{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:50:55Z","timestamp":1750859455792,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/spw.2013.36","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T21:07:43Z","timestamp":1374786463000},"page":"76-81","source":"Crossref","is-referenced-by-count":26,"title":["Invalidating Policies using Structural Information"],"prefix":"10.1109","author":[{"given":"Florian","family":"Kammuller","sequence":"first","affiliation":[]},{"given":"Christian W.","family":"Probst","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/10722167_15","article-title":"Counterexample-guided abstraction refinement","volume":"1855","author":"clarke","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37422-7_11"},{"key":"18","first-page":"115","article-title":"Sparc: A security and privacy aware virtual machinecheckpointing mechanism","author":"gofman","year":"2011","journal-title":"WPES"},{"key":"15","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/11542322_16","article-title":"Enforcing security policies for distributed objects applications","volume":"3364","author":"popescu","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/978-3-540-87875-9_38","article-title":"A model-based framework for security policy specification, deployment and testing","volume":"5301","author":"mouelhi","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380569"},{"key":"14","article-title":"Isabelle\/HOL - A Proof Assistant for Higher-Order Logic","volume":"2283","author":"nipkow","year":"2002","journal-title":"LNCS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2039591"},{"key":"12","article-title":"D.C. Tax scam total rises to $20 million, officials say","author":"leonnig","year":"2007","journal-title":"Washington Post"},{"journal-title":"Insider Threat Protecting the Enterprise from Sabotage Spying and Theft","year":"2006","author":"cole","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-7133-3","author":"probst","year":"2010","journal-title":"Insider Threats in Cybersecurity"},{"journal-title":"Social engineering the USB way","year":"2006","author":"stasiukonis","key":"10"},{"key":"7","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-642-16074-5_9","article-title":"Portunes: Representing attack scenarios spanning through the physical, digital and social domain","author":"dimkov","year":"2010","journal-title":"Proceedings of the 2010 Joint Conference on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.10.012"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"journal-title":"Enemy at the Water Cooler","year":"2007","author":"contos","key":"4"},{"key":"9","article-title":"Application of verification techniques to security - Modelchecking insider attacks","author":"kammu?ller","year":"2012","journal-title":"SETECEC 2012"},{"key":"8","doi-asserted-by":"crossref","first-page":"682","DOI":"10.1007\/978-3-642-02658-4_55","article-title":"Mcmas: A model checker for the verification of multi-agent systems","volume":"5643","author":"lomuscio","year":"2009","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2013 IEEE CS Security and Privacy Workshops (SPW2013)","start":{"date-parts":[[2013,5,23]]},"location":"San Francisco, CA","end":{"date-parts":[[2013,5,24]]}},"container-title":["2013 IEEE Security and Privacy Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6564486\/6565207\/06565233.pdf?arnumber=6565233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:51:29Z","timestamp":1498063889000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6565233\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/spw.2013.36","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}