{"id":"https://openalex.org/W2107696761","doi":"https://doi.org/10.1109/securware.2008.50","title":"Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems","display_name":"Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems","publication_year":2008,"publication_date":"2008-08-01","ids":{"openalex":"https://openalex.org/W2107696761","doi":"https://doi.org/10.1109/securware.2008.50","mag":"2107696761"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/securware.2008.50","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053477897","display_name":"Maurice Isra\u00ebl","orcid":null},"institutions":[{"id":"https://openalex.org/I1283236314","display_name":"Thales (Portugal)","ror":"https://ror.org/051w1mx35","country_code":"PT","type":"company","lineage":["https://openalex.org/I1283236314","https://openalex.org/I4210140930"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Maurice Israel","raw_affiliation_strings":["Thales Commun., Colombes"],"affiliations":[{"raw_affiliation_string":"Thales Commun., Colombes","institution_ids":["https://openalex.org/I1283236314"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012362868","display_name":"Julien Borgel","orcid":null},"institutions":[{"id":"https://openalex.org/I1283236314","display_name":"Thales (Portugal)","ror":"https://ror.org/051w1mx35","country_code":"PT","type":"company","lineage":["https://openalex.org/I1283236314","https://openalex.org/I4210140930"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Julien Borgel","raw_affiliation_strings":["Thales Commun., Colombes"],"affiliations":[{"raw_affiliation_string":"Thales Commun., Colombes","institution_ids":["https://openalex.org/I1283236314"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053425475","display_name":"Andr\u00e9 Cotton","orcid":null},"institutions":[{"id":"https://openalex.org/I1283236314","display_name":"Thales (Portugal)","ror":"https://ror.org/051w1mx35","country_code":"PT","type":"company","lineage":["https://openalex.org/I1283236314","https://openalex.org/I4210140930"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Andre Cotton","raw_affiliation_strings":["Thales Commun., Colombes"],"affiliations":[{"raw_affiliation_string":"Thales Commun., Colombes","institution_ids":["https://openalex.org/I1283236314"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.67,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.377739,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"338","last_page":"343"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9726,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9726,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12000","display_name":"Systems Engineering Methodologies and Applications","score":0.9695,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.954,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.6630901},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.5309942},{"id":"https://openalex.org/keywords/complex-system","display_name":"Complex system","score":0.4900602},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.47819093}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.7453386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72488034},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.6630901},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.55999184},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.5309942},{"id":"https://openalex.org/C124681953","wikidata":"https://www.wikidata.org/wiki/Q339062","display_name":"Decomposition","level":2,"score":0.5232398},{"id":"https://openalex.org/C47822265","wikidata":"https://www.wikidata.org/wiki/Q854457","display_name":"Complex system","level":2,"score":0.4900602},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.47819093},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.47718465},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.40681022},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3837613},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3362468},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28849882},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.23458025},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.185996},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11345327},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/securware.2008.50","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.54}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W795270372","https://openalex.org/W4256317220","https://openalex.org/W4252527915","https://openalex.org/W2409287660","https://openalex.org/W2376514150","https://openalex.org/W2233357156","https://openalex.org/W2141414364","https://openalex.org/W2137412894","https://openalex.org/W1976489385","https://openalex.org/W1506225852"],"abstract_inverted_index":{"The":[0],"molecular":[1],"approach":[2,182],"has":[3],"been":[4],"introduced":[5],"at":[6,167],"the":[7,10,15,31,43,51,60,72,76,83,86,90,93,108,116,129,132,136,168,176,180,193],"beginning":[8],"of":[9,17,45,59,92,110,158,179],"Deserec":[11],"project":[12],"to":[13,70,126,139,145,151,173,191],"decrease":[14],"complexity":[16],"managing":[18],"large":[19],"mission-critical":[20],"information":[21,36],"systems.":[22],"Actually":[23],"it":[24,119,123],"consists":[25],"in":[26,107,196],"a":[27,54,80,102,140,197],"meta-model":[28],"based":[29],"on":[30,189],"fact":[32],"that":[33,122,134,161],"gathering":[34],"relevant":[35,153],"systems":[37,48],"components":[38],"together":[39],"into":[40],"molecules":[41],"makes":[42],"administration":[44],"such":[46,101],"complex":[47],"easier.":[49],"On":[50,82],"one":[52],"hand,":[53,85],"global":[55,73],"and":[56,78,96,131,183,187,199],"synthetic":[57],"view":[58,88],"system":[61,94,137,194],"is":[62,124],"provided.":[63],"No":[64],"needs":[65],"for":[66,155],"entering":[67],"technical":[68],"details":[69],"understand":[71],"situation":[74],"assess":[75],"risks,":[77],"decide":[79],"reconfiguration.":[81],"other":[84],"molecule":[87,142,159,169,181],"simplifies":[89],"simulation":[91],"behavior":[95],"its":[97],"vulnerability":[98],"analysis.":[99],"Obviously,":[100],"modeling":[103],"necessarily":[104],"implies":[105],"approximations":[106],"computation":[109],"performance":[111],"or":[112],"dependability":[113],"metrics.":[114],"Thatpsilas":[115],"reason":[117],"why":[118],"turns":[120],"out":[121],"essential":[125],"clearly":[127],"depict":[128],"principles":[130,178,188],"rules":[133,148,186],"lead":[135],"administrator":[138],"given":[141],"breakdown.":[143],"Next":[144],"these":[146],"cutting-up":[147],"we'll":[149],"try":[150],"identify":[152],"metrics":[154],"each":[156],"type":[157],"so":[160],"reconfigurations":[162],"decisions":[163],"may":[164],"be":[165],"taken":[166],"level.This":[170],"paper":[171],"intends":[172],"first":[174],"recall":[175],"key":[177],"then":[184],"give":[185],"how":[190],"address":[192],"decomposition":[195],"safe":[198],"efficient":[200],"way.":[201]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2107696761","counts_by_year":[],"updated_date":"2024-12-09T05:09:48.997079","created_date":"2016-06-24"}