{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:40:17Z","timestamp":1727242817627},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679435","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"241-246","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Covert Channels in Cloud Access Control Policies Using Large Language Models"],"prefix":"10.1109","author":[{"given":"Hrishikesh","family":"Karmarkar","sequence":"first","affiliation":[{"name":"TCS Research,Mumbai,India"}]},{"given":"Vaibhavi","family":"Joshi","sequence":"additional","affiliation":[{"name":"TCS Research,Pune,India"}]},{"given":"R.","family":"Venkatesh","sequence":"additional","affiliation":[{"name":"TCS Research,Pune,India"}]}],"member":"263","reference":[{"volume-title":"Report: Hotel reservation platform leaves millions of people exposed in massive data breach","author":"Holden","key":"ref1"},{"volume-title":"Thousands of customer records exposed after serious data breach","author":"Sharma","key":"ref2"},{"volume-title":"Capital one data breach: A cloud security case study","author":"Sharma","key":"ref3"},{"volume-title":"Report: Major pharmaceutical company exposes private data of us prescription drug users","key":"ref4"},{"volume-title":"Toyota customer data leak years","year":"2023","key":"ref5"},{"volume-title":"Totalcloud security insights - 2023","key":"ref6"},{"volume-title":"Risk fact 1: Cloud migration exploitation cloud security research risk fact","year":"2023","author":"Travis","key":"ref7"},{"volume-title":"Enterprise matrix for cloud","key":"ref8"},{"volume-title":"Initial access - tactic ta0001","key":"ref9"},{"volume-title":"Valid accounts - cloud accounts","key":"ref10"},{"volume-title":"Privilege escalation - tactic ta0004","key":"ref11"},{"volume-title":"What is iam access analyzer?","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.23919\/FMCAD.2018.8602994"},{"volume-title":"Policy analyzer overview","year":"2024","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/0022-0000(81)90069-6"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/775265.775268"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/COMST.2007.4317620"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICPCA.2011.6106526"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.jisa.2014.04.003"},{"key":"ref20","first-page":"97","article-title":"An efficient role based access control system for cloud computing","volume-title":"11th IEEE International Conference on Computer and Information Technology, CIT 2011, Pafos, Cyprus, 31 August-2 September 2011. IEEE Computer Society","author":"Zhu"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/cscwd.2012.6221866"},{"volume-title":"Gpt-4 technical report","year":"2024","author":"Achiam","key":"ref22"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679435.pdf?arnumber=10679435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:58:47Z","timestamp":1727240327000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679435","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}