{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:14:11Z","timestamp":1743038051810,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_15","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"243-262","source":"Crossref","is-referenced-by-count":0,"title":["A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations"],"prefix":"10.1007","author":[{"given":"Anant","family":"Pushkar","sequence":"first","affiliation":[]},{"given":"Nirnay","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Soumya K.","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1080\/00401706.1989.10488517","volume":"31","author":"B Abraham","year":"1989","unstructured":"Abraham, B., Chuang, A.: Outlier detection and time series modeling. Technometrics 31(2), 241\u2013248 (1989)","journal-title":"Technometrics"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C.: On abnormality detection in spuriously populated data streams. In: SDM, pp. 80\u201391. SIAM (2005)","DOI":"10.1137\/1.9781611972757.8"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MS.2011.153","volume":"29","author":"A Almutairi","year":"2012","unstructured":"Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., Ghafoor, A.: A distributed access control architecture for cloud computing. IEEE Softw. 29(2), 36\u201344 (2012). doi:\n                      10.1109\/MS.2011.153","journal-title":"IEEE Softw."},{"key":"15_CR4","unstructured":"Banks, D., Erickson, J.S., Rhodes, M.: Toward cloud-based collaboration services. In: Usenix Workshop HotCloud (2009)"},{"key":"15_CR5","volume-title":"Outliers in Statistical Data","author":"V Barnett","year":"1994","unstructured":"Barnett, V., Lewis, T.: Outliers in Statistical Data, vol. 3. Wiley, New York (1994)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), pp. 159\u2013168. IEEE (2004)","DOI":"10.1109\/POLICY.2004.1309162"},{"key":"15_CR7","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 164\u2013173. IEEE (1996)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/BFb0055488","volume-title":"Financial Cryptography","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Feigenbaum, J., Strauss, M.: Compliance checking in the PolicyMaker trust management system. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 254\u2013274. Springer, Heidelberg (1998)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Blaze, M., Keromytis, A.D.: The KeyNote trust-management system version 2. RFC 2704 (Informational) (1999)","DOI":"10.17487\/rfc2704"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.cose.2015.04.002","volume":"53","author":"M Carminati","year":"2015","unstructured":"Carminati, M., Caron, R., Maggi, F., Epifani, I., Zanero, S.: BankSealer: A decision support system for online banking fraud analysis and investigation. Comput. Secur. 53, 175\u2013186 (2015)","journal-title":"Comput. Secur."},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Chen, L., Crampton, J.: Inter-domain role mapping and least privilege. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp. 157\u2013162. ACM (2007)","DOI":"10.1145\/1266840.1266866"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Du, S., Joshi, J.B.: Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT 2006), pp. 228\u2013236. ACM (2006)","DOI":"10.1145\/1133058.1133090"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., Tarjan, R.E.: Fast exact and heuristic methods for role minimization problems. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 1\u201310. ACM (2008)","DOI":"10.1145\/1377836.1377838"},{"key":"15_CR15","unstructured":"Eskin, E.: Anomaly detection over noisy data using learned probability distributions. In: Proceedings of the 17th International Conference on Machine Learning, pp. 255\u2013262. Morgan Kaufmann Publishers Inc. (2005)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Fawcett, T., Provost, F.: Activity monitoring: Noticing interesting changes in behavior. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 53\u201362. ACM (1999)","DOI":"10.1145\/312129.312195"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TCC.2014.2328578","volume":"3","author":"N Ghosh","year":"2015","unstructured":"Ghosh, N., Ghosh, S.K., Das, S.K.: SelCSP: a framework to facilitate selection of cloud service providers. IEEE Trans. Cloud Comput. 3(1), 66\u201379 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Reilly, D.L.: Credit card fraud detection with a neural-network. In: Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences, vol. 3, pp. 621\u2013630. IEEE (1994)","DOI":"10.1109\/HICSS.1994.323314"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/11538059_42","volume-title":"Advances in Intelligent Computing","author":"Z He","year":"2005","unstructured":"He, Z., Deng, S., Xu, X.: An optimization model for outlier detection in categorical data. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3644, pp. 400\u2013409. Springer, Heidelberg (2005)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Lee, A.J., Winslett, M., Basney, J., Welch, V.: Traust: a trust negotiation-based authorization service for open systems. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT 2006), pp. 39\u201348. ACM (2006)","DOI":"10.1145\/1133058.1133066"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D.: NIST Cloud Computing Reference Architecture. NIST special publication 500, 292 (2011)","DOI":"10.6028\/NIST.SP.500-292"},{"issue":"1","key":"15_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M Nyanchama","year":"1999","unstructured":"Nyanchama, M., Osborn, S.: The role graph model and conflict of interest. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(1), 3\u201333 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"2","key":"15_CR23","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:01:20Z","timestamp":1559332880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}