{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:10:07Z","timestamp":1743984607560,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642325960"},{"type":"electronic","value":"9783642325977"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32597-7_47","type":"book-chapter","created":{"date-parts":[[2012,8,18]],"date-time":"2012-08-18T13:54:05Z","timestamp":1345298045000},"page":"514-522","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly Discovery and Resolution in MySQL Access Control Policies"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Shehab","sequence":"first","affiliation":[]},{"given":"Saeed","family":"Al-Haj","sequence":"additional","affiliation":[]},{"given":"Salil","family":"Bhagurkar","sequence":"additional","affiliation":[]},{"given":"Ehab","family":"Al-Shaer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/1266840.1266875","volume-title":"Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007","author":"G.-J. Ahn","year":"2007","unstructured":"Ahn, G.-J., Hu, H.: Towards realizing a formal RBAC model in real systems. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 215\u2013224. ACM, New York (2007)"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Discovery of policy anomalies in distributed firewalls. In: INFOCOM 2004, vol.\u00a04 (March 2004)","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"47_CR3","unstructured":"Application Security Inc. Database security tips for 2012 (2011), http:\/\/www.appsecinc.com\/santa-breach\/Database_Security_Tips_2012.pdf"},{"key":"47_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/123186.123222","volume-title":"Proceedings of the 27th ACM\/IEEE Design Automation Conference, DAC 1990","author":"K.S. Brace","year":"1990","unstructured":"Brace, K.S., Rudell, R.L., Bryant, R.E.: Efficient implementation of a BDD package. In: Proceedings of the 27th ACM\/IEEE Design Automation Conference, DAC 1990, pp. 40\u201345. ACM, New York (1990)"},{"key":"47_CR5","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"35","author":"R.E. Bryant","year":"1986","unstructured":"Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput.\u00a035, 677\u2013691 (1986)","journal-title":"IEEE Trans. Comput."},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Hamed, H.H., Al-Shaer, E.S., Marrero, W.: Modeling and verification of IPSec and VPN security policies. In: 13th IEEE International Conference on Network Protocols, ICNP 2005, pp. 259\u2013278 (2005)","DOI":"10.1109\/ICNP.2005.25"},{"key":"47_CR7","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1145\/1998441.1998472","volume-title":"Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011","author":"H. Hu","year":"2011","unstructured":"Hu, H., Ahn, G.-J., Kulkarni, K.: Anomaly discovery and resolution in web access control policies. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, pp. 165\u2013174. ACM, New York (2011)"},{"key":"47_CR8","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"E.C. Lupu","year":"1999","unstructured":"Lupu, E.C., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Trans. Softw. Eng.\u00a025, 852\u2013869 (1999)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"47_CR9","unstructured":"Shafiq, B., Masood, A., Joshi, J., Ghafoor, A.: A role-based access control policy verification framework for real-time systems. In: WORDS 2005 (February 2005)"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32597-7_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T23:46:10Z","timestamp":1743983170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32597-7_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642325960","9783642325977"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32597-7_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}