{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:12Z","timestamp":1725518352182},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387849263"},{"type":"electronic","value":"9780387849270"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-84927-0_23","type":"book-chapter","created":{"date-parts":[[2008,8,28]],"date-time":"2008-08-28T21:25:29Z","timestamp":1219958729000},"page":"291-306","source":"Crossref","is-referenced-by-count":3,"title":["Inferring Sources of Leaks in Document Management Systems"],"prefix":"10.1007","author":[{"given":"Madhusudhanan","family":"Chandrasekaran","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vidyaraman","family":"Sankaranarayanan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shambhu","family":"Upadhyaya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"2","key":"23_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/253262.253266","volume":"26","author":"S Chawathe","year":"1997","unstructured":"S. Chawathe and H. Garcia-Molina, Meaningful change detection in structured data, ACM SIGMOD Record, vol. 26(2), pp. 26-37, 1997.","journal-title":"ACM SIGMOD Record"},{"doi-asserted-by":"crossref","unstructured":"S. Chawathe, A. Rajaraman, H. Garcia-Molina and J. Widom, Change detection in hierarchically structured information, Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 493-504, 1996.","key":"23_CR2","DOI":"10.1145\/233269.233366"},{"unstructured":"K. Eckstein and M. Jahnke, Data hiding in journaling file systems, Proceedings of the Fifth Annual Digital Forensics Research Workshop, 2005.","key":"23_CR3"},{"unstructured":"EMC Corporation, Authentica Software, Hopkinton, Massachusetts (software.emc.com\/microsites\/regional\/authentica).","key":"23_CR4"},{"doi-asserted-by":"crossref","unstructured":"A. Garg, S. Pramanik, V. Shankaranarayanan and S. Upadhyaya, Dynamic document reclassification for preventing insider abuse, Proceedings of the Fifth Annual IEEE SMC Information Assurance Workshop, pp. 218-225, 2004.","key":"23_CR5","DOI":"10.1109\/IAW.2004.1437820"},{"key":"23_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-3005-5","volume-title":"Information Retrieval: Algorithms and Heuristics","author":"D Grossman","year":"2004","unstructured":"D. Grossman and O. Frieder, Information Retrieval: Algorithms and Heuristics, Springer, Dordrecht, The Netherlands, 2004."},{"unstructured":"Microsoft Corporation, Office 2003 Add-In: Word Redactionv1.2, Redmond, Washington (\n                    www.microsoft.com\/downloads\/details.aspx?FamilyID=028c0fd7-67c2-4b51-8e87-65cc9f30f2ed&displaylang=en\n                    \n                  ).","key":"23_CR7"},{"unstructured":"Microsoft Corporation, Office 2003\/XP Add-In: Remove Hidden Data, Redmond, Washington (\n                    www.microsoft.com\/downloads\/details.aspx?FamilyId=144E54ED-D43E-42CA-BC7B-5446D34E5360& displaylang=en\n                    \n                  ).","key":"23_CR8"},{"unstructured":"A. Mehta, Office Space: Information rights management in Office 2003, TechNet, Microsoft Corporation, Redmond, Washington (technet.microsoft.com\/en-us\/magazine\/cc160822.aspx), 2003.","key":"23_CR9"},{"issue":"2","key":"23_CR10","first-page":"251","volume":"1","author":"E Myers","year":"1986","unstructured":"E. Myers, An O(ND) difference algorithm and its variations, Algo- rithmica, vol. 1(2), pp. 251-266, 1986.","journal-title":"Algo- rithmica"},{"doi-asserted-by":"crossref","unstructured":"S. Pramanik, V. Sankaranarayanan and S. Upadhyaya, Security policies to mitigate insider threats in the document control domain, Proceedings of the Twentieth Annual Computer Security Applications Conference, pp. 304-313, 2004.","key":"23_CR11","DOI":"10.1109\/CSAC.2004.35"},{"unstructured":"J. Rennie, 20 Newsgroups (people.csail.mit.edu\/jrennie\/20Newsgr oups).","key":"23_CR12"},{"doi-asserted-by":"crossref","unstructured":"V. Sankaranarayanan, S. Pramanik and S. Upadhyaya, Detecting masquerading users in a document management system, Proceedings of the IEEE International Conference on Communications, pp. 2296-2301, 2006.","key":"23_CR13","DOI":"10.1109\/ICC.2006.255112"},{"issue":"2","key":"23_CR14","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/317087.317089","volume":"2","author":"B Schneier","year":"1999","unstructured":"B. Schneier and J. Kelsey, Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, vol. 2(2), pp. 159-176, 1999.","journal-title":"ACM Transactions on Information and System Security"},{"doi-asserted-by":"crossref","unstructured":"K. Shanmugasundaram and N. Memon, Automatic reassembly of document fragments via context based statistical models, Proceedings of the Nineteenth Annual Computer Security Applications Conference, pp. 152-159, 2003.","key":"23_CR15","DOI":"10.1109\/CSAC.2003.1254320"},{"issue":"2","key":"23_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L von Ahn","year":"2004","unstructured":"L. von Ahn, M. Blum and J. Langford, Telling humans and computers apart automatically, Communications of the ACM, vol.47(2), pp. 56-60, 2004.","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"W. Wang and T. Daniels, Building evidence graphs for network forensics analysis, Proceedings of the Twenty-First Annual Computer Security Applications Conference, pp. 254-266, 2005.","key":"23_CR17","DOI":"10.1109\/CSAC.2005.14"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-84927-0_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:16:29Z","timestamp":1619669789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-84927-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387849263","9780387849270"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-84927-0_23","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}