{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:22:40Z","timestamp":1725459760147},"publisher-location":"Boston","reference-count":18,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402081448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-8145-6_4","type":"book-chapter","created":{"date-parts":[[2006,2,17]],"date-time":"2006-02-17T19:29:58Z","timestamp":1140204598000},"page":"51-65","source":"Crossref","is-referenced-by-count":1,"title":["A Framework for Role-Based Monitoring of Insider Misuse"],"prefix":"10.1007","author":[{"given":"Aung Htike","family":"Phyo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steven M.","family":"Furnell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francisco","family":"Portilla","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","volume-title":"Intrusion Detection: An Introduction to Internet, Surveillance, Correlation, Traceback, Traps and Response","author":"E. Amoroso","year":"1999","unstructured":"Amoroso, E., 1999, Intrusion Detection: An Introduction to Internet, Surveillance, Correlation, Traceback, Traps and Response, First Edition, Intrusion. Net books, NJ, ISBN: 0966670078.","edition":"First Edition"},{"key":"4_CR2","unstructured":"Anderson, D. Frivold, T. Tamaru, A. And Valdes A., 1994, Next-generation intrusion detection system (NIDES): Software users manual, Technical Report. Computer Science Laboratory, SRI International. December 1994."},{"key":"4_CR3","series-title":"Technical Report","volume-title":"Computer security threat monitoring and surveillance","author":"J.P. Anderson","year":"1980","unstructured":"Anderson, J.P., 1980, Computer security threat monitoring and surveillance. Technical Report, James P Anderson Co., Fort Washington, April 1980."},{"key":"4_CR4","unstructured":"Audit Commission, 1990, Survey of computer fraud & abuse: Supplement. Audit Commission, 1990."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Chung, C.Y. Gertz, M. Levitt, K., 1999, DEMIDS: A misuse detection system for database systems, in the Proceedings of the 3 rd International Working Conference on Integrity and Internal control in Information Systems. 18\u201319 November, Amsterdam. pp. 159\u2013178.","DOI":"10.1007\/978-0-387-35501-6_12"},{"key":"4_CR6","unstructured":"Ferraiolo, D. Kuhn, R., 1992, Role-based access control, In the Proceedings of the National Computer Security Conference, October 1992, Washington DC. pp. 554\u2013563."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Gavrila, S.I. Barkley, J.F., 1998, Formal specification for role based access control user\/role and role\/role relationship management, Third ACM workshop on Role Based Access Control, October 22\u201323, Fairfax, Virginia. pp 81\u201390.","DOI":"10.1145\/286884.286902"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Lindqvist, U. and Porras, P., 2001, eXpert-BSM: A host based intrusion detection solution for Sun Solaris. 17th Annual Computer Security Applications Conference, New Orleans, December 2001.","DOI":"10.1109\/ACSAC.2001.991540"},{"key":"4_CR9","unstructured":"Low, W. L. Lee, J. Teoh, P., 2002, DIDAFIT: Detecting intrusions in databases through fingerprinting transactions. In the Proceedings of the 4th Internationsal Conference o Enterprise Information Systems, Ciudal Real, Spain, April 2\u20136, 2002."},{"key":"4_CR10","unstructured":"Paxson, V., 1998, Bro: A system for detecting network intruders in real-time, In 7 th Annual USENIX Security Symposium, San Antonio, Texas, January 26\u201329, 1998, pp.31\u201352."},{"key":"4_CR11","first-page":"247","volume-title":"Data gathering for insider misuse monitoring","author":"A.H. Phyo","year":"2003","unstructured":"Phyo, A.H and Furnell, S.M., 2003, Data gathering for insider misuse monitoring, In the Proceedings of the 2nd European Conference on Information Warfare and Security, pp.247\u2013254, University of Reading, UK, 30th June\u20131st July, 2003."},{"key":"4_CR12","volume-title":"MSc thesis","author":"F. Portilla","year":"2003","unstructured":"Portilla, F., 2003, Analysis of insider misuse in commercial applications, MSc thesis, University of Plymouth, United Kingdom, September 2003."},{"key":"4_CR13","volume-title":"Current and future danger: A CSI primer on computer crime and information warfare","author":"R. Power","year":"1995","unstructured":"Power, R., 1995, Current and future danger: A CSI primer on computer crime and information warfare. San Francisco, CA: Computer Security Institute."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Power, R., 2002, 2002 CSI\/FBI computer crime and security survey. Computer Security Issues & Trends, Vol. VIII, No. 1. Computer Security Institute. Spring 2002.","DOI":"10.1016\/S1361-3723(02)01001-1"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Richardson, R., 2003, 2003 CSI\/FBI Computer Crime and Security Survey, Computer Security Institute. Spring 2003.","DOI":"10.1016\/S1361-3723(03)00208-2"},{"key":"4_CR16","unstructured":"Roesch, M., 1999, Snort-lightweight intrusion detection for networks, In the Proceedings of the 1999 USENIX LISA Conference, Seattle, Washington, November 7\u201312, 1999, pp.229\u2013238."},{"key":"#cr-split#-4_CR17.1","unstructured":"Theregister, 2002, Leyden, J. (July 9 2002);"},{"key":"#cr-split#-4_CR17.2","unstructured":"P45s for porn surfers, http:\/\/www.theregister.co.uk\/content\/6\/26098.html ."}],"container-title":["IFIP International Federation for Information Processing","Information Security Management, Education and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8145-6_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:28:32Z","timestamp":1619555312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8145-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402081448"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8145-6_4","relation":{},"subject":[]}}