{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:45:14Z","timestamp":1725471914445},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540476993"},{"type":"electronic","value":"9783540477006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11908739_5","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:19:02Z","timestamp":1160579942000},"page":"60-75","source":"Crossref","is-referenced-by-count":0,"title":["A Model-Based Method for Security Configuration Verification"],"prefix":"10.1007","author":[{"given":"Hiroshi","family":"Sakaki","sequence":"first","affiliation":[]},{"given":"Kazuo","family":"Yanoo","sequence":"additional","affiliation":[]},{"given":"Ryuichi","family":"Ogawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Hosomi, H.S., Ogawa, R.: An Information Leakage Risk Evaluation Method Based on Sensitive Document Detection and Security Configuration Validation (2) Sensitive Document Detection with Text and Structure Analysis. In: The 67th National Convention of IPSJ (2005) (in Japanese)"},{"key":"5_CR2","unstructured":"Okajo, S., Matsuda, K., Ogawa, R.: A Policy Description Language for Policy-based Security Management. 2004-CSEC-027\u00a02004(129) (December 2004) (in Japanese)"},{"key":"5_CR3","unstructured":"Nessus Vulnerability Scanner, \n                    \n                      http:\/\/www.nessus.org\/"},{"key":"5_CR4","unstructured":"Symantec Enterprise Security Manager, \n                    \n                      http:\/\/www.symantec.com\/Products\/enterprise?c=prodinfo&refId=855"},{"key":"5_CR5","unstructured":"HP OpenView, \n                    \n                      http:\/\/h50146.www5.hp.com\/products\/software\/management\/openview\/"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 workshop on New security paradigms, pp. 71\u201379 (1998)","DOI":"10.1145\/310889.310919"},{"issue":"1-2\/2002","key":"5_CR7","first-page":"189","volume":"10","author":"C.R. Ramakrishnan","year":"2003","unstructured":"Ramakrishnan, C.R., Sekar, R.: Model-based Analysis of Configuration Vulnerabilities. Journal of Computer Security\u00a010(1-2\/2002), 189\u2013209 (2003)","journal-title":"Journal of Computer Security"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Cheung, S., Lindqvist, U., Fong, M.W.: Modeling Multistep Cyber Attacks for Scenario Recognition. In: Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C, April 22\u201324, vol.\u00a0I, pp. 284\u2013292 (2003)","DOI":"10.1109\/DISCEX.2003.1194892"},{"key":"5_CR9","unstructured":"Bhatt, S., Horne, W., Pato, J., Rajagopalan, S.R., Rao, P.: Model-based validation of enterprise access policies, HPL-20050152(R.1) (2006)"},{"key":"5_CR10","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL:A Logic-based Network Security Analyzer. In: 14th Usenix Security Symposium (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11908739_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:39:03Z","timestamp":1619509143000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11908739_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540476993","9783540477006"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11908739_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}