{"id":"https://openalex.org/W2056055156","doi":"https://doi.org/10.1016/0167-4048(88)90503-2","title":"Network security and access controls","display_name":"Network security and access controls","publication_year":1988,"publication_date":"1988-02-01","ids":{"openalex":"https://openalex.org/W2056055156","doi":"https://doi.org/10.1016/0167-4048(88)90503-2","mag":"2056055156"},"language":"en","primary_location":{"id":"doi:10.1016/0167-4048(88)90503-2","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(88)90503-2","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012693922","display_name":"Ellen Amsel","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ellen Amsel,","raw_affiliation_strings":["Network Access Special Interest Group, ISSA, San Francisco Bay Area Chapter, 495 Ellis Street, Mail Stop 820, San Francisco, California, 94102, USA","Network Access Special Interest Group, ISSA, San Francisco Bay Area Chapter, 495 Ellis Street, Mail Stop 820, San Francisco, California, 94102, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Network Access Special Interest Group, ISSA, San Francisco Bay Area Chapter, 495 Ellis Street, Mail Stop 820, San Francisco, California, 94102, USA","institution_ids":[]},{"raw_affiliation_string":"Network Access Special Interest Group, ISSA, San Francisco Bay Area Chapter, 495 Ellis Street, Mail Stop 820, San Francisco, California, 94102, USA#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5012693922"],"corresponding_institution_ids":[],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":0.5006,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.7029937,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":"1","first_page":"53","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.6690000295639038,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.6690000295639038,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7376798391342163},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6660650372505188},{"id":"https://openalex.org/keywords/logical-security","display_name":"Logical security","score":0.4860406517982483},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46931979060173035},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.45145002007484436},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4483187198638916},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.4337786138057709},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.41252046823501587},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3992424011230469},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3599587082862854},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.3552817106246948},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.31993815302848816},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2111915946006775},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.16314807534217834}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7376798391342163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6660650372505188},{"id":"https://openalex.org/C178639896","wikidata":"https://www.wikidata.org/wiki/Q604035","display_name":"Logical security","level":5,"score":0.4860406517982483},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46931979060173035},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.45145002007484436},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4483187198638916},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.4337786138057709},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.41252046823501587},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3992424011230469},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3599587082862854},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.3552817106246948},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.31993815302848816},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2111915946006775},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.16314807534217834},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/0167-4048(88)90503-2","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(88)90503-2","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4300000071525574,"display_name":"Industry, innovation and infrastructure"},{"id":"https://metadata.un.org/sdg/17","score":0.4000000059604645,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2336018237","https://openalex.org/W3146524812"],"related_works":["https://openalex.org/W2368931217","https://openalex.org/W2379389012","https://openalex.org/W2372674753","https://openalex.org/W623815473","https://openalex.org/W3012238031","https://openalex.org/W3015787821","https://openalex.org/W2356067210","https://openalex.org/W2365673799","https://openalex.org/W3036769661","https://openalex.org/W2391845923"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
