{"id":"https://openalex.org/W790577130","doi":"https://doi.org/10.1007/978-3-319-17016-9_16","title":"Automatically Calculating Quantitative Integrity Measures for Imperative Programs","display_name":"Automatically Calculating Quantitative Integrity Measures for Imperative Programs","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W790577130","doi":"https://doi.org/10.1007/978-3-319-17016-9_16","mag":"790577130"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-17016-9_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-17016-9_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020004082","display_name":"Tom Chothia","orcid":"https://orcid.org/0000-0002-9381-1368"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Tom Chothia","raw_affiliation_strings":["School of Computer Science, University of Birmingham, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087228196","display_name":"Chris Novakovic","orcid":"https://orcid.org/0000-0001-5077-0626"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chris Novakovic","raw_affiliation_strings":["School of Computer Science, University of Birmingham, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003031006","display_name":"Rajiv R. P. Singh","orcid":"https://orcid.org/0000-0003-1808-3433"},"institutions":[{"id":"https://openalex.org/I110166357","display_name":"University of Delhi","ror":"https://ror.org/04gzb2213","country_code":"IN","type":"education","lineage":["https://openalex.org/I110166357"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajiv Ranjan Singh","raw_affiliation_strings":["Department of Computer Science, Shyam Lal College, University of Delhi, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Shyam Lal College, University of Delhi, New Delhi, India","institution_ids":["https://openalex.org/I110166357"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020004082"],"corresponding_institution_ids":["https://openalex.org/I79619799"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3414,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53352857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"250","last_page":"265"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7181124091148376},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.5345446467399597},{"id":"https://openalex.org/keywords/mutual-information","display_name":"Mutual information","score":0.5060564875602722},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4822200536727905},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47042298316955566},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.45042431354522705},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4032239615917206},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.217777818441391},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12293240427970886},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.08223262429237366}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7181124091148376},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.5345446467399597},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.5060564875602722},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4822200536727905},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47042298316955566},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.45042431354522705},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4032239615917206},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.217777818441391},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12293240427970886},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.08223262429237366},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-17016-9_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-17016-9_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/80fad356-0454-4de9-a07b-962f74084373","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/portal/en/publications/automatically-calculating-quantitative-integrity-measures-for-imperative-programs(80fad356-0454-4de9-a07b-962f74084373).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chothia, T, Novakovic, C & Singh, R R 2015, Automatically calculating quantitative integrity measures for imperative programs. in J Garcia-Alfaro, J Herrera-Joancomart\u00ed & E Lupu (eds), Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. vol. 8872, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8872, Springer, pp. 250-265, 9th International Workshop on Data Privacy Management, DPM 2014, 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014 and 3rd International Workshop on Quantitative Aspects in Security Assurance, QASA 2014 held in conjunction with 19th Annual European Research Event in Computer Security Symposium, ESORICS 2014, Wroclaw, Poland, 10/09/14. https://doi.org/10.1007/978-3-319-17016-9_16","raw_type":"bookPart"},{"id":"pmh:oai:pure.atira.dk:publications/80fad356-0454-4de9-a07b-962f74084373","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/80fad356-0454-4de9-a07b-962f74084373","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chothia , T , Novakovic , C & Singh , R R 2015 , Automatically calculating quantitative integrity measures for imperative programs . in J Garcia-Alfaro , J Herrera-Joancomart\u00ed & E Lupu (eds) , Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers . vol. 8872 , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 8872 , Springer , pp. 250-265 , 9th International Workshop on Data Privacy Management, DPM 2014, 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014 and 3rd International Workshop on Quantitative Aspects in Security Assurance, QASA 2014 held in conjunction with 19th Annual European Research Event in Computer Security Symposium, ESORICS 2014 , Wroclaw , Poland , 10/09/14 . https://doi.org/10.1007/978-3-319-17016-9_16","raw_type":"bookPart"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1208334278","display_name":null,"funder_award_id":"EP/L001802/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W98275668","https://openalex.org/W1556911442","https://openalex.org/W2085977348","https://openalex.org/W2087811006","https://openalex.org/W2097151854","https://openalex.org/W2099111195","https://openalex.org/W2130241416","https://openalex.org/W2132333881","https://openalex.org/W2132699727","https://openalex.org/W2140168010","https://openalex.org/W2147150031","https://openalex.org/W2204772115","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2036846997","https://openalex.org/W2112223184","https://openalex.org/W2347586617","https://openalex.org/W2115702840","https://openalex.org/W2161963661","https://openalex.org/W2165061339","https://openalex.org/W2125614474","https://openalex.org/W2295845123","https://openalex.org/W2358054814","https://openalex.org/W2090882960"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
