{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:38:44Z","timestamp":1772159924201,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/vizsec.2016.7739580","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T16:39:27Z","timestamp":1478795967000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies"],"prefix":"10.1109","author":[{"given":"Robert","family":"Gove","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"303","article-title":"The inevitability of failure: The flawed assumption of security in modern computing environments","author":"loscocco","year":"1998","journal-title":"NISSC"},{"key":"ref11","first-page":"115","article-title":"Meeting critical security objectives with Security-Enhanced Linux","author":"loscocco","year":"2001","journal-title":"Ottawa Linux Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SafeConfig.2011.6111675"},{"key":"ref13","author":"mayer","year":"2006","journal-title":"SELinux by Example Using Security Enhance Linux Prentice Hall Upper Saddle River"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/882262.882291"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4236\/iim.2012.45028"},{"key":"ref16","first-page":"197","article-title":"FADE: Graph Drawing, Clustering, and Visual Abstraction","author":"quigley","year":"2000","journal-title":"Graph Drawing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357285"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.139"},{"key":"ref19","first-page":"20","article-title":"Security Enhanced (SE) Android: Bringing Flexible MAC to Android","author":"smalley","year":"2013","journal-title":"NDSS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35236-2_60"},{"key":"ref3","article-title":"Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems","author":"chen","year":"2009","journal-title":"NDSS"},{"key":"ref6","article-title":"Policy DSL: High-level Specifications of Information Flows for Security Policies","author":"hurd","year":"2009","journal-title":"HCSS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3141\/2392-06"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2467451"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v3i1.13937","article-title":"Gephi: An open source software for exploring and manipulating networks","author":"bastian","year":"2009"},{"key":"ref1","first-page":"23","article-title":"A Review of Temporal Data Visualizations Based on Space-Time Cube Operations","author":"bach","year":"2014","journal-title":"EuroVis"},{"key":"ref9","first-page":"29","article-title":"Integrating flexible support for security policies into the Linux operating system","author":"loscocco","year":"2001","journal-title":"USENIX Freenix Track"},{"key":"ref20","article-title":"NodeXL: a free and open network overview, discovery and exploration add-in for Excel","author":"smith","year":"2010","journal-title":"2007\/2010\/2013\/2016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0180-7"},{"key":"ref21","first-page":"351","article-title":"EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning","author":"wang","year":"2015","journal-title":"USENIX"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2467251"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377863"}],"event":{"name":"2016 IEEE Symposium on Visualization for Cyber Security (VizSec)","location":"Baltimore, MD, USA","start":{"date-parts":[[2016,10,24]]},"end":{"date-parts":[[2016,10,24]]}},"container-title":["2016 IEEE Symposium on Visualization for Cyber Security (VizSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7701173\/7739569\/07739580.pdf?arnumber=7739580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T17:35:10Z","timestamp":1692552910000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7739580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/vizsec.2016.7739580","relation":{"has-preprint":[{"id-type":"doi","id":"10.31219\/osf.io\/64ubj","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,10]]}}}