{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:36:16Z","timestamp":1726032976156},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030238124"},{"type":"electronic","value":"9783030238131"}],"license":[{"start":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T00:00:00Z","timestamp":1561420800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-23813-1_9","type":"book-chapter","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T02:03:58Z","timestamp":1561428238000},"page":"71-78","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fuzzy Rules Based Solution for System Administration Security Management via a Blockchain"],"prefix":"10.1007","author":[{"given":"Arnaud","family":"Castelltort","sequence":"first","affiliation":[]},{"given":"Antoine","family":"Chabert","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Hersog","sequence":"additional","affiliation":[]},{"given":"Anne","family":"Laurent","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Sala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,25]]},"reference":[{"issue":"C","key":"9_CR1","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.jnca.2016.01.008","volume":"62","author":"S Alneyadi","year":"2016","unstructured":"Alneyadi, S., Sithirasenan, E., Muthukkumarasamy, V.: A survey on data leakage prevention systems. J. Netw. Comput. Appl. 62(C), 137\u2013152 (2016)","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Al Amro, S., Chiclana, F., Elizondo, D.A.: Application of fuzzy logic in computer security and forensics. In: Elizondo, D.A., Solanas, A., Mart\u00ednez-Ballest\u00e9, A. (eds.) Computational Intelligence for Privacy and Security, vol. 394. Studies in Computational Intelligence, pp. 35\u201349. Springer (2012)","key":"9_CR2","DOI":"10.1007\/978-3-642-25237-2_4"},{"issue":"4","key":"9_CR3","doi-asserted-by":"publisher","first-page":"B-141","DOI":"10.1287\/mnsc.17.4.B141","volume":"17","author":"RE Bellman","year":"1970","unstructured":"Bellman, R.E., Zadeh, L.A.: Decision-making in a fuzzy environment. Manag. Sci. 17(4), B-141\u2013B-164 (1970)","journal-title":"Manag. Sci."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.future.2017.09.077","volume":"80","author":"R-Y Chen","year":"2018","unstructured":"Chen, R.-Y.: A traceability chain algorithm for artificial neural networks using T-S fuzzy cognitive maps in blockchain. Futur. Gener. Comput. Syst. 80, 198\u2013210 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"unstructured":"Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., Ochoa, M.: Insight into insiders: a survey of insider threat taxonomies, analysis, modeling, and countermeasures. CoRR (2018). \n                  arXiv:abs\/1805.01612","key":"9_CR5"},{"doi-asserted-by":"crossref","unstructured":"Kaga, Y., Fujio, M., Naganuma, K., Takahashi, K., Murakami, T., Ohki, T., Nishigaki, M.: A secure and practical signature scheme for blockchain based on biometrics. In: Liu, J.K., Samarati, P. (eds.) Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, 13\u201315 December, 2017, Proceedings. LNCS, vol. 10701, pp. 877\u2013891. Springer (2017)","key":"9_CR6","DOI":"10.1007\/978-3-319-72359-4_55"},{"unstructured":"Marwala, T., Xing, B.: Blockchain and artificial intelligence. CoRR (2018). \n                  arXiv:abs\/1802.04451","key":"9_CR7"},{"unstructured":"Spitzner, L.: Honeypots: catching the insider threat. In: Proceedings of the 19th Annual Computer Security Applications Conference, ACSAC 2003, p. 170. IEEE Computer Society, Washington, DC (2003)","key":"9_CR8"},{"doi-asserted-by":"crossref","unstructured":"Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: mitigating insider data theft attacks in the cloud. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, SPW 2012, pp. 125\u2013128. IEEE Computer Society, Washington, DC (2012)","key":"9_CR9","DOI":"10.1109\/SPW.2012.19"},{"unstructured":"Trzeciak, R.F.: SEI cyber minute: insider threats (2017). \n                  http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=496626","key":"9_CR10"},{"doi-asserted-by":"crossref","unstructured":"Xu, H., Tang, R.: Study and improvements for the real-time performance of Linux kernel. In: 2010 3rd International Conference on Biomedical Engineering and Informatics, vol. 7, pp. 2766\u20132769, October 2010","key":"9_CR11","DOI":"10.1109\/BMEI.2010.5639840"},{"doi-asserted-by":"crossref","unstructured":"Zhao, K., Li, Q., Kang, J., Jiang, D., Hu, L.: Design and implementation of secure auditing system in Linux kernel. In: 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), pp. 232\u2013236, April 2007","key":"9_CR12","DOI":"10.1109\/IWASID.2007.373733"}],"container-title":["Advances in Intelligent Systems and Computing","Blockchain and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23813-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T02:39:14Z","timestamp":1561430354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-23813-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,25]]},"ISBN":["9783030238124","9783030238131"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23813-1_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,6,25]]},"assertion":[{"value":"25 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BLOCKCHAIN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Congress on Blockchain and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u00c1vila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blockchain2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.blockchain-congress.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}