{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:11:15Z","timestamp":1748751075919,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319256443"},{"type":"electronic","value":"9783319256450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25645-0_13","type":"book-chapter","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T12:24:45Z","timestamp":1448281485000},"page":"191-205","source":"Crossref","is-referenced-by-count":6,"title":["A Framework for Policy Similarity Evaluation and Migration Based on Change Detection"],"prefix":"10.1007","author":[{"given":"Jaideep","family":"Vaidya","sequence":"first","affiliation":[]},{"given":"Basit","family":"Shafiq","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"David","family":"Lorenzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Giles, J., Lee, K.-W., Lobo, J.: Policy ratification. In: POLICY 2005, pp. 223\u2013232. IEEE Computer Society, Washington, DC (2005)","DOI":"10.1109\/POLICY.2005.25"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-30108-0_3","volume-title":"Computer Security \u2013 ESORICS 2004","author":"M Backes","year":"2004","unstructured":"Backes, M., D\u00fcrmuth, M., Steinwandt, R.: An algebra for composing enterprise privacy policies. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 33\u201352. Springer, Heidelberg (2004)"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P Bonatti","year":"2002","unstructured":"Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM Transactions on Information and System Security 5(1), 1\u201335 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Bruns, G., Dantas, D.S., Huth, M.: A simple and expressive semantic framework for policy composition in access control. In: Proceedings of the 5th ACM Workshop on Formal Methods in Security Engineering (2007)","DOI":"10.1145\/1314436.1314439"},{"key":"13_CR5","unstructured":"Cobena, G., Abiteboul, S., Marian, A.: Detecting changes in xml documents. In: ICDE (2002)"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1023\/A:1008787317852","volume":"8","author":"S Dawson","year":"2000","unstructured":"Dawson, S., Qian, S., Samarati, P.: Providing security and interoperation of heterogeneous systems. Distributed and Parallel Databases 8, 119\u2013145 (2000)","journal-title":"Distributed and Parallel Databases"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: ICSE, pp. 196\u2013205 (2005)","DOI":"10.1145\/1062455.1062502"},{"issue":"1","key":"13_CR8","first-page":"43","volume":"22","author":"L Gong","year":"1996","unstructured":"Gong, L., Qian, X.: Computational issues in secure interoperation. IEEE TSE 22(1), 43\u201352 (1996)","journal-title":"IEEE TSE"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: On the specification and evolution of access control policies. In: SACMAT 2001, pp. 121\u2013130 (2001)","DOI":"10.1145\/373256.373280"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Lin, D., Rao, P., Bertino, E., Lobo, J.: An approach to evaluate policy similarity. In: SACMAT 2007, pp. 1\u201310. ACM, New York (2007)","DOI":"10.1145\/1266840.1266842"},{"issue":"6","key":"13_CR11","first-page":"852","volume":"25","author":"E Lupu","year":"1999","unstructured":"Lupu, E., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE TSE 25(6), 852\u2013869 (1999)","journal-title":"IEEE TSE"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Mazzoleni, P., Bertino, E., Crispo, B., Sivasubramanian, S.: Xacml policy integration algorithms: not to be confused with xacml policy combination algorithms! In: SACMAT 2006, New York, NY, USA, pp. 219\u2013227 (2006)","DOI":"10.1145\/1133058.1133089"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"McDaniel, P., Prakash, A.: Methods and limitations of security policy reconciliation. ACM Transactions on Information and System Security 9(3) (2006)","DOI":"10.1145\/1178618.1178620"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Moffett, J.D., Sloman, M.S.: Policy conflict analysis in distributed system management. Journal of Organizational Computing (1993)","DOI":"10.1080\/10919399409540214"},{"key":"13_CR15","unstructured":"Moses, T.: Extensible access control markup language (XACML) version 1.0. Technical report, OASIS (2003)"},{"key":"13_CR16","unstructured":"Peters, L.: Change detection in XML trees: a survey. In: 3rd Twente Student Conference on IT. University of Twente, June 2005"},{"issue":"11","key":"13_CR17","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/TKDE.2005.185","volume":"17","author":"B Shafiq","year":"2005","unstructured":"Shafiq, B., Joshi, J., Bertino, E., Ghafoor, A.: Secure interoperation in a multidomain environment employing rbac policies. IEEE Trans. Knowl. Data Eng. 17(11), 1557\u20131577 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"9","key":"13_CR18","doi-asserted-by":"publisher","first-page":"1946","DOI":"10.1109\/TKDE.2012.174","volume":"25","author":"D Lin","year":"2013","unstructured":"Lin, D., Rao, P., Ferrini, R., Bertino, E., Lobo, J.: A similarity measure for comparing XACML policies. IEEE Trans. Knowl. Data Eng. 25(9), 1946\u20131959 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25645-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T13:42:18Z","timestamp":1748698938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25645-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319256443","9783319256450"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25645-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}