Class information for:
Level 1: USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
25699 274 18.5 42%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
632 2             AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE 13771
25699 1                   USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT 274

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 USER HIERARCHY authKW 2690540 9% 93% 26
2 KEY ASSIGNMENT authKW 2157524 8% 88% 22
3 CRYPTOGRAPHIC KEY ASSIGNMENT authKW 1114426 4% 100% 10
4 ACCESS CONTROL authKW 918133 33% 9% 90
5 HIERARCHICAL ACCESS CONTROL authKW 509445 3% 57% 8
6 CRYPTOGRAPHIC KEY authKW 464343 2% 83% 5
7 HIERARCHICAL KEY ASSIGNMENT authKW 445770 1% 100% 4
8 KEY MANAGEMENT authKW 410054 14% 10% 37
9 AGENT AUTHENTICATION authKW 334328 1% 100% 3
10 EFFICIENT KEY DERIVATION authKW 334328 1% 100% 3

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 7439 43% 0% 117
2 Computer Science, Software Engineering 1797 19% 0% 52
3 Computer Science, Theory & Methods 1681 22% 0% 60
4 Computer Science, Hardware & Architecture 1140 12% 0% 32
5 Telecommunications 911 16% 0% 43
6 Computer Science, Artificial Intelligence 539 12% 0% 33
7 Mathematics, Applied 302 14% 0% 39
8 Medical Informatics 140 3% 0% 8
9 Engineering, Electrical & Electronic 122 15% 0% 40
10 Health Care Sciences & Services 37 3% 0% 8

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ELEC ENG INFO SCI 111443 0% 100% 1
2 MULTIMEDIA INTERACT EXPERIENCES GRP 111443 0% 100% 1
3 RD SYST DEV 111443 0% 100% 1
4 AUTHENTICAT COMP SECUR 55720 0% 50% 1
5 UAB EDUC THER EUT MUSCULOSKELETAL DI 55720 0% 50% 1
6 MIDS GERIATR EDUC CLIN 37146 0% 33% 1
7 TAIWAN INFORMAT SECUR 29715 1% 13% 2
8 INFORMAT MANAGEMENT 28154 18% 1% 49
9 DIPARTIMENTO INFORMAT PLICAZ 26798 3% 3% 8
10 SECUR THEORY ALGORITHM 26606 1% 6% 4

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 COMPUTERS & SECURITY 49371 8% 2% 23
2 IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES 5879 2% 1% 6
3 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 5782 2% 1% 5
4 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 5301 1% 2% 3
5 SECURITY AND COMMUNICATION NETWORKS 5138 3% 1% 8
6 COMPUTER STANDARDS & INTERFACES 4386 3% 1% 7
7 INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 4332 4% 0% 10
8 JOURNAL OF MEDICAL SYSTEMS 3236 3% 0% 7
9 INFORMATION SCIENCES 2853 5% 0% 14
10 INFORMATION PROCESSING LETTERS 2514 4% 0% 12

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 USER HIERARCHY 2690540 9% 93% 26 Search USER+HIERARCHY Search USER+HIERARCHY
2 KEY ASSIGNMENT 2157524 8% 88% 22 Search KEY+ASSIGNMENT Search KEY+ASSIGNMENT
3 CRYPTOGRAPHIC KEY ASSIGNMENT 1114426 4% 100% 10 Search CRYPTOGRAPHIC+KEY+ASSIGNMENT Search CRYPTOGRAPHIC+KEY+ASSIGNMENT
4 ACCESS CONTROL 918133 33% 9% 90 Search ACCESS+CONTROL Search ACCESS+CONTROL
5 HIERARCHICAL ACCESS CONTROL 509445 3% 57% 8 Search HIERARCHICAL+ACCESS+CONTROL Search HIERARCHICAL+ACCESS+CONTROL
6 CRYPTOGRAPHIC KEY 464343 2% 83% 5 Search CRYPTOGRAPHIC+KEY Search CRYPTOGRAPHIC+KEY
7 HIERARCHICAL KEY ASSIGNMENT 445770 1% 100% 4 Search HIERARCHICAL+KEY+ASSIGNMENT Search HIERARCHICAL+KEY+ASSIGNMENT
8 KEY MANAGEMENT 410054 14% 10% 37 Search KEY+MANAGEMENT Search KEY+MANAGEMENT
9 AGENT AUTHENTICATION 334328 1% 100% 3 Search AGENT+AUTHENTICATION Search AGENT+AUTHENTICATION
10 EFFICIENT KEY DERIVATION 334328 1% 100% 3 Search EFFICIENT+KEY+DERIVATION Search EFFICIENT+KEY+DERIVATION

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 CASTIGLIONE, A , DE SANTIS, A , MASUCCI, B , (2016) KEY INDISTINGUISHABILITY VERSUS STRONG KEY INDISTINGUISHABILITY FOR HIERARCHICAL KEY ASSIGNMENT SCHEMES.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 13. ISSUE 4. P. 451 -460 26 93% 2
2 CASTIGLIONE, A , DE SANTIS, A , MASUCCI, B , PALMIERI, F , HUANG, XY , CASTIGLIONE, A , (2017) SUPPORTING DYNAMIC UPDATES IN STORAGE CLOUDS WITH THE AKL-TAYLOR SCHEME.INFORMATION SCIENCES. VOL. 387. ISSUE . P. 56 -74 27 87% 0
3 CASTIGLIONE, A , DE SANTIS, A , MASUCCI, B , PALMIERI, F , CASTIGLIONE, A , HUANG, XY , (2016) CRYPTOGRAPHIC HIERARCHICAL ACCESS CONTROL FOR DYNAMIC STRUCTURES.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 11. ISSUE 10. P. 2349 -2364 24 77% 2
4 CAFARO, M , CIVINO, R , MASUCCI, B , (2015) ON THE EQUIVALENCE OF TWO SECURITY NOTIONS FOR HIERARCHICAL KEY ASSIGNMENT SCHEMES IN THE UNCONDITIONAL SETTING.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 12. ISSUE 4. P. 485 -490 21 100% 0
5 LO, JW , HWANG, MS , LIU, CH , (2013) A SIMPLE KEY ASSIGNMENT FOR ACCESS CONTROL BASED ON POLYNOMIAL.ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING. VOL. 38. ISSUE 6. P. 1397-1403 15 100% 0
6 ODELU, V , DAS, AK , GOSWAMI, A , (2014) A SECURE EFFECTIVE KEY MANAGEMENT SCHEME FOR DYNAMIC ACCESS CONTROL IN A LARGE LEAF CLASS HIERARCHY.INFORMATION SCIENCES. VOL. 269. ISSUE . P. 270-285 14 88% 6
7 TANG, SH , LI, XY , HUANG, XY , XIANG, Y , XU, LL , (2016) ACHIEVING SIMPLE, SECURE AND EFFICIENT HIERARCHICAL ACCESS CONTROL IN CLOUD COMPUTING.IEEE TRANSACTIONS ON COMPUTERS. VOL. 65. ISSUE 7. P. 2325 -2331 16 70% 1
8 DE SANTIS, A , FERRARA, AL , MASUCCI, B , (2006) UNCONDITIONALLY SECURE KEY ASSIGNMENT SCHEMES.DISCRETE APPLIED MATHEMATICS. VOL. 154. ISSUE 2. P. 234-252 14 100% 12
9 ATENIESE, G , DE SANTIS, A , FERRARA, AL , MASUCCI, B , (2012) PROVABLY-SECURE TIME-BOUND HIERARCHICAL KEY ASSIGNMENT SCHEMES.JOURNAL OF CRYPTOLOGY. VOL. 25. ISSUE 2. P. 243 -270 17 68% 13
10 YEH, JH , (2009) ENFORCING NON-HIERARCHICAL ACCESS POLICIES BY HIERARCHICAL KEY ASSIGNMENT SCHEMES.INFORMATION PROCESSING LETTERS. VOL. 110. ISSUE 2. P. 46-49 13 100% 0

Classes with closest relation at Level 1



Rank Class id link
1 35134 SUBLIMINAL CHANNEL//KEY ESCROW//HBEREICH ANGEW INFORMAT
2 5759 KEY MANAGEMENT//GROUP KEY MANAGEMENT//KEY PREDISTRIBUTION
3 2433 SMART CARD//PASSWORD//KEY AGREEMENT
4 16207 MOBILE AGENTS//OFF NEW TECHNOL//C C PLUS PLUS INTERPRETER
5 30633 APPLICATION LAYERS//AUTOMOTIVE ASSEMBLY PLANT//BITCLOUD
6 10353 ACCESS CONTROL//RBAC//ROLE BASED ACCESS CONTROL
7 26871 CONDITIONAL ACCESS SYSTEM//PAY TV//MOBILE PAY TV
8 414 DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE
9 35541 INTERACT CINEMA GRP//ACTIVE TOOLS//HENRY JENKINS
10 36636 STREAM AUTHENTICATION//MULTIMEDIA AUTHENTICATION//MULTICAST AUTHENTICATION

Go to start page