{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T18:01:30Z","timestamp":1761847290356,"version":"build-2065373602"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,2]]},"DOI":"10.1109\/iwqos65803.2025.11215174","type":"proceedings-article","created":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T17:29:51Z","timestamp":1761758991000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["LEOPARD: Accelerating Cloud-based Access Control Policy Verification Using Logical Encoding Optimization"],"prefix":"10.1109","author":[{"given":"Xing","family":"Fang","sequence":"first","affiliation":[{"name":"School of Informatics, Xiamen University,Xiaruen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Feiyan","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiaruen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Mingyuan","family":"Song","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiaruen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Yuntao","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiaruen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Lizhao","family":"You","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University"}]},{"given":"Qiao","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiaruen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiaruen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Xue","family":"Liu","sequence":"additional","affiliation":[{"name":"&#x00A7;McGill University"}]}],"member":"263","reference":[{"volume-title":"Mcgraw hill\u2019s s3 buckets exposed 100,000 students\u2019 grades and personal info","year":"2022","author":"Hardcastle","key":"ref1"},{"volume-title":"Misconfigured azure blob storage exposed the data of 65k companies and 548k users","year":"2022","author":"Wadhwani","key":"ref2"},{"key":"ref3","article-title":"Alibaba cloud outage sees apps taken offline","volume-title":"W. Media","author":"Loomes","year":"2023"},{"key":"ref4","article-title":"Salesforce cloud outage caused by security change","volume-title":"ITnews","author":"Chirgwin","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/FMCAD.2018.8602994"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13185-1_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409728"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510233"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99524-9_24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81688-9_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3290362"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3484198"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13188-2_11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37703-7_9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3622872"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3168373"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22438-6_23"},{"key":"ref19","first-page":"209","article-title":"Klee: unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"OSDI","author":"Cadar","year":"2008"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38499-8_3"},{"key":"ref21","first-page":"44","article-title":"Prepro-cessing techniques for first-order clausification","author":"Hoder","year":"2012","journal-title":"FMCAD"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24258-9_20"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616357"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73595-3_20"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/FMCAD.2017.8102241"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90870-6_21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21690-4_15"},{"key":"ref29","first-page":"453","article-title":"Subformula caching for model counting and quantitative program analysis","volume-title":"ASE","author":"Eiers","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236064"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598078"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/565816.503279"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_49"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2016.7886678"}],"event":{"name":"2025 IEEE\/ACM International Symposium on Quality of Service (IWQoS)","start":{"date-parts":[[2025,7,2]]},"location":"Gold Coast, Australia","end":{"date-parts":[[2025,7,4]]}},"container-title":["2025 IEEE\/ACM 33rd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11143240\/11143247\/11215174.pdf?arnumber=11215174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T17:56:56Z","timestamp":1761847016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11215174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iwqos65803.2025.11215174","relation":{},"subject":[],"published":{"date-parts":[[2025,7,2]]}}}