{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T03:33:25Z","timestamp":1648956805281},"reference-count":49,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1988,8,1]],"date-time":"1988-08-01T00:00:00Z","timestamp":586396800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1988,8]]},"DOI":"10.1016\/0167-4048(88)90578-0","type":"journal-article","created":{"date-parts":[[2002,10,8]],"date-time":"2002-10-08T10:42:38Z","timestamp":1034073758000},"page":"373-385","source":"Crossref","is-referenced-by-count":6,"title":["Potential applications of knowledge-based methods to computer security"],"prefix":"10.1016","volume":"7","author":[{"given":"Rita C.","family":"Summers","sequence":"first","affiliation":[]},{"given":"Stanley A.","family":"Kurzban","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(88)90578-0_bib1","unstructured":"R. W. Baldwin, Rule based analysis of computer security,Proc. 1987 IEEE COMPCON, pp. 227\u2013233."},{"key":"10.1016\/0167-4048(88)90578-0_bib2","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/0167-4048(84)90040-3","article-title":"User-friendly password methods for computer-mediated information systems","volume":"3","author":"Barton","year":"1984","journal-title":"Comput. Secur."},{"key":"10.1016\/0167-4048(88)90578-0_bib3","series-title":"Proc. 1987 IEEE Symp. on Security and Privacy","first-page":"235","article-title":"Multi-level security for knowledge-based systems","author":"Berson","year":"1987"},{"key":"10.1016\/0167-4048(88)90578-0_bib4","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1145\/6592.6597","article-title":"Expert systems: perils and promise","author":"Bobrow","year":"1986","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(88)90578-0_bib5","series-title":"Programming Expert Systems in OPS5","author":"Brownston","year":"1985"},{"key":"10.1016\/0167-4048(88)90578-0_bib6","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/7885.7886","article-title":"Interface design issues for advice-giving expert systems","author":"Carroll","year":"1987","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(88)90578-0_bib7","first-page":"40","article-title":"As systems spread out data becomes vulnerable","author":"Cashin","year":"1986","journal-title":"Software News"},{"key":"10.1016\/0167-4048(88)90578-0_bib8","article-title":"Acquiring, representinng, and evaluating a competence model of diagnostic strategy","author":"Clancey","year":"1985"},{"key":"10.1016\/0167-4048(88)90578-0_bib9","series-title":"Readings in Medical Artificial Intelligence: The First Decade","year":"1984"},{"key":"10.1016\/0167-4048(88)90578-0_bib10","series-title":"Proc. 1987 IEEE Symp. on Security and Privacy","first-page":"184","article-title":"A comparison of commercial and military computer security policies","author":"Clark","year":"1987"},{"key":"10.1016\/0167-4048(88)90578-0_bib11","series-title":"Programming in PROLOG","author":"Closksin","year":"1984"},{"key":"10.1016\/0167-4048(88)90578-0_bib12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/0004-3702(87)90063-4","article-title":"Diagnosing multiple faults","author":"de Kleer","year":"1987","journal-title":"Artificial Intelligence"},{"key":"10.1016\/0167-4048(88)90578-0_bib13","series-title":"Requirements and Model for IDES\u2014A Real-time Intrusion-detection Expert System","author":"Denning","year":"1985"},{"key":"10.1016\/0167-4048(88)90578-0_bib14","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","article-title":"An Intrusion-detection model","author":"Denning","year":"1987","journal-title":"Trans. Software Eng."},{"key":"10.1016\/0167-4048(88)90578-0_bib15","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1111\/j.1468-0394.1985.tb00451.x","article-title":"EDAAS: an expert system at the US Environmental Protection Agency for avoiding disclosure of confidential business information","author":"Feinstein","year":"1985","journal-title":"Expert Systems"},{"key":"10.1016\/0167-4048(88)90578-0_bib16","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1145\/4284.4285","article-title":"The role of frame-based representation in reasoning","author":"Fikes","year":"1985","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(88)90578-0_bib17","article-title":"Artificial intelligence","author":"Flesher","year":"1987","journal-title":"Internal Auditor"},{"key":"10.1016\/0167-4048(88)90578-0_bib18","series-title":"Artificial Intelligence and Statistics","year":"1986"},{"key":"10.1016\/0167-4048(88)90578-0_bib19","first-page":"3","article-title":"Recent advances in computer audit research","volume":"4","author":"Garner","year":"1985","journal-title":"EDP Auditor J."},{"key":"10.1016\/0167-4048(88)90578-0_bib20","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MC.1987.1663561","article-title":"The nature and evaluation of commercial expert system building tools","author":"Gevarter","year":"1987","journal-title":"Computer"},{"key":"10.1016\/0167-4048(88)90578-0_bib21","doi-asserted-by":"crossref","first-page":"1649","DOI":"10.1002\/j.1538-7305.1984.tb00058.x","article-title":"UNIX operating system security","author":"Grampp","year":"1984","journal-title":"AT & T Bell Lab. Tech. J."},{"key":"10.1016\/0167-4048(88)90578-0_bib22","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/0004-3702(87)90011-7","article-title":"TEAM: An experiment in the design of transportable natural-language interfaces","author":"Grosz","year":"1987","journal-title":"Artificial Intelligence"},{"key":"10.1016\/0167-4048(88)90578-0_bib23","author":"Halme","year":"1986"},{"key":"10.1016\/0167-4048(88)90578-0_bib24","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/0377-2217(86)90139-6","article-title":"A knowledge-based expert system for auditing advanced computer systems","volume":"26","author":"Hansen","year":"1986","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/0167-4048(88)90578-0_bib25","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1145\/4284.4286","article-title":"Rule-based systems","author":"Hayes-Roth","year":"1985","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(88)90578-0_bib26","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1147\/rd.301.0029","article-title":"Interfaces for knowledge-base builders' control knowledge and application specific procedures","author":"Hirsch","year":"1986","journal-title":"IBM J. Res. Dev."},{"key":"10.1016\/0167-4048(88)90578-0_bib27","series-title":"Proc. SHARE 68 Conf.","article-title":"An intelligent help system for IBM VM\/SP","author":"Hurwitz","year":"1987"},{"issue":"Number GH20-9597","key":"10.1016\/0167-4048(88)90578-0_bib28","author":"IBM Corporation","year":"1986","journal-title":"Expert System Consultation Environment and Expert System Development Environmental General Information Manual"},{"issue":"Number GC28-0722-10","key":"10.1016\/0167-4048(88)90578-0_bib29","author":"IBM Corporation","year":"1986","journal-title":"Resource Access Control Facility (RACF) General Information Manual"},{"key":"10.1016\/0167-4048(88)90578-0_bib30","unstructured":"H. Javitz, personal communication, 1987."},{"key":"10.1016\/0167-4048(88)90578-0_bib31","article-title":"A knowledge-based system for debugging concurrent software","author":"LeDoux","year":"1986","journal-title":"UCLA Computer Science Dept. Rep. CSD-860060"},{"key":"10.1016\/0167-4048(88)90578-0_bib32","series-title":"Proc. 1986 IEEE Int. Symp. on Multiple-valued Logic","first-page":"164","article-title":"Probabilistic rule generator: a new methodology of variable-valued logic synthesis","author":"Lee","year":"1986"},{"key":"10.1016\/0167-4048(88)90578-0_bib33","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/0004-3702(82)90021-2","article-title":"R1: a rule-based configurer of computer systems","author":"McDermott","year":"1982","journal-title":"Artificial Intelligence"},{"key":"10.1016\/0167-4048(88)90578-0_bib34","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/S0020-7373(80)80054-X","article-title":"Knowledge acquisition by encoding expert rules versus computer induction from examples: a case study involving soybean pathology","volume":"12","author":"Michalski","year":"1980","journal-title":"Int. J. Man-Machine Stud."},{"issue":"2","key":"10.1016\/0167-4048(88)90578-0_bib35","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1147\/sj.252.0159","article-title":"YES\/MVS and the automation of operations for large computer complexes","volume":"25","author":"Milliken","year":"1986","journal-title":"IBM Syst. J."},{"key":"10.1016\/0167-4048(88)90578-0_bib36","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1177\/001872088402600407","article-title":"Error correction during text entry with word-processing systems","volume":"26","author":"Neal","year":"1984","journal-title":"Hum. Factors"},{"key":"10.1016\/0167-4048(88)90578-0_bib37","unstructured":"G. Peper, personal communication, 1987."},{"key":"10.1016\/0167-4048(88)90578-0_bib38","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1145\/359038.359041","article-title":"Computer programs for detecting and correcting spelling errors","author":"Peterson","year":"1980","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(88)90578-0_bib39","article-title":"Computer sleep stage scoring\u2014an expert system approach","author":"Ray","year":"1985"},{"key":"10.1016\/0167-4048(88)90578-0_bib40","series-title":"Artificial Intelligence","author":"Rich","year":"1983"},{"key":"10.1016\/0167-4048(88)90578-0_bib41","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MS.1987.230396","article-title":"Knowledge-based program debugging systems","author":"Seviora","year":"1987","journal-title":"IEEE Software"},{"key":"10.1016\/0167-4048(88)90578-0_bib42","first-page":"3","article-title":"Evaluating computer security: an expert systems approach","author":"Shankar","year":"1987","journal-title":"IEEE\/Cipher"},{"key":"10.1016\/0167-4048(88)90578-0_bib43","series-title":"Rep. LA-UR-85-1933","article-title":"Framework for generating expert systems to perform computer security risk analysis","author":"Smith","year":"1985"},{"key":"10.1016\/0167-4048(88)90578-0_bib44","series-title":"Conceptual Structures: Information Processing in Mind and Machine","author":"Sowa","year":"1984"},{"key":"10.1016\/0167-4048(88)90578-0_bib45","series-title":"Proc. IFIP\/Sec '86","article-title":"Discovery: an expert system in the commercial data security environment","author":"Tener","year":"1986"},{"key":"10.1016\/0167-4048(88)90578-0_bib46","series-title":"LISP","author":"Winston","year":"1984"},{"key":"10.1016\/0167-4048(88)90578-0_bib47","series-title":"Artificial Intelligence","author":"Winston","year":"1984"},{"key":"10.1016\/0167-4048(88)90578-0_bib48","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/0167-4048(83)90028-7","article-title":"Effective information system security with password controls","author":"Wood","year":"1983","journal-title":"Comput. Secur."},{"key":"10.1016\/0167-4048(88)90578-0_bib49","series-title":"Proc. IFIP\/Sec '85","first-page":"129","article-title":"IBM dynamic signature verification","author":"Worthington","year":"1985"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404888905780?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404888905780?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T14:28:14Z","timestamp":1554906494000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404888905780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,8]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1988,8]]}},"alternative-id":["0167404888905780"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(88)90578-0","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1988,8]]}}}