{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:29:11Z","timestamp":1778603351589,"version":"3.51.4"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tdsc.2022.3171740","type":"journal-article","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:07:41Z","timestamp":1651608461000},"page":"1-1","source":"Crossref","is-referenced-by-count":8,"title":["Least-Privilege Calls to Amazon Web Services"],"prefix":"10.1109","author":[{"given":"Puneet","family":"Gill","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, University of Waterloo, 8430 Waterloo, Ontario, Canada, N2L 3G1"}]},{"given":"Werner","family":"Dietl","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Waterloo, 8430 Waterloo, Ontario, Canada"}]},{"given":"Mahesh V","family":"Tripunitara","sequence":"additional","affiliation":[{"name":"ECE, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom49646.2020.00007"},{"key":"ref12","article-title":"Store and restore an AMI using S3","year":"2021"},{"key":"ref34","article-title":"RequiresPermission","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62964"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232005"},{"key":"ref14","article-title":"Randoop: Automatic unit test generation for Java","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359805"},{"key":"ref31","article-title":"Announcing the winners of the inaugural ServerlessConf architecture competition","author":"mckim","year":"2017"},{"key":"ref30","article-title":"Hello, Retail!","year":"2018"},{"key":"ref11","article-title":"Database of least-privilege policies for AWS","author":"gill","year":"2022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref10","article-title":"AWS Security Flaw which can grant admin access!","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361067"},{"key":"ref2","year":"2020"},{"key":"ref1","article-title":"Types of cloud computing","year":"2020"},{"key":"ref17","article-title":"AWS Java SDK :: Services :: Amazon S3 2.16.60","year":"2021"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96145-3_3"},{"key":"ref16","article-title":"Interface S3Client","year":"2021"},{"key":"ref38","article-title":"AWS security best practices","year":"2016"},{"key":"ref19","article-title":"IntelliJ IDEA","year":"2021"},{"key":"ref18","article-title":"Gradle build tool","year":"2021"},{"key":"ref24","article-title":"Policy template list","year":"2020"},{"key":"ref23","article-title":"Serverless examples - A collection of ready-to-deploy serverless framework services","year":"2020"},{"key":"ref26","article-title":"FFmpeg app","year":"2020"},{"key":"ref25","article-title":"Microservice HTTP Endpoint","year":"2019"},{"key":"ref20","article-title":"Working with local gateways","year":"2021"},{"key":"ref42","article-title":"Amazon macie - A machine learning-powered security service to discover, classify, and protect sensitive data","year":"2020"},{"key":"ref41","article-title":"AWS config - record and evaluate configurations of your AWS resources","year":"2020"},{"key":"ref22","article-title":"AWS serverless application repository examples","year":"2020"},{"key":"ref44","article-title":"Amazon GuardDuty - Protect your AWS accounts and workloads with intelligent threat detection and continuous monitoring","year":"2020"},{"key":"ref21","article-title":"EC2-Classic","year":"2021"},{"key":"ref43","article-title":"AWS trusted advisor - reduce costs, increase performance, and improve security","year":"2020"},{"key":"ref28","article-title":"Serverless REST API","year":"2019"},{"key":"ref27","article-title":"Receive an Email, store in S3 bucket, trigger a lambda function","year":"2018"},{"key":"ref29","article-title":"AWS bookstore demo app","year":"2020"},{"key":"ref8","article-title":"A technical analysis of the capital one hack","year":"2020"},{"key":"ref7","article-title":"Amazon S3 - object storage built to store and retrieve any amount of data from anywhere","year":"2020"},{"key":"ref9","article-title":"An SSRF, privileged AWS keys and the capital one breach","year":"2020"},{"key":"ref4","article-title":"Security overview of AWS lambda","year":"2019"},{"key":"ref3","article-title":"Top cloud providers 2019","year":"2019"},{"key":"ref6","article-title":"Amazon DynamoDB - fast and flexible NoSQL database service for any scale","year":"2020"},{"key":"ref5","article-title":"AWS identity and access management - user guide","year":"2020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/FMCAD.2018.8602994"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/09767574.pdf?arnumber=9767574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T20:29:42Z","timestamp":1684268982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9767574\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3171740","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}