{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:43:19Z","timestamp":1775745799499,"version":"3.50.1"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1618923"],"award-info":[{"award-number":["1618923"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001711","name":"Swiss National Science Foundation","doi-asserted-by":"publisher","award":["192121"],"award-info":[{"award-number":["192121"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001711","name":"Swiss National Science Foundation","doi-asserted-by":"publisher","award":["197353"],"award-info":[{"award-number":["197353"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003475","name":"Hasler Foundation","doi-asserted-by":"publisher","award":["20053"],"award-info":[{"award-number":["20053"]}],"id":[{"id":"10.13039\/501100003475","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004351","name":"Cisco","doi-asserted-by":"publisher","award":["2853380"],"award-info":[{"award-number":["2853380"]}],"id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005014","name":"Northrop Grumman","doi-asserted-by":"publisher","award":["474960397718052"],"award-info":[{"award-number":["474960397718052"]}],"id":[{"id":"10.13039\/100005014","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/msec.2025.3535803","type":"journal-article","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T18:58:47Z","timestamp":1740769127000},"page":"23-31","source":"Crossref","is-referenced-by-count":6,"title":["Security Policy as Code"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6673-1143","authenticated-orcid":false,"given":"Pavel","family":"Chuprikov","sequence":"first","affiliation":[{"name":"T&#x00E9;l&#x00E9;com Paris, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3864-9078","authenticated-orcid":false,"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"Universit&#x00E0; della Svizzera Italiana, Lugano, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9510-7665","authenticated-orcid":false,"given":"Shamiek","family":"Mangipudi","sequence":"additional","affiliation":[{"name":"Software Systems group, Universit&#x00E0; della Svizzera Italiana, Lugano, Switzerland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/info11010017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i3.405"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/sp.1982.10014"},{"key":"ref6","volume-title":"Cost of a data breach report","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3591231"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103180"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389144"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3129256"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3158363"},{"key":"ref14","article-title":"Practical confidentiality preserving big data analysis","volume-title":"Proc. 6th USENIX Workshop Hot Topics Cloud Comput. (HotCloud)","author":"Stephen","year":"2014"},{"key":"ref15","first-page":"283","article-title":"Opaque: An oblivious and encrypted distributed analytics platform","volume-title":"Proc. USENIX Symp. Networked Syst. Des. Implementation (NSDI)","author":"Zheng","year":"2017"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8013\/10942488\/10908451.pdf?arnumber=10908451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:39:14Z","timestamp":1743223154000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10908451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":15,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/msec.2025.3535803","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}