{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:21:18Z","timestamp":1742984478882,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031599323"},{"type":"electronic","value":"9783031599330"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-59933-0_14","type":"book-chapter","created":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T11:01:49Z","timestamp":1716807709000},"page":"199-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Leverage Data Security Policies Complexity for\u00a0Users: An End-to-End Storage Service Management in\u00a0the\u00a0Cloud Based on\u00a0ABAC Attributes"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Greneche","sequence":"first","affiliation":[]},{"given":"Frederic","family":"Andres","sequence":"additional","affiliation":[]},{"given":"Shihori","family":"Tanabe","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Pester","sequence":"additional","affiliation":[]},{"given":"Hesham H.","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Amgad A.","family":"Mahmoud","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Bascle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,25]]},"reference":[{"unstructured":"National Security Agency. Kubernetes hardening guidance v 1.2. Technical report National Security Agency, Cybersecurity and Infrastructure Security Agency (2022). https:\/\/media.defense.gov\/2022\/Aug\/29\/2003066362\/-%201\/-%201\/0\/CTR_KUBERNETES_HARDENING_GUIDANCE_1.2_20220829.PDF","key":"14_CR1"},{"unstructured":"Badger, L., et al.: Practical domain and type enforcement for UNIX. In: Proceedings 1995 IEEE Symposium on Security and Privacy, pp. 66\u201377. IEEE (1995)","key":"14_CR2"},{"unstructured":"Bell, D.E.,: Secure computer systems: mathematical foundations and model. In: Technical Report ESD-TR-73-278-1 (1973)","key":"14_CR3"},{"unstructured":"Biba, K.: Integrity considerations for secure computing systems. In: Mitre Report MTR-3153, Mitre Corporation, Bedford, MA (1975)","key":"14_CR4"},{"unstructured":"Boebert, W.E.: A practical alternative to hierarchical integrity policies. In: Proceedings of the 8th National Computer Security Conference, 1985 (1985)","key":"14_CR5"},{"doi-asserted-by":"crossref","unstructured":"Bousquet, A., et al.: Enforcing security and assurance properties in cloud environment. In: 2015 IEEE\/ACM 8th International Conference on Utility and Cloud Computing (UCC), pp. 271\u2013280. IEEE (2015)","key":"14_CR6","DOI":"10.1109\/UCC.2015.45"},{"doi-asserted-by":"crossref","unstructured":"Brand, S.L.: DoD 5200.28-STD department of defense trusted computer system evaluation criteria (orange book). Nat. Comput. Secur. Center, 1\u201394 (1985)","key":"14_CR7","DOI":"10.1007\/978-1-349-12020-8_1"},{"issue":"4","key":"14_CR8","first-page":"325","volume":"2","author":"J Briffaut","year":"2009","unstructured":"Briffaut, J., Lalande, J.-F., Toinard, C.: Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies. Int. J. Adv. Secur. 2(4), 325\u2013343 (2009)","journal-title":"Int. J. Adv. Secur."},{"issue":"5","key":"14_CR9","doi-asserted-by":"publisher","first-page":"395","DOI":"10.4304\/jcp.4.5.395-404","volume":"4","author":"J Briffaut","year":"2009","unstructured":"Briffaut, J., Lalande, J.-F., Toinard, C.: Security and results of a large-scale high-interaction honeypot. J. Comput. 4(5), 395\u2013404 (2009)","journal-title":"J. Comput."},{"doi-asserted-by":"crossref","unstructured":"Briffaut, J., et al.: Enforcement of security properties for dynamic MAC policies. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 114\u2013120. IEEE (2009)","key":"14_CR10","DOI":"10.1109\/SECURWARE.2009.25"},{"doi-asserted-by":"publisher","unstructured":"Chung et al.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations (2019). https:\/\/doi.org\/10.6028\/NIST.SP.800-162","key":"14_CR11","DOI":"10.6028\/NIST.SP.800-162"},{"issue":"4","key":"14_CR12","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F Cuppens","year":"2008","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. Int. J. Inf. Secur. 7(4), 285\u2013305 (2008)","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"14_CR13","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1145\/356678.356680","volume":"8","author":"PJ Denning","year":"1976","unstructured":"Denning, P.J.: Fault tolerant operating systems. ACM Comput. Surv. (CSUR) 8(4), 359\u2013389 (1976)","journal-title":"ACM Comput. Surv. (CSUR)"},{"doi-asserted-by":"crossref","unstructured":"Downs, D.D., et al.: Issues in discretionary access control. In: 1985 IEEE Symposium on Security and Privacy, pp. 208\u2013208. IEEE (1985)","key":"14_CR14","DOI":"10.1109\/SP.1985.10014"},{"unstructured":"Ennahbaoui, M., Elhajji, S.: Study of access control models. In: Proceedings of the World Congress on Engineering, Vol. 2, pp. 3\u20135 (2013)","key":"14_CR15"},{"unstructured":"Ferraiolo, D., Cugini, J., Kuhn, D.R., et al.: Role-based access control (RBAC): features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp. 241\u201348 (1995)","key":"14_CR16"},{"issue":"1","key":"14_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/300830.300834","volume":"2","author":"DF Ferraiolo","year":"1999","unstructured":"Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(1), 34\u201364 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"unstructured":"Ferrario, D.: Role-based access control. In: Proceedings of 15th National Computer Security Conference, 1992 (1992)","key":"14_CR18"},{"doi-asserted-by":"crossref","unstructured":"Gros, D., et al.: PIGA-cluster: a distributed architecture integrating a shared and resilient reference monitor to enforce mandatory access control in the HPC environment. In: 2013 International Conference on High Performance Computing & Simulation (HPCS), pp. 273\u2013280. IEEE (2013)","key":"14_CR19","DOI":"10.1109\/HPCSim.2013.6641426"},{"doi-asserted-by":"crossref","unstructured":"Gupta, E., et al.: Attribute-based access control for NoSQL databases. In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, pp. 317\u2013319 (2021)","key":"14_CR20","DOI":"10.1145\/3422337.3450323"},{"issue":"8","key":"14_CR21","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"MA Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM 19(8), 461\u2013471 (1976)","journal-title":"Commun. ACM"},{"unstructured":"ITSEC. Information Technology Security Evaluation Criteria (1991)","key":"14_CR22"},{"doi-asserted-by":"crossref","unstructured":"Jahid, S., et al.: MyABDAC: compiling XACML policies for attribute based database access control. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 97\u2013108 (2011)","key":"14_CR23","DOI":"10.1145\/1943513.1943528"},{"unstructured":"Kubernetes \u2013 see. https:\/\/kubernetes.io\/.k8s","key":"14_CR24"},{"issue":"1","key":"14_CR25","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"BW Lampson","year":"1974","unstructured":"Lampson, B.W.: Protection. ACM SIGOPS Oper. Syst. Rev. 8(1), 18\u201324 (1974)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"doi-asserted-by":"crossref","unstructured":"Li, N., Mao, Z.: Administration in role-based access control. In: Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security, pp. 127\u2013138 (2007)","key":"14_CR26","DOI":"10.1145\/1229285.1229305"},{"unstructured":"Loscocco, P.A., et al.: The inevitability of failure: the flawed assumption of security in modern computing environments. In: Proceedings of the 21st National Information Systems Security Conference (1998)","key":"14_CR27"},{"doi-asserted-by":"crossref","unstructured":"Mahmoud, A.A., et al.: A new graph-based reinforcement learning environment for targeted molecular generation and optimization. In: 2023 12th International Conference on Software and Information Engineering (2023)","key":"14_CR28","DOI":"10.1145\/3634848.3634857"},{"doi-asserted-by":"crossref","unstructured":"Mayfield, T., et al.: Integrity in automated information systems. Nat. Secur. Agency, Tech. Rep. 79 (1991)","key":"14_CR29","DOI":"10.21236\/ADA245555"},{"issue":"2","key":"14_CR30","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. (TISSEC) 3(2), 85\u2013106 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"unstructured":"Rahman, M.U.: Scalable role-based access control using the EOS blockchain. arXiv preprint: arXiv:2007.02163 (2020)","key":"14_CR31"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R., et al.: The NIST model for role-based access control: towards a unified standard. In: ACM Workshop on Role-Based Access Control, vol. 10, no. 344287.344301 (2000)","key":"14_CR32","DOI":"10.1145\/344287.344301"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: Proceedings of the Third ACM Workshop on Role-Based Access Control, pp. 47\u201354 (1998)","key":"14_CR33","DOI":"10.1145\/286884.286893"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: The typed access matrix model. In: IEEE Symposium on Security and Privacy, pp. 122\u2013136. Citeseer (1992)","key":"14_CR34","DOI":"10.1109\/RISP.1992.213266"},{"issue":"2","key":"14_CR35","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/42282.42286","volume":"35","author":"RS Sandhu","year":"1988","unstructured":"Sandhu, R.S.: The schematic protection model: its definition and analysis for acyclic attenuating schemes. J. ACM (JACM) 35(2), 404\u2013432 (1988)","journal-title":"J. ACM (JACM)"},{"key":"14_CR36","doi-asserted-by":"publisher","first-page":"52976","DOI":"10.1109\/ACCESS.2019.2911732","volume":"7","author":"S Sultan","year":"2019","unstructured":"Sultan, S., Ahmad, I., Dimitriou, T.: Container security: issues, challenges, and the road ahead. IEEE Access 7, 52976\u201352996 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"14_CR37","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1007\/s10586-021-03517-8","volume":"25","author":"X Wang","year":"2022","unstructured":"Wang, X., Du, J., Liu, H.: Performance and isolation analysis of RunC, gVisor and Kata containers runtimes. Cluster Comput. 25(2), 1497\u20131513 (2022)","journal-title":"Cluster Comput."},{"doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, X., Sandhu, R.: ROBAC: scalable role and organization based access control models. In: 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 1\u20139. IEEE (2006)","key":"14_CR38","DOI":"10.1109\/COLCOM.2006.361879"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-59933-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T02:40:53Z","timestamp":1732070453000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-59933-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031599323","9783031599330"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-59933-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln-2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}