{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:21:16Z","timestamp":1765232476458,"version":"build-2065373602"},"reference-count":8,"publisher":"Breda Publishing Press","issue":"7","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network Security"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1016\/s1353-4858(17)30069-7","type":"journal-article","created":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T16:18:00Z","timestamp":1500481080000},"page":"5-8","source":"Crossref","is-referenced-by-count":11,"title":["Use of access control to minimise ransomware impact"],"prefix":"10.70985","volume":"2017","author":[{"given":"Simon","family":"Parkinson","sequence":"first","affiliation":[]}],"member":"51855","reference":[{"journal-title":"The Federal Bureau of Investigation","article-title":"\u2018Incidents of Ransomware on the Rise. Protect Yourself and Your Organisation\u2019","year":"2016","key":"10.1016\/S1353-4858(17)30069-7_bib1"},{"key":"10.1016\/S1353-4858(17)30069-7_bib2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1353-4858(16)30096-4","article-title":"\u2018Ransomware: taking businesses hostage\u2019","volume":"10","author":"Mansfield-Devine","year":"2016","journal-title":"Network Security"},{"key":"10.1016\/S1353-4858(17)30069-7_bib3","first-page":"10","article-title":"\u2018Ransomware: Evolution, Mitigation and Prevention\u2019","volume":"13","author":"Richardson","year":"2011","journal-title":"International Management Review"},{"key":"10.1016\/S1353-4858(17)30069-7_bib4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(16)30086-1","article-title":"\u2018Ransomware attacks: detection, prevention and cure\u2019","volume":"9","author":"Brewer","year":"2016","journal-title":"Network Security"},{"year":"2002","series-title":"\u2018Security in computing\u2019","author":"Pfleeger","key":"10.1016\/S1353-4858(17)30069-7_bib5"},{"key":"10.1016\/S1353-4858(17)30069-7_bib6","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jnca.1999.0086","article-title":"\u2018Managing Windows NT file system permissions \u2013 A security tool to master the complexity of Microsoft Windows NT file system permissions.\u2019","volume":"22","author":"Hanner","year":"1999","journal-title":"Journal of network and computer applications"},{"key":"10.1016\/S1353-4858(17)30069-7_bib7","doi-asserted-by":"crossref","DOI":"10.1145\/1151030.1151033","article-title":"\u2018Polaris: virus-safe computing for Windows XP\u2019","volume":"49","author":"Stiegler","year":"2006","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1353-4858(17)30069-7_bib9","article-title":"\u2018A novel software tool for analysing NT file system permissions\u2019","volume":"4","author":"Parkinson","year":"2013","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"}],"container-title":["Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485817300697?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485817300697?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485817300697?httpAccept=text\/plain","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T22:24:15Z","timestamp":1733264655000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1353485817300697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":8,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["S1353485817300697"],"URL":"https:\/\/doi.org\/10.1016\/s1353-4858(17)30069-7","relation":{},"ISSN":["1353-4858"],"issn-type":[{"type":"print","value":"1353-4858"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}