{"id":"https://openalex.org/W2038080435","doi":"https://doi.org/10.1007/s11390-007-9012-z","title":"CSchema: A Downgrading Policy Language for XML Access Control","display_name":"CSchema: A Downgrading Policy Language for XML Access Control","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W2038080435","doi":"https://doi.org/10.1007/s11390-007-9012-z","mag":"2038080435"},"language":"en","primary_location":{"id":"doi:10.1007/s11390-007-9012-z","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11390-007-9012-z","pdf_url":null,"source":{"id":"https://openalex.org/S161516442","display_name":"Journal of Computer Science and Technology","issn_l":"1000-9000","issn":["1000-9000","1860-4749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Science and Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018655434","display_name":"Dong-Xi Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Dong-Xi Liu","raw_affiliation_strings":["Department of Mathematical Informatics, University of Tokyo, Tokyo, Japan","Department of Mathematical Informatics; University of Tokyo; Japan"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Informatics, University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]},{"raw_affiliation_string":"Department of Mathematical Informatics; University of Tokyo; Japan","institution_ids":["https://openalex.org/I74801974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5018655434"],"corresponding_institution_ids":["https://openalex.org/I74801974"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.4865,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75315185,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"22","issue":"1","first_page":"44","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9003661870956421},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6675825119018555},{"id":"https://openalex.org/keywords/xml-schema","display_name":"XML Schema (W3C)","score":0.654822051525116},{"id":"https://openalex.org/keywords/document-structure-description","display_name":"Document Structure Description","score":0.6481049060821533},{"id":"https://openalex.org/keywords/xml-validation","display_name":"XML validation","score":0.6400109529495239},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.6271572113037109},{"id":"https://openalex.org/keywords/xml-schema-editor","display_name":"XML Schema Editor","score":0.5920595526695251},{"id":"https://openalex.org/keywords/streaming-xml","display_name":"Streaming XML","score":0.557458758354187},{"id":"https://openalex.org/keywords/efficient-xml-interchange","display_name":"Efficient XML Interchange","score":0.5302072763442993},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5197084546089172},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.47306951880455017},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.46949341893196106},{"id":"https://openalex.org/keywords/xml-database","display_name":"XML database","score":0.42489200830459595},{"id":"https://openalex.org/keywords/xml-encryption","display_name":"XML Encryption","score":0.4202041029930115},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.41398096084594727},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2730340361595154},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.25292012095451355},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22304388880729675}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9003661870956421},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6675825119018555},{"id":"https://openalex.org/C40713593","wikidata":"https://www.wikidata.org/wiki/Q16342","display_name":"XML Schema (W3C)","level":5,"score":0.654822051525116},{"id":"https://openalex.org/C68699486","wikidata":"https://www.wikidata.org/wiki/Q265904","display_name":"Document Structure Description","level":3,"score":0.6481049060821533},{"id":"https://openalex.org/C55348073","wikidata":"https://www.wikidata.org/wiki/Q595926","display_name":"XML validation","level":3,"score":0.6400109529495239},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.6271572113037109},{"id":"https://openalex.org/C34716815","wikidata":"https://www.wikidata.org/wiki/Q8042322","display_name":"XML Schema Editor","level":3,"score":0.5920595526695251},{"id":"https://openalex.org/C44883583","wikidata":"https://www.wikidata.org/wiki/Q7622687","display_name":"Streaming XML","level":3,"score":0.557458758354187},{"id":"https://openalex.org/C11508877","wikidata":"https://www.wikidata.org/wiki/Q1124477","display_name":"Efficient XML Interchange","level":3,"score":0.5302072763442993},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5197084546089172},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.47306951880455017},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.46949341893196106},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.42489200830459595},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.4202041029930115},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.41398096084594727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2730340361595154},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.25292012095451355},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22304388880729675}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11390-007-9012-z","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11390-007-9012-z","pdf_url":null,"source":{"id":"https://openalex.org/S161516442","display_name":"Journal of Computer Science and Technology","issn_l":"1000-9000","issn":["1000-9000","1860-4749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Science and Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W55000690","https://openalex.org/W162865419","https://openalex.org/W1496712790","https://openalex.org/W1528222021","https://openalex.org/W1966814918","https://openalex.org/W1994327389","https://openalex.org/W2006688370","https://openalex.org/W2016636916","https://openalex.org/W2034711041","https://openalex.org/W2046942235","https://openalex.org/W2072137506","https://openalex.org/W2075994573","https://openalex.org/W2089507241","https://openalex.org/W2094079142","https://openalex.org/W2104152314","https://openalex.org/W2107307934","https://openalex.org/W2110904621","https://openalex.org/W2121988324","https://openalex.org/W2134170665","https://openalex.org/W2159078835","https://openalex.org/W2164549836","https://openalex.org/W2172255090","https://openalex.org/W3014278192","https://openalex.org/W4242584083","https://openalex.org/W4244794541"],"related_works":["https://openalex.org/W2357844625","https://openalex.org/W2536894089","https://openalex.org/W2590489024","https://openalex.org/W1914037376","https://openalex.org/W2401139123","https://openalex.org/W2106024890","https://openalex.org/W2189177577","https://openalex.org/W2103912919","https://openalex.org/W2053173742","https://openalex.org/W2360646659"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
