{"id":"https://openalex.org/W2007774973","doi":"https://doi.org/10.1109/coginf.2008.4639162","title":"Role-based systems are autonomic","display_name":"Role-based systems are autonomic","publication_year":2008,"publication_date":"2008-08-01","ids":{"openalex":"https://openalex.org/W2007774973","doi":"https://doi.org/10.1109/coginf.2008.4639162","mag":"2007774973"},"language":"en","primary_location":{"id":"doi:10.1109/coginf.2008.4639162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/coginf.2008.4639162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 7th IEEE International Conference on Cognitive Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020477193","display_name":"Haibin Zhu","orcid":"https://orcid.org/0000-0003-1922-1631"},"institutions":[{"id":"https://openalex.org/I138900291","display_name":"Nipissing University","ror":"https://ror.org/05k14ba46","country_code":"CA","type":"education","lineage":["https://openalex.org/I138900291"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Haibin Zhu","raw_affiliation_strings":["Department of Computer Science and Mathematics, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada","Dept. of Comput. Sci. & Math., Nipissing Univ., North Bay, ON"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Mathematics, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada","institution_ids":["https://openalex.org/I138900291"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Math., Nipissing Univ., North Bay, ON","institution_ids":["https://openalex.org/I138900291"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5020477193"],"corresponding_institution_ids":["https://openalex.org/I138900291"],"apc_list":null,"apc_paid":null,"fwci":5.4399,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.9525821,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"144","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autonomic-computing","display_name":"Autonomic computing","score":0.9412285089492798},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7671241760253906},{"id":"https://openalex.org/keywords/end-user-computing","display_name":"End-user computing","score":0.4775719940662384},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4496413767337799},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.4259633719921112},{"id":"https://openalex.org/keywords/utility-computing","display_name":"Utility computing","score":0.27474474906921387},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.24582403898239136},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.22343993186950684},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10642454028129578},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.0948631763458252}],"concepts":[{"id":"https://openalex.org/C558632462","wikidata":"https://www.wikidata.org/wiki/Q788172","display_name":"Autonomic computing","level":3,"score":0.9412285089492798},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7671241760253906},{"id":"https://openalex.org/C135642988","wikidata":"https://www.wikidata.org/wiki/Q521737","display_name":"End-user computing","level":5,"score":0.4775719940662384},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4496413767337799},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.4259633719921112},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.27474474906921387},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.24582403898239136},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.22343993186950684},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10642454028129578},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0948631763458252}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/coginf.2008.4639162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/coginf.2008.4639162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 7th IEEE International Conference on Cognitive Informatics","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.581.5462","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.581.5462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://faculty.nipissingu.ca/haibinz/research/ICCI08.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1479758699","https://openalex.org/W1487313414","https://openalex.org/W1966642491","https://openalex.org/W1980079693","https://openalex.org/W1991902308","https://openalex.org/W1997862012","https://openalex.org/W2030175957","https://openalex.org/W2049430277","https://openalex.org/W2057031566","https://openalex.org/W2076004681","https://openalex.org/W2092064278","https://openalex.org/W2096377923","https://openalex.org/W2099289875","https://openalex.org/W2112466084","https://openalex.org/W2131670739","https://openalex.org/W2136718543","https://openalex.org/W2141696417","https://openalex.org/W2154765153","https://openalex.org/W2168683140","https://openalex.org/W2336274750","https://openalex.org/W2517897261","https://openalex.org/W2611876927","https://openalex.org/W4254965294","https://openalex.org/W4256155222","https://openalex.org/W6628867970","https://openalex.org/W6629126322","https://openalex.org/W6703346735","https://openalex.org/W6726510594"],"related_works":["https://openalex.org/W2353605908","https://openalex.org/W2780132639","https://openalex.org/W2022505847","https://openalex.org/W4299528247","https://openalex.org/W2001342306","https://openalex.org/W2357889292","https://openalex.org/W2143461952","https://openalex.org/W4233954915","https://openalex.org/W4229013413","https://openalex.org/W2126550771"],"abstract_inverted_index":{"Autonomic":[0],"Computing":[1],"is":[2],"a":[3],"newly":[4],"emerging":[5],"computing":[6,24],"paradigm":[7],"in":[8],"order":[9],"to":[10],"create":[11],"computer":[12],"systems":[13,25],"capable":[14],"of":[15,23],"self-management":[16],"and":[17],"overcome":[18],"the":[19],"rapidly":[20],"growing":[21],"complexity":[22],"management.":[26]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
