Class information for:
Level 1: INFORMATION FLOW CONTROL//BYTECODE VERIFICATION//LANGUAGE BASED SECURITY

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
20701 449 30.3 23%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
148 3       COMPUTER SCIENCE, SOFTWARE ENGINEERING//COMPUTER SCIENCE, THEORY & METHODS//ACM SIGPLAN NOTICES 63683
237 2             COMPUTER SCIENCE, SOFTWARE ENGINEERING//COMPUTER SCIENCE, THEORY & METHODS//MODEL CHECKING 20142
20701 1                   INFORMATION FLOW CONTROL//BYTECODE VERIFICATION//LANGUAGE BASED SECURITY 449

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 INFORMATION FLOW CONTROL authKW 1148743 6% 68% 25
2 BYTECODE VERIFICATION authKW 957997 4% 78% 18
3 LANGUAGE BASED SECURITY authKW 756932 4% 70% 16
4 PREVENT INFORMATION LEAKAGE authKW 612059 2% 100% 9
5 DECLASSIFICATION authKW 514292 2% 69% 11
6 RUNTIME ENFORCEMENT authKW 500772 2% 82% 9
7 QUANTITATIVE INFORMATION FLOW authKW 476046 2% 100% 7
8 NON INTERFERENCE authKW 348172 4% 32% 16
9 EDIT AUTOMATA authKW 340033 1% 100% 5
10 STACK INSPECTION authKW 310880 2% 57% 8

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Software Engineering 26504 56% 0% 251
2 Computer Science, Theory & Methods 12167 45% 0% 203
3 Computer Science, Information Systems 2775 21% 0% 93
4 Logic 1156 4% 0% 16
5 Computer Science, Artificial Intelligence 656 10% 0% 47
6 Computer Science, Hardware & Architecture 546 6% 0% 29
7 Telecommunications 64 4% 0% 17
8 Engineering, Electrical & Electronic 7 5% 0% 23
9 Mathematics, Applied 4 3% 0% 12
10 Engineering, General 1 1% 0% 4

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SMART CARDS 136013 0% 100% 2
2 CITI NOVA COMP SCI INFORMAT 68007 0% 100% 1
3 CNRS MATH INFORMAT 68007 0% 100% 1
4 COMPUTER SECUR 68007 0% 100% 1
5 CYRIX DESKTOP SOFTWARE GRP 68007 0% 100% 1
6 D SE S 395 68007 0% 100% 1
7 DIBRIS AI 68007 0% 100% 1
8 DIPSAT 68007 0% 100% 1
9 GIE DYADE 68007 0% 100% 1
10 INDES PROJECT 68007 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ACM SIGPLAN NOTICES 48957 13% 1% 59
2 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 23013 2% 4% 8
3 INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING 20922 0% 15% 2
4 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 19176 2% 3% 9
5 ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 18689 4% 2% 16
6 JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING 16625 2% 3% 9
7 JOURNAL OF FUNCTIONAL PROGRAMMING 13586 2% 3% 8
8 MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE 12934 2% 2% 10
9 LECTURE NOTES IN COMPUTER SCIENCE 9423 25% 0% 111
10 COMPUTER LANGUAGES SYSTEMS & STRUCTURES 7718 1% 2% 5

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 INFORMATION FLOW CONTROL 1148743 6% 68% 25 Search INFORMATION+FLOW+CONTROL Search INFORMATION+FLOW+CONTROL
2 BYTECODE VERIFICATION 957997 4% 78% 18 Search BYTECODE+VERIFICATION Search BYTECODE+VERIFICATION
3 LANGUAGE BASED SECURITY 756932 4% 70% 16 Search LANGUAGE+BASED+SECURITY Search LANGUAGE+BASED+SECURITY
4 PREVENT INFORMATION LEAKAGE 612059 2% 100% 9 Search PREVENT+INFORMATION+LEAKAGE Search PREVENT+INFORMATION+LEAKAGE
5 DECLASSIFICATION 514292 2% 69% 11 Search DECLASSIFICATION Search DECLASSIFICATION
6 RUNTIME ENFORCEMENT 500772 2% 82% 9 Search RUNTIME+ENFORCEMENT Search RUNTIME+ENFORCEMENT
7 QUANTITATIVE INFORMATION FLOW 476046 2% 100% 7 Search QUANTITATIVE+INFORMATION+FLOW Search QUANTITATIVE+INFORMATION+FLOW
8 NON INTERFERENCE 348172 4% 32% 16 Search NON+INTERFERENCE Search NON+INTERFERENCE
9 EDIT AUTOMATA 340033 1% 100% 5 Search EDIT+AUTOMATA Search EDIT+AUTOMATA
10 STACK INSPECTION 310880 2% 57% 8 Search STACK+INSPECTION Search STACK+INSPECTION

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 DE FRANCESCO, N , MARTINI, L , (2007) INSTRUCTION-LEVEL SECURITY ANALYSIS FOR INFORMATION FLOW IN STACK-BASED ASSEMBLY LANGUAGES.INFORMATION AND COMPUTATION. VOL. 205. ISSUE 9. P. 1334 -1370 17 94% 0
2 LEROY, X , (2003) JAVA BYTECODE VERIFICATION: ALGORITHMS AND FORMALIZATIONS.JOURNAL OF AUTOMATED REASONING. VOL. 30. ISSUE 3-4. P. 235-269 11 100% 50
3 BARTHE, G , PICHARDIE, D , REZK, T , (2013) A CERTIFIED LIGHTWEIGHT NON-INTERFERENCE JAVA BYTECODE VERIFIER.MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE. VOL. 23. ISSUE 5. P. 1032 -1081 11 79% 4
4 DE FRANCESCO, N , MARTINI, L , (2007) INSTRUCTION-LEVEL SECURITY TYPING BY ABSTRACT INTERPRETATION.INTERNATIONAL JOURNAL OF INFORMATION SECURITY. VOL. 6. ISSUE 2-3. P. 85-106 10 100% 1
5 BARBUTI, R , DE FRANCESCO, N , TESEI, L , (2010) AN ABSTRACT INTERPRETATION APPROACH FOR ENHANCING THE JAVA BYTECODE VERIFIER.COMPUTER JOURNAL. VOL. 53. ISSUE 6. P. 679 -700 10 91% 0
6 COGLIO, A , (2003) IMPROVING THE OFFICIAL SPECIFICATION OF JAVA BYTECODE VERIFICATION.CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE. VOL. 15. ISSUE 2. P. 155 -179 11 92% 3
7 CHOU, SC , (2007) MANAGING USER ASSOCIATIONS AND THE FACTORS OF LAWS AND CULTURES IN AN INFORMATION FLOW CONTROL MODEL FOR OBJECT-ORIENTED SYSTEMS.JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. VOL. 23. ISSUE 3. P. 945 -957 9 100% 0
8 DAM, M , JACOBS, B , LUNDBLAD, A , PIESSENS, F , (2015) SECURITY MONITOR INLINING AND CERTIFICATION FOR MULTITHREADED JAVA.MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE. VOL. 25. ISSUE 3. P. 528 -565 9 82% 0
9 CHOU, SC , LO, WK , LAI, CW , (2006) INFORMATION FLOW CONTROL IN MULTITHREAD APPLICATIONS BASED ON ACCESS CONTROL LISTS.INFORMATION AND SOFTWARE TECHNOLOGY. VOL. 48. ISSUE 8. P. 717 -725 9 100% 1
10 BERNARDESCHI, C , DE FRANCESCO, N , LETTIERI, G , MARTINI, L , MASCI, P , (2008) DECOMPOSING BYTECODE VERIFICATION BY ABSTRACT INTERPRETATION.ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS. VOL. 31. ISSUE 1. P. - 13 65% 1

Classes with closest relation at Level 1



Rank Class id link
1 30550 RUNTIME VERIFICATION//RUNTIME MONITORING//EXECUTION BASED MODEL CHECKING
2 31925 ABSTRACT STATE MACHINES//COREASM//DIP TECNOL INFORMAZ
3 6407 ABSTRACT INTERPRETATION//SEPARATION LOGIC//PREDICATE ABSTRACTION
4 8999 PI CALCULUS//PROCESS CALCULI//SESSION TYPES
5 10353 ACCESS CONTROL//RBAC//ROLE BASED ACCESS CONTROL
6 11223 SECURITY PROTOCOLS//FAIR EXCHANGE//CRYPTOGRAPHIC PROTOCOLS
7 12130 POINTER ANALYSIS//POINTS TO ANALYSIS//PARTIAL REDUNDANCY ELIMINATION
8 4829 ASPECT ORIENTED PROGRAMMING//ACM SIGPLAN NOTICES//PLEIAD
9 25529 SQL INJECTION ATTACK//SQL INJECTION//SOFTWARE FAULT ISOLATION
10 8988 JOURNAL OF FUNCTIONAL PROGRAMMING//ACM SIGPLAN NOTICES//HASKELL

Go to start page