{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:55Z","timestamp":1750307995529,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,10]],"date-time":"2006-03-10T00:00:00Z","timestamp":1141948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,10]]},"DOI":"10.1145\/1185448.1185638","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"790-791","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Applying role based access control and genetic algorithms to insider threat detection"],"prefix":"10.1145","author":[{"given":"Ning","family":"Hu","sequence":"first","affiliation":[{"name":"The University of Alabama, Tuscaloosa, Alabama"}]},{"given":"Phillip G.","family":"Bradford","sequence":"additional","affiliation":[{"name":"The University of Alabama, Tuscaloosa, Alabama"}]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Alabama, Tuscaloosa, Alabama"}]}],"member":"320","published-online":{"date-parts":[[2006,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"70","author":"Bertino E.","year":"2005","unstructured":"E. Bertino , A. Kamra , E. Terzi , and A. Vakali , \"Intrusion Detection in RBAC-administered Databases,\" CERIAS TR 2005 -- 70 , 2005. E. Bertino, A. Kamra, E. Terzi, and A. Vakali, \"Intrusion Detection in RBAC-administered Databases,\" CERIAS TR 2005--70, 2005.","journal-title":"\"Intrusion Detection in RBAC-administered Databases,\" CERIAS TR"},{"key":"e_1_3_2_1_2_1","first-page":"648","volume":"2","author":"Bradford P. G.","year":"2004","unstructured":"P. G. Bradford , M. Brown , J. Perdue , and B. Self , \"Towards Proactive Computer-System Forensics,\" Proc. of International Conference on Information Technology: Coding and Computing , Vol. 2 , 2004 (ITCC 2004), 648 -- 652 . P. G. Bradford, M. Brown, J. Perdue, and B. Self, \"Towards Proactive Computer-System Forensics,\" Proc. of International Conference on Information Technology: Coding and Computing, Vol. 2, 2004 (ITCC 2004), 648--652.","journal-title":"\"Towards Proactive Computer-System Forensics,\" Proc. of International Conference on Information Technology: Coding and Computing"},{"key":"e_1_3_2_1_3_1","volume-title":"Technology Blitz","author":"Bradford P. G.","year":"2005","unstructured":"P. G. Bradford and N. Hu , \" A Layered Approach to Insider Threat Detection and Proactive Forensics,\" Annual Computer Security Applications Conference (ACSAC) , Technology Blitz , Dec. 2005 , Tucson, AZ. P. G. Bradford and N. Hu, \"A Layered Approach to Insider Threat Detection and Proactive Forensics,\" Annual Computer Security Applications Conference (ACSAC), Technology Blitz, Dec. 2005, Tucson, AZ."},{"key":"e_1_3_2_1_4_1","first-page":"554","author":"Ferraiolo D.","year":"1992","unstructured":"D. Ferraiolo and R. Kuhn , \"Role-Based Access Controls,\" Proc. of the 15th National Computer Security Conference , Oct. 1992 , 554 -- 563 . D. Ferraiolo and R. Kuhn, \"Role-Based Access Controls,\" Proc. of the 15th National Computer Security Conference, Oct. 1992, 554--563.","journal-title":"\"Role-Based Access Controls,\" Proc. of the 15th National Computer Security Conference"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/0202009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"}],"event":{"name":"ACM SE06: ACM Southeast Regional Conference","acronym":"ACM SE06","location":"Melbourne Florida"},"container-title":["Proceedings of the 44th annual Southeast regional conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1185448.1185638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1185448.1185638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:21Z","timestamp":1750259181000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1185448.1185638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,10]]},"references-count":6,"alternative-id":["10.1145\/1185448.1185638","10.1145\/1185448"],"URL":"https:\/\/doi.org\/10.1145\/1185448.1185638","relation":{},"subject":[],"published":{"date-parts":[[2006,3,10]]},"assertion":[{"value":"2006-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}