{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:13:45Z","timestamp":1729671225088,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578841","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"274-274","source":"Crossref","is-referenced-by-count":1,"title":["A new pruning method for resolving conflicts in actionable behavioral rules"],"prefix":"10.1109","author":[{"given":"Peng","family":"Su","sequence":"first","affiliation":[]},{"given":"Dan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2110192.2110204"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.279"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375543"},{"key":"13","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/978-3-540-85933-8_8","article-title":"Show me how you see: Lessons from studying computer forensics experts for visualization","volume":"5210","author":"jankun-kelly","year":"2008","journal-title":"Visualization for Computer Security (VizSec) Ser Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/989863.989880"},{"key":"11","first-page":"1","article-title":"Policyvis: Firewall security policy visualization and inspection","author":"tran","year":"2007","journal-title":"Proceedings of the 21st Large Installation System Administration Conference (LISA '07)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379691"},{"year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.4338490"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.04.013"},{"key":"10","first-page":"13","article-title":"Role-VAT: Visual assessment of practical need for role based access control","author":"zhang","year":"2009","journal-title":"Computer Security Applications Conference (ACSAC)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1850795.1850800"},{"key":"6","article-title":"FloVis: Leveraging visualization to protect sensitive network infrastructure","author":"glanfield","year":"2010","journal-title":"NATO Information Systems Technology Panel Symposium on Information Assurance and Cyber Defense"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.18"},{"key":"4","first-page":"11","article-title":"OverFlow: An overview visualization for network analysis","author":"glanfield","year":"2009","journal-title":"Proceedings of the 6th International Workshop on Visualization for Cyber Security Ser VizSec '09"},{"key":"9","first-page":"1","article-title":"Layer select filter view","volume":"7","author":"velez-rojas","year":"2013","journal-title":"CA Technology Exchange"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CEWIT.2011.6135881"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578841.pdf?arnumber=6578841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T20:53:14Z","timestamp":1498078394000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578841","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}