{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:33:10Z","timestamp":1648621990762},"reference-count":21,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T00:00:00Z","timestamp":1520553600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy018","type":"journal-article","created":{"date-parts":[[2018,2,16]],"date-time":"2018-02-16T12:07:37Z","timestamp":1518782857000},"page":"1109-1122","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System"],"prefix":"10.1093","volume":"61","author":[{"given":"Khalifa","family":"Toumi","sequence":"first","affiliation":[{"name":"Institut Mines-Telecom\/Telecom SudParis, EVRY, France"}]},{"given":"Mohamed","family":"Aouadi","sequence":"additional","affiliation":[{"name":"Institut Mines-Telecom\/Telecom SudParis, EVRY, France"}]},{"given":"Ana R","family":"Cavalli","sequence":"additional","affiliation":[{"name":"Institut Mines-Telecom\/Telecom SudParis, EVRY, France"}]},{"given":"Wissam","family":"Mallouli","sequence":"additional","affiliation":[{"name":"Montimage, 39 rue Bobillot, Paris, France"}]},{"given":"Jordi Puiggal","family":"Allepuz","sequence":"additional","affiliation":[{"name":"Scytl Secure Electronic Voting, S.A, Spain"}]},{"given":"Pol Valletb","family":"Montfort","sequence":"additional","affiliation":[{"name":"Scytl Secure Electronic Voting, S.A, Spain"}]}],"member":"286","published-online":{"date-parts":[[2018,3,9]]},"reference":[{"key":"key\n\t\t\t\t20180724122909_bxy018C1","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.jocs.2013.04.003","article-title":"A formal framework to analyze cost and performance in Map-Reduce based applications","volume":"5","author":"N\u00fa\u00f1ez","year":"2014","journal-title":"J. Comput. Sci."},{"key":"key\n\t\t\t\t20180724122909_bxy018C3","author":"Senn","year":"2005"},{"key":"key\n\t\t\t\t20180724122909_bxy018C4","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.jss.2010.09.020","article-title":"Taxonomy and classification of automatic monitoring of program security vulnerability exploitations","volume":"84","author":"Shahriar","year":"2011","journal-title":"J. Syst. Softw."},{"key":"key\n\t\t\t\t20180724122909_bxy018C5","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1049\/iet-sen.2012.0101","article-title":"Automated testing of extensible access control markup language-based access control systems","volume":"7","author":"Bertolino","year":"2013","journal-title":"IET Softw."},{"key":"key\n\t\t\t\t20180724122909_bxy018C6","author":"Felderer","year":"2011"},{"key":"key\n\t\t\t\t20180724122909_bxy018C7","first-page":"68","article-title":"Testing security policies for distributed systems: vehicular networks as a case study","volume":"11","author":"Aouadi","year":"2014","journal-title":"J. Comput. Sci. Issues"},{"key":"key\n\t\t\t\t20180724122909_bxy018C8","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/s10207-015-0308-7","article-title":"Efficient and verifiable algorithms for secure outsourcing of cryptographic computations","volume":"15","author":"Kiraz","year":"2016","journal-title":"Int. J. Inf. Secur."},{"key":"key\n\t\t\t\t20180724122909_bxy018C9","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1016\/j.cose.2005.07.008","article-title":"SEAS, a secure e-voting protocol: design and implementation","volume":"24","author":"Baiardi","year":"2005","journal-title":"Comput. Secur. J."},{"key":"key\n\t\t\t\t20180724122909_bxy018C10","author":"Enrico","year":"2015"},{"key":"key\n\t\t\t\t20180724122909_bxy018C11","author":"Ferraiolo","year":"1995"},{"key":"key\n\t\t\t\t20180724122909_bxy018C12","author":"Kalam","year":"2003"},{"key":"key\n\t\t\t\t20180724122909_bxy018C13","author":"Toumi","year":"2012"},{"key":"key\n\t\t\t\t20180724122909_bxy018C14","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s10207-012-0164-7","article-title":"An open virtual testbed for industrial control system security research","volume":"11","author":"Reaves","year":"2012","journal-title":"Int. J. Inf. Secur."},{"key":"key\n\t\t\t\t20180724122909_bxy018C15","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10207-013-0205-x","article-title":"Security policy verification for multi-domains in cloud systems","volume":"13","author":"Gouglidis","year":"2014","journal-title":"Int. J. Inf. Secur."},{"key":"key\n\t\t\t\t20180724122909_bxy018C16","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jss.2015.07.006","article-title":"Assessing the security of web service frameworks against Denial of Service attacks","volume":"109","author":"Oliveira","year":"2015","journal-title":"J. Syst. Softw."},{"key":"key\n\t\t\t\t20180724122909_bxy018C17","author":"Information Technology\u2014Advanced Message Queuing Protocol (AMQP)","year":"2014"},{"key":"key\n\t\t\t\t20180724122909_bxy018C18","author":"INTER-TRUST team","year":"2014"},{"key":"key\n\t\t\t\t20180724122909_bxy018C2","author":"Cavalli","year":"2008"},{"key":"key\n\t\t\t\t20180724122909_bxy018C20","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1002\/stvr.445","article-title":"Applying formal methods to PCEP: an industrial case study from modeling to test generation","volume":"22","author":"Hwang","year":"2012","journal-title":"Softw. Test. Verif. Reliabil."},{"key":"key\n\t\t\t\t20180724122909_bxy018C21","author":"Cavalli","year":"1999"},{"key":"key\n\t\t\t\t20180724122909_bxy018C22","author":"INTER-TRUST team","year":"2015"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1109\/25209213\/bxy018.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T02:57:49Z","timestamp":1570762669000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1109\/4925398"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,9]]},"references-count":21,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,3,9]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy018","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,3,9]]}}}