Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W2004259149', 'doi': 'https://doi.org/10.1145/2018396.2018411', 'title': 'Java security architecture revisited', 'display_name': 'Java security architecture revisited', 'publication_year': 2011, 'publication_date': '2011-11-01', 'ids': {'openalex': 'https://openalex.org/W2004259149', 'doi': 'https://doi.org/10.1145/2018396.2018411', 'mag': '2004259149'}, 'language': 'en', 'primary_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.1145/2018396.2018411', 'pdf_url': 'https://dl.acm.org/doi/pdf/10.1145/2018396.2018411', 'source': {'id': 'https://openalex.org/S103482838', 'display_name': 'Communications of the ACM', 'issn_l': '0001-0782', 'issn': ['0001-0782', '1557-7317'], 'is_oa': False, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319798', 'host_organization_name': 'Association for Computing Machinery', 'host_organization_lineage': ['https://openalex.org/P4310319798'], 'host_organization_lineage_names': ['Association for Computing Machinery'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'type': 'article', 'type_crossref': 'journal-article', 'indexed_in': ['crossref'], 'open_access': {'is_oa': True, 'oa_status': 'bronze', 'oa_url': 'https://dl.acm.org/doi/pdf/10.1145/2018396.2018411', 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5100864830', 'display_name': 'Li Gong', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': True, 'raw_author_name': 'Li Gong', 'raw_affiliation_strings': ['Mozilla Online Ltd.'], 'affiliations': [{'raw_affiliation_string': 'Mozilla Online Ltd.', 'institution_ids': []}]}], 'countries_distinct_count': 0, 'institutions_distinct_count': 0, 'corresponding_author_ids': ['https://openalex.org/A5100864830'], 'corresponding_institution_ids': [], 'apc_list': None, 'apc_paid': None, 'fwci': 0.837, 'has_fulltext': True, 'fulltext_origin': 'pdf', 'cited_by_count': 9, 'citation_normalized_percentile': {'value': 0.840578, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 84, 'max': 85}, 'biblio': {'volume': '54', 'issue': '11', 'first_page': '48', 'last_page': '52'}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T11424', 'display_name': 'Language-based Information Flow Security', 'score': 0.9999, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T11424', 'display_name': 'Language-based Information Flow Security', 'score': 0.9999, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T11241', 'display_name': 'Characterization and Detection of Android Malware', 'score': 0.999, 'subfield': {'id': 'https://openalex.org/subfields/1711', 'display_name': 'Signal Processing'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T10126', 'display_name': 'Program Analysis and Verification Techniques', 'score': 0.9914, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/security-analysis', 'display_name': 'Security Analysis', 'score': 0.541373}], 'concepts': [{'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.75025374}, {'id': 'https://openalex.org/C548217200', 'wikidata': 'https://www.wikidata.org/wiki/Q251', 'display_name': 'Java', 'level': 2, 'score': 0.68691015}, {'id': 'https://openalex.org/C60172848', 'wikidata': 'https://www.wikidata.org/wiki/Q7495506', 'display_name': 'Sherwood Applied Business Security Architecture', 'level': 5, 'score': 0.545825}, {'id': 'https://openalex.org/C123657996', 'wikidata': 'https://www.wikidata.org/wiki/Q12271', 'display_name': 'Architecture', 'level': 2, 'score': 0.51215935}, {'id': 'https://openalex.org/C115903868', 'wikidata': 'https://www.wikidata.org/wiki/Q80993', 'display_name': 'Software engineering', 'level': 1, 'score': 0.5093633}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.4214593}, {'id': 'https://openalex.org/C199360897', 'wikidata': 'https://www.wikidata.org/wiki/Q9143', 'display_name': 'Programming language', 'level': 1, 'score': 0.34205088}, {'id': 'https://openalex.org/C62913178', 'wikidata': 'https://www.wikidata.org/wiki/Q7554361', 'display_name': 'Software security assurance', 'level': 4, 'score': 0.17562878}, {'id': 'https://openalex.org/C527648132', 'wikidata': 'https://www.wikidata.org/wiki/Q189900', 'display_name': 'Information security', 'level': 2, 'score': 0.15985101}, {'id': 'https://openalex.org/C29983905', 'wikidata': 'https://www.wikidata.org/wiki/Q7445066', 'display_name': 'Security service', 'level': 3, 'score': 0.09115839}, {'id': 'https://openalex.org/C95457728', 'wikidata': 'https://www.wikidata.org/wiki/Q309', 'display_name': 'History', 'level': 0, 'score': 0.06282714}, {'id': 'https://openalex.org/C166957645', 'wikidata': 'https://www.wikidata.org/wiki/Q23498', 'display_name': 'Archaeology', 'level': 1, 'score': 0.0}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': True, 'landing_page_url': 'https://doi.org/10.1145/2018396.2018411', 'pdf_url': 'https://dl.acm.org/doi/pdf/10.1145/2018396.2018411', 'source': {'id': 'https://openalex.org/S103482838', 'display_name': 'Communications of the ACM', 'issn_l': '0001-0782', 'issn': ['0001-0782', '1557-7317'], 'is_oa': False, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319798', 'host_organization_name': 'Association for Computing Machinery', 'host_organization_lineage': ['https://openalex.org/P4310319798'], 'host_organization_lineage_names': ['Association for Computing Machinery'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}], 'best_oa_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.1145/2018396.2018411', 'pdf_url': 'https://dl.acm.org/doi/pdf/10.1145/2018396.2018411', 'source': {'id': 'https://openalex.org/S103482838', 'display_name': 'Communications of the ACM', 'issn_l': '0001-0782', 'issn': ['0001-0782', '1557-7317'], 'is_oa': False, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319798', 'host_organization_name': 'Association for Computing Machinery', 'host_organization_lineage': ['https://openalex.org/P4310319798'], 'host_organization_lineage_names': ['Association for Computing Machinery'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'sustainable_development_goals': [], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 4, 'referenced_works': ['https://openalex.org/W1976931398', 'https://openalex.org/W2036910349', 'https://openalex.org/W2065076704', 'https://openalex.org/W2121251946'], 'related_works': ['https://openalex.org/W4367724653', 'https://openalex.org/W4281673905', 'https://openalex.org/W3206385231', 'https://openalex.org/W3118256810', 'https://openalex.org/W3042948800', 'https://openalex.org/W2997587123', 'https://openalex.org/W2788563018', 'https://openalex.org/W2786317006', 'https://openalex.org/W2749690376', 'https://openalex.org/W1566482460'], 'abstract_inverted_index': {'Difficult': [0], 'technical': [1], 'problems': [2], 'and': [3], 'tough': [4], 'business': [5], 'challenges.': [6]}, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W2004259149', 'counts_by_year': [{'year': 2021, 'cited_by_count': 1}, {'year': 2020, 'cited_by_count': 1}, {'year': 2017, 'cited_by_count': 4}, {'year': 2015, 'cited_by_count': 1}, {'year': 2013, 'cited_by_count': 1}, {'year': 2012, 'cited_by_count': 1}], 'updated_date': '2024-09-09T22:32:35.110299', 'created_date': '2016-06-24'}