Class information for:
Level 1: TRUST NEGOTIATION//AUTOMATED TRUST NEGOTIATION//SOFTWARE TRUSTWORTHINESS

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
28189 212 26.1 21%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1665 2             PEER TO PEER//PEER TO PEER NETWORKS//PEER-TO-PEER NETWORKING AND APPLICATIONS 6842
28189 1                   TRUST NEGOTIATION//AUTOMATED TRUST NEGOTIATION//SOFTWARE TRUSTWORTHINESS 212

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 TRUST NEGOTIATION authKW 1843641 8% 80% 16
2 AUTOMATED TRUST NEGOTIATION authKW 1024247 4% 89% 8
3 SOFTWARE TRUSTWORTHINESS authKW 600144 2% 83% 5
4 DISTRIBUTED PROVING authKW 288070 1% 100% 2
5 TRUST NEGOTIATIONS authKW 288070 1% 100% 2
6 TRUSTED SOFTWARE authKW 288070 1% 100% 2
7 TRUSTWORTHINESS ATTRIBUTES authKW 288070 1% 100% 2
8 DOMAIN SOFTWARE authKW 192045 1% 67% 2
9 ACCESS CONTROL THROUGH CURRENCY authKW 144035 0% 100% 1
10 ACCOUNTING AUDIT authKW 144035 0% 100% 1

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 5186 41% 0% 86
2 Computer Science, Theory & Methods 2853 32% 0% 68
3 Computer Science, Software Engineering 1997 23% 0% 48
4 Telecommunications 1996 26% 0% 55
5 Computer Science, Hardware & Architecture 1688 16% 0% 34
6 COMPUTER APPLICATIONS & CYBERNETICS 217 1% 0% 2
7 Engineering, Electrical & Electronic 209 20% 0% 43
8 Computer Science, Artificial Intelligence 174 8% 0% 17
9 Medical Informatics 42 2% 0% 4
10 Information Science & Library Science 38 2% 0% 5

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 AGCY IND CANADA 144035 0% 100% 1
2 AUTOMAT COMMAND 144035 0% 100% 1
3 CERIAS COMP SCI 144035 0% 100% 1
4 DBSEC 144035 0% 100% 1
5 DIPARTIMENTO SCI CULTURA POLIT INFORAZ 144035 0% 100% 1
6 ERICSSON TECHNOL INNOVAT UNIT 144035 0% 100% 1
7 IT LAW 144035 0% 100% 1
8 LAAS CNRS 7 144035 0% 100% 1
9 PROGRAM NETWORK SECUR MANAGEMENT 144035 0% 100% 1
10 SECUR SECRETARIAL SERV 144035 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 12186 2% 2% 4
2 COMPUTER STANDARDS & INTERFACES 7412 4% 1% 8
3 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 4511 1% 1% 3
4 FRONTIERS OF COMPUTER SCIENCE 3479 1% 1% 3
5 IEEE COMMUNICATIONS MAGAZINE 3247 5% 0% 10
6 PEER-TO-PEER NETWORKING AND APPLICATIONS 3243 1% 1% 3
7 INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH 2981 1% 1% 2
8 CHINESE JOURNAL OF ELECTRONICS 2796 3% 0% 7
9 DATA PROCESSING 2716 0% 2% 1
10 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2689 1% 1% 3

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 TRUST NEGOTIATION 1843641 8% 80% 16 Search TRUST+NEGOTIATION Search TRUST+NEGOTIATION
2 AUTOMATED TRUST NEGOTIATION 1024247 4% 89% 8 Search AUTOMATED+TRUST+NEGOTIATION Search AUTOMATED+TRUST+NEGOTIATION
3 SOFTWARE TRUSTWORTHINESS 600144 2% 83% 5 Search SOFTWARE+TRUSTWORTHINESS Search SOFTWARE+TRUSTWORTHINESS
4 DISTRIBUTED PROVING 288070 1% 100% 2 Search DISTRIBUTED+PROVING Search DISTRIBUTED+PROVING
5 TRUST NEGOTIATIONS 288070 1% 100% 2 Search TRUST+NEGOTIATIONS Search TRUST+NEGOTIATIONS
6 TRUSTED SOFTWARE 288070 1% 100% 2 Search TRUSTED+SOFTWARE Search TRUSTED+SOFTWARE
7 TRUSTWORTHINESS ATTRIBUTES 288070 1% 100% 2 Search TRUSTWORTHINESS+ATTRIBUTES Search TRUSTWORTHINESS+ATTRIBUTES
8 DOMAIN SOFTWARE 192045 1% 67% 2 Search DOMAIN+SOFTWARE Search DOMAIN+SOFTWARE
9 ACCESS CONTROL THROUGH CURRENCY 144035 0% 100% 1 Search ACCESS+CONTROL+THROUGH+CURRENCY Search ACCESS+CONTROL+THROUGH+CURRENCY
10 ACCOUNTING AUDIT 144035 0% 100% 1 Search ACCOUNTING+AUDIT Search ACCOUNTING+AUDIT

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 MANA, A , KOSHUTANSKI, H , PEREZ, EJ , (2012) A TRUST NEGOTIATION BASED SECURITY FRAMEWORK FOR SERVICE PROVISIONING IN LOAD-BALANCING CLUSTERS.COMPUTERS & SECURITY. VOL. 31. ISSUE 1. P. 4 -25 8 89% 2
2 KOSHUTANSKI, H , LAZOUSKI, A , MARTINELLI, F , MORI, P , (2009) ENHANCING GRID SECURITY BY FINE-GRAINED BEHAVIORAL CONTROL AND NEGOTIATION-BASED AUTHORIZATION.INTERNATIONAL JOURNAL OF INFORMATION SECURITY. VOL. 8. ISSUE 4. P. 291 -314 10 56% 3
3 KOSHUTANSKI, H , MANA, A , (2010) INTEROPERABLE SEMANTIC ACCESS CONTROL FOR HIGHLY DYNAMIC COALITIONS.SECURITY AND COMMUNICATION NETWORKS. VOL. 3. ISSUE 6. P. 565 -594 10 53% 4
4 LIU, XX , TANG, SH , HUANG, Q , YU, ZW , (2013) AN ONTOLOGY-BASED APPROACH TO AUTOMATED TRUST NEGOTIATION.COMPUTER STANDARDS & INTERFACES. VOL. 36. ISSUE 1. P. 219-230 6 67% 2
5 KAPITSAKI, GM , (2013) CONSUMER PRIVACY ENFORCEMENT IN CONTEXT-AWARE WEB SERVICES.INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH. VOL. 10. ISSUE 3. P. 24-41 4 100% 0
6 SQUICCIARINI, AC , PACI, F , BERTINO, E , (2011) TRUST ESTABLISHMENT IN THE FORMATION OF VIRTUAL ORGANIZATIONS.COMPUTER STANDARDS & INTERFACES. VOL. 33. ISSUE 1. P. 13-23 4 100% 6
7 YU, DG , CHEN, N , (2014) AN AUTOMATED TRUST NEGOTIATION MODEL BASED ON IMPROVED COLOURED TIMED PETRI NET.INTERNATIONAL JOURNAL OF SENSOR NETWORKS. VOL. 16. ISSUE 2. P. 61 -69 4 80% 0
8 LIU, BL , GE, F , XIAO, F , (2010) A PEER-TO-PEER FRAMEWORK FOR ACCELERATING TRUST ESTABLISHMENT IN AUTOMATED TRUST NEGOTIATION.JOURNAL OF INTERNET TECHNOLOGY. VOL. 11. ISSUE 5. P. 643-650 4 80% 2
9 LIU, XX , TANG, SH , CHEN, SQ , (2016) A DESCRIPTION LOGIC-BASED POLICY COMPLIANCE CHECKER FOR TRUST NEGOTIATION.PEER-TO-PEER NETWORKING AND APPLICATIONS. VOL. 9. ISSUE 2. P. 372 -383 4 67% 0
10 MOWBRAY, M , PEARSON, S , SHEN, Y , (2012) ENHANCING PRIVACY IN CLOUD COMPUTING VIA POLICY-BASED OBFUSCATION.JOURNAL OF SUPERCOMPUTING. VOL. 61. ISSUE 2. P. 267 -291 5 56% 5

Classes with closest relation at Level 1



Rank Class id link
1 10353 ACCESS CONTROL//RBAC//ROLE BASED ACCESS CONTROL
2 4035 TRUST MANAGEMENT//TRUST MODEL//REPUTATION SYSTEM
3 33882 INTEROPERABLE TRANSACTIONS//SPONTANEOUS NETWORK//ACCOUNTABLE CLOUD SERVICE ACS
4 21594 ONTOLOGY BASED MANAGEMENT//KDEG//AUTONOMIC NETWORKING
5 20701 INFORMATION FLOW CONTROL//BYTECODE VERIFICATION//LANGUAGE BASED SECURITY
6 36111 DYNAMIC SUPERFRAME//CAZAC SEQUENCE//3 LEVEL SCHEDULING
7 28772 AUTHENTICATED DATA STRUCTURES//CERTIFICATE REVOCATION//CHAIR MOBILE COMMERCE MULTILATERAL SECUR
8 36388 IMSI CATCHER//ADMINISTRATION TOOLS//APPLICATION FIREWALLS
9 30058 USER BEHAVIOR SIMILARITY//LOCATION PROXIMITY//WEB BASED SOCIAL NETWORKS
10 34995 FLOOR OPERATION//MAX PROBLEM//PARITY TESTS

Go to start page