{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:47:58Z","timestamp":1725504478735},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387773216"},{"type":"electronic","value":"9780387773223"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-77322-3_9","type":"book-chapter","created":{"date-parts":[[2008,3,6]],"date-time":"2008-03-06T15:47:27Z","timestamp":1204818447000},"page":"153-164","source":"Crossref","is-referenced-by-count":1,"title":["Surviving Insider Attacks: A Call for System Experiments"],"prefix":"10.1007","author":[{"given":"Virgil D.","family":"Gligor","sequence":"first","affiliation":[]},{"given":"C. Sekar","family":"Chandersekaran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"A. Avizienis and J.-C. Laprie, \u201cDependable Computing: From Concepts to Design Diversity,\u201d Proceedings of the IEEE, vol. 74, no. 5, May 1986.","DOI":"10.1109\/PROC.1986.13527"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"A. Avizienis, J.-C. Laprie, B. Rendell, and C. Landwehr, \u201cBasic Concepts and Taxonomy of Dependable and Secure Computing,\u201d IEEE Transactions on Dependable and Secure Computing, vol.1, no. 1, Jan-Mar 2004","DOI":"10.1109\/TDSC.2004.2"},{"key":"9_CR3","unstructured":"R. Bobba, S.I. Gavrila, V.D. Gligor, H. Khurana, and R. Koleva, \u201cAdministering Access Control in Dynamic Coalitions,\u201d Proc. of the 19th USENIX Large Installation System Administration Conference (LISA), San Diego, CA, December 2005."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"D. Boneh and M. Franklin, \u201cEfficinet Generation of Shared RSA Keys,\u201d Journal of the ACM (JACM), Vol. 48, Issue 4, July 2001","DOI":"10.1145\/502090.502094"},{"key":"9_CR5","unstructured":"D. D. Clark and D.R. Wilson, \u201cEvolution of a Model for Computer Security,\u201d in Report of the Invitational Workshop on Data Integrity, Z. Ruthberg and W.T. Polk (eds.) NIST Special Publication 500=168, Appendix A, September 1989."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"V.D. Gligor, S. I. Gavrila and D. Ferraiolo, \u201cOn the Formal Definition of Separation-of-Duty Policies and their Composition,\u201d IEEE Symposium on Security and Privacy, Oakland, California, May 1998, pp. 172-185.","DOI":"10.1109\/SECPRI.1998.674833"},{"key":"9_CR7","unstructured":"J. Gray, \u201cThe Transaction Concept: Virtues and Limitations,\u201d Proceedings of the VLDB, Cannes, France, 1981."},{"key":"9_CR8","unstructured":"P. Gupta, V. Shmatikov. Key Confirmation and Adaptive Corruptions in the Protocol Security Logic,\u201d Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis Seattle, August 15 - 16, 2006"},{"key":"9_CR9","unstructured":"M.S. Hecht, M.E. Carson, C.S. Chandersekaran, R.S. Chapman, L.J. Dotterer, V.D. Gligor, W.D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, \u201cUnix without the Superuser,\u201d Proc. of the USENIX Conference, Phoenix, Arizona, June 1987, pp. 243-256."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"J. Katz, R. Ostrovsky and M. Yung, \u201cEfficient Password-Based Authenticated Key Exchange Using Human-Memorable Passwords,\u201d Advanced in Cryptography - Eurocrypt 2001, Innsbruck, Austria, May 2001.","DOI":"10.1007\/3-540-44987-6_29"},{"key":"9_CR11","unstructured":"\"Two-Server Password-Only Authenticated Key Exchange,\" J. Katz, P. MacKenzie, G.Taban, and V. Gligor, in Proccedings of Applied Cryptography and Network Security (ACNS), N.Y. 2005"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"H. Khurana, V.D. Gligor, and J. Linn, \u201cReasoning about Joint Administration of Access Policies for Coalition Resources,\u201d Proc. of the IEEE International Conference for Distributed Computer Systems - ICDCS, Vienna, Austria, July 2002.","DOI":"10.1109\/ICDCS.2002.1022281"},{"key":"9_CR13","unstructured":"National Security Agency, \u201cA Guide to Understanding Trusted Facility Management,\u201d National Computer Security Center, NCSC-TG-015, Version 1, 1989."},{"key":"9_CR14","unstructured":"National Security Agency, \u201cA Guide to Understanding Audit in Trusted Systems,\u201d National Computer Security Center, NCSC-TG-001, Version 1, 1988"},{"key":"9_CR15","unstructured":"P. G. Neumann, \u201cPrincipled Assuredly Trustworthy Compusable Architectures,\u201d DARPA Final Report, SRI Project P11459, December 28, 2004."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"R. Reeder and R. Maxion, \u201cUser Interface Dependability through Goal-Error Prevention,\u201d International Conference on Dependable Systems and Networks, Yokohama, Japan, June 2005.","DOI":"10.1109\/DSN.2005.95"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"J. H. Saltzer and M.D. Schroeder, \u201cThe Protection of Information in Computer Systems, \u201c Proccedings of the IEEE, vol. 63, no. 9, Sept. 1975.","DOI":"10.1109\/PROC.1975.9939"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"R. T. Simon and M.E. Zurko, \u201cSeparation of Duty in Role-Based Environments,\u201d Proceedings of the Computer Security Foundations Workshop, Rockport, Mass. June 1997.","DOI":"10.1109\/CSFW.1997.596811"}],"container-title":["Advances in Information Security","Insider Attack and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-77322-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:14:57Z","timestamp":1619669697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-77322-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387773216","9780387773223"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-77322-3_9","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[]}}