |
Related classes at same level (level 1) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000208891 | CREDENTIAL VALIDATION SERVICE//ROLE BASED ACCESS CONTROLS//ACCESS CONTROL IN COLLABORATION ENVIRONMENTS |
2 | 0.0000195057 | CHAIR MOBILE COMMERCE MULTILATERAL SECUR//QUERY AUTHENTICATION//CSYSEC |
3 | 0.0000180171 | EDGE PREDICTION//FLEXRFID//HIPPOCRATIC DATABASES |
4 | 0.0000174217 | TRUSTED PERSONAL DEVICE//HIMALIS//LIBERTY ALLIANCE |
5 | 0.0000147254 | TRUST MANAGEMENT//REPUTATION SYSTEMS//TRUST AND REPUTATION MANAGEMENT |
6 | 0.0000144700 | CONTROLLED QUERY EVALUATION//ROLE BASED ACCESS CONTROL//RBAC |
7 | 0.0000125690 | PROVABLE DATA POSSESSION//CONVERGENT ENCRYPTION//PUBLIC AUDITABILITY |
8 | 0.0000104677 | ACTIVE NETWORKS//DISTRIBUTED MULTIMEDIA GRP//ACTIVE TELECOMMUNICATION NETWORK |
9 | 0.0000086813 | FEATURE INTERACTION//POLICY ANOMALIES//CALL PROCESSING LANGUAGE |
10 | 0.0000080035 | SECURITY PROTOCOLS//DOLEV YAO MODEL//CRYPTOGRAPHIC PROTOCOLS |