{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T11:49:48Z","timestamp":1773316188409,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562084","type":"print"},{"value":"9789819562091","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6209-1_18","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:25:27Z","timestamp":1767320727000},"page":"330-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Generation Method of\u00a0SELinux Policy Based on\u00a0Knowledge Graph"],"prefix":"10.1007","author":[{"given":"Jin","family":"Li","sequence":"first","affiliation":[]},{"given":"Yina","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Jiaxin","family":"He","sequence":"additional","affiliation":[]},{"given":"Hanyv","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Devyanin, P.N., Khoroshilov, A.V., Kuliamin, V.V., Petrenko, A.K., Shchepetkov, I.V.: Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system. Program. Comput. Softw. 46, 443\u2013453 (2020)","DOI":"10.1134\/S0361768820070026"},{"key":"18_CR2","unstructured":"Zhou, Y., Shen, B., Shan, T.: Improving logging to reduce permission $$\\{$$Over-Granting$$\\}$$ mistakes. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 409\u2013426 (2023)"},{"issue":"11","key":"18_CR3","doi-asserted-by":"publisher","first-page":"13071","DOI":"10.1007\/s10462-023-10465-9","volume":"56","author":"C Peng","year":"2023","unstructured":"Peng, C., Xia, F., Naseriparsa, M., Osborne, F.: Knowledge graphs: opportunities and challenges. Artif. Intell. Rev. 56(11), 13071\u201313102 (2023)","journal-title":"Artif. Intell. Rev."},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"166676","DOI":"10.1109\/ACCESS.2019.2947377","volume":"7","author":"M Uddin","year":"2019","unstructured":"Uddin, M., Islam, S., Al-Nemrat, A.: A dynamic access control model using authorising workflow and task-role-based access control. IEEE Access 7, 166676\u2013166689 (2019)","journal-title":"IEEE Access"},{"key":"18_CR5","unstructured":"Cochez, M., et\u00a0al.: Knowledge graphs. ACM Comput. Surv. (CSUR) 54(4), 1\u201337 (2021)"},{"key":"18_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108218","volume":"121","author":"D Cheng","year":"2022","unstructured":"Cheng, D., Yang, F., Xiang, S., Liu, J.: Financial time series forecasting with multi-modality graph neural network. Pattern Recogn. 121, 108218 (2022)","journal-title":"Pattern Recogn."},{"key":"18_CR7","unstructured":"Shengli, Y., Ang, M.A., Yanhua, Y.U.: A review of knowledge graph based on reinforcement learning. Comput. Res. Dev. 59(08), 1694\u20131722 (2022)"},{"key":"18_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109597","volume":"255","author":"J Cheng","year":"2022","unstructured":"Cheng, J., Shen, T., Zhang, F.: A comprehensive overview of knowledge graph completion. Knowl.-Based Syst. 255, 109597 (2022)","journal-title":"Knowl.-Based Syst."},{"key":"18_CR9","unstructured":"Garcia-Duran, A., Bordes, A., Usunier, N.: Translating embeddings for modeling multi-relational data. In: Advances in Neural Information Processing Systems, vol. 26 (2013)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Dettmers, T., Minervini, P., Stenetorp, P., Riedel, S.: Convolutional 2D knowledge graph embeddings. In: International Semantic Web Conference, vol. 32. Proceedings of the AAAI Conference on Artificial Intelligence (2018)","DOI":"10.1609\/aaai.v32i1.11573"},{"key":"18_CR11","unstructured":"Trouillon, T., Welbl, J., Riedel, S., Gaussier, \u00c9., Bouchard, G.: Complex embeddings for simple link prediction. In: International Semantic Web Conference, pp. 2071\u20132080. PMLR (2016)"},{"issue":"1","key":"18_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.eng.2018.01.004","volume":"4","author":"Y Jia","year":"2018","unstructured":"Jia, Y., Qi, Y., Shang, H., Jiang, R., Li, A.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53\u201360 (2018)","journal-title":"Engineering"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-030-30796-7_13","volume-title":"The Semantic Web \u2013 ISWC 2019","author":"E Kiesling","year":"2019","unstructured":"Kiesling, E., Ekelhart, A., Kurniawan, K., Ekaputra, F.: The SEPSES knowledge graph: an integrated resource for cybersecurity. In: Ghidini, C., et al. (eds.) ISWC 2019. LNCS, vol. 11779, pp. 198\u2013214. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30796-7_13"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Shehab, M., Marouf, S., Phuong, D.M.: A learning-based approach for selinux policy optimization with type mining. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1\u20134 (2010)","DOI":"10.1145\/1852666.1852746"},{"key":"18_CR15","unstructured":"Wang, R., et\u00a0al.: $$\\{$$EASEAndroid$$\\}$$: Automatic policy analysis and refinement for security enhanced android via $$\\{$$Large-Scale$$\\}$$$$\\{$$Semi-Supervised$$\\}$$ learning. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 351\u2013366 (2015)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Suwi, H., Kara, N., Wahab, O.A., Edstrom, C., Lemieux, Y.: Offline and real-time policy-based management for virtualized services: conflict and redundancy detection, and automated resolution. J. Netw. Syst. Manag. 32(3), 57 (2024)","DOI":"10.1007\/s10922-024-09830-y"},{"key":"18_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103808","volume":"140","author":"C Yin","year":"2024","unstructured":"Yin, C., Yin, Z., Kong, X.: Semi supervised log anomaly detection based on bidirectional temporal convolutional network. Comput. Secur. 140, 103808 (2024)","journal-title":"Comput. Secur."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Radhika, B.S., Narendra Kumar, N.V., Shyamasundar, R.K., Vyas, P.: Consistency analysis and flow secure enforcement of selinux policies. Comput. Secur. 94, 101816 (2020)","DOI":"10.1016\/j.cose.2020.101816"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Ghoualmi, N., Khelf, R.: Intra and inter policy conflicts dynamic detection algorithm. In: 2017 Seminar on Detection Systems Architectures and Technologies (DAT), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/DAT.2017.7889181"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Wang, H., Yu, A., Xiao, L., Li, J., Cao, X.: SPRT: automatically adjusting selinux policy for vulnerability mitigation. In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT 2024), pp. 1\u201312. ACM, San Antonio, TX, USA (2024)","DOI":"10.1145\/3649158.3657306"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Stoller, S.D., Bui, T.: A decision tree learning approach for mining relationship-based access control policies. In: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, pp. 167\u2013178 (2020)","DOI":"10.1145\/3381991.3395619"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Jia, S., Xiang, Y., Chen, X., Wang, K.: Triple trustworthiness measurement for knowledge graph. In: International Semantic Web Conference, pp. 2865\u20132871. The World Wide Web Conference (2019)","DOI":"10.1145\/3308558.3313586"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Xiao, L., Wang, H., Yu, A., Zhao, L., Meng, D.: CASPR: context-aware security policy recommendation. In: Network and Distributed System Security (NDSS) Symposium (2025)","DOI":"10.14722\/ndss.2025.240418"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6209-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:44:29Z","timestamp":1773251069000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6209-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562084","9789819562091"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6209-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}