{"id":"https://openalex.org/W1964909553","doi":"https://doi.org/10.1142/s021819409100007x","title":"ACCESS CONTROL STRATEGIES FOR COORDINATING TEAMS OF SOFTWARE ENGINEERS","display_name":"ACCESS CONTROL STRATEGIES FOR COORDINATING TEAMS OF SOFTWARE ENGINEERS","publication_year":1991,"publication_date":"1991-03-01","ids":{"openalex":"https://openalex.org/W1964909553","doi":"https://doi.org/10.1142/s021819409100007x","mag":"1964909553"},"language":"en","primary_location":{"id":"doi:10.1142/s021819409100007x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s021819409100007x","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052346885","display_name":"Michael P. Stovsky","orcid":null},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"MICHAEL P. STOVSKY","raw_affiliation_strings":["Department of Computer and  Information Science, The Ohio State University, 2036 Neil  Ave. Mall, Columbus, Ohio 43210-1277, USA","Department of Computer and Information Science, The Ohio State University, 2036 Neil Ave. Mall, Columbus, Ohio 43210-1277, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and  Information Science, The Ohio State University, 2036 Neil  Ave. Mall, Columbus, Ohio 43210-1277, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Department of Computer and Information Science, The Ohio State University, 2036 Neil Ave. Mall, Columbus, Ohio 43210-1277, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023529796","display_name":"Bruce W. Weide","orcid":null},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"BRUCE W. WEIDE","raw_affiliation_strings":["Department of Computer and  Information Science, The Ohio State University, 2036 Neil  Ave. Mall, Columbus, Ohio 43210-1277, USA","Department of Computer and Information Science, The Ohio State University, 2036 Neil Ave. Mall, Columbus, Ohio 43210-1277, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and  Information Science, The Ohio State University, 2036 Neil  Ave. Mall, Columbus, Ohio 43210-1277, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Department of Computer and Information Science, The Ohio State University, 2036 Neil Ave. Mall, Columbus, Ohio 43210-1277, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052346885"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":1.2253,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.81798314,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"01","issue":"01","first_page":"57","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7140423059463501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6617100834846497},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5108120441436768},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5059213042259216},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.49471136927604675},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4811324179172516},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4650249481201172},{"id":"https://openalex.org/keywords/component-based-software-engineering","display_name":"Component-based software engineering","score":0.4115346074104309},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3961884081363678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23680275678634644}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7140423059463501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6617100834846497},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5108120441436768},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5059213042259216},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.49471136927604675},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4811324179172516},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4650249481201172},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.4115346074104309},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3961884081363678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23680275678634644},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s021819409100007x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s021819409100007x","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.46000000834465027,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2348289213","https://openalex.org/W2018121945","https://openalex.org/W2677345884","https://openalex.org/W4235602047","https://openalex.org/W1837917562","https://openalex.org/W2379062178","https://openalex.org/W2365172741","https://openalex.org/W114740100","https://openalex.org/W2373416126","https://openalex.org/W2168282911"],"abstract_inverted_index":{"The":[0,154,164,185],"difficult-to-achieve":[1],"goal":[2],"of":[3,17,39,87,95,110,129,150,159,178,187,216],"a":[4,108,130,157,191,200,213],"software":[5,61,97,111,189],"project":[6,27,98],"manager's":[7],"access":[8,25,51,71,77,133,161,202,220],"control":[9,52,72,78,134,162,203],"policy":[10,166],"is":[11,64,107,152,195],"to":[12,22,26,42,50,66,84,92,221],"help":[13],"coordinate":[14],"the":[15,18,60,85,96,143,147,179,188,224],"work":[16,86],"team":[19,180,217],"members":[20,94,177],"\u2014":[21],"maximize":[23],"cooperative":[24],"artifacts":[28],"such":[29,181,229],"as":[30,182],"source":[31],"code":[32],"while":[33],"preventing":[34],"interfering":[35],"and":[36,68,89,119,140,175,199],"destructive":[37],"forms":[38],"access.":[40,230],"Solutions":[41],"two":[43],"problems":[44,225],"that":[45,194,205],"arise":[46],"from":[47,126],"current":[48],"approaches":[49],"are":[53],"discussed:":[54],"\u2022":[55,74],"How":[56,75],"much":[57],"information":[58],"about":[59],"being":[62],"built":[63],"needed":[65],"develop":[67],"support":[69],"effective":[70],"strategies?":[73],"can":[76,210],"strategies":[79],"be":[80],"applied":[81],"not":[82,146],"just":[83],"programmers":[88,174],"designers,":[90],"but":[91],"all":[93],"team?":[99],"A":[100],"key":[101],"element":[102],"in":[103,112,172,212],"answering":[104],"these":[105,138],"questions":[106],"model":[109,122],"which":[113,136],"each":[114],"component":[115],"has":[116],"separate":[117],"specification":[118,151],"implementation.":[120],"This":[121],"further":[123],"distinguishes":[124],"structural":[125,144],"behavioral":[127],"aspects":[128],"specification.":[131],"An":[132],"framework":[135,155],"exploits":[137],"distinctions":[139],"relies":[141],"on":[142,197],"(but":[145],"behavioral)":[148],"facet":[149],"explored.":[153],"supports":[156,206],"number":[158],"different":[160],"policies.":[163],"specific":[165],"selected":[167],"depends":[168],"upon":[169],"management's":[170],"objectives":[171],"coordinating":[173],"other":[176],"technical":[183],"writers.":[184],"combination":[186],"model,":[190],"developments":[192],"environment":[193],"based":[196],"it,":[198],"flexible":[201],"tool":[204],"many":[207],"feasible":[208],"policies":[209],"result":[211],"greater":[214],"degree":[215],"members'":[218],"concurrent":[219],"components":[222],"without":[223],"often":[226],"associated":[227],"with":[228]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
