{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:18Z","timestamp":1750307778391,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314436.1314443","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"42-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Security policy analysis using deductive spreadsheets"],"prefix":"10.1145","author":[{"given":"Anu","family":"Singh","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, NY"}]},{"given":"C. R.","family":"Ramakrishnan","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY"}]},{"given":"I. V.","family":"Ramakrishnan","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY"}]},{"given":"Scott D.","family":"Stoller","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY"}]},{"given":"David S.","family":"Warren","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.5555\/1009380.1009672"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","first-page":"308","volume-title":"Practical Aspects of Declarative Languages (PADL)","author":"Gupta G.","year":"2000","unstructured":"G. Gupta and S. F. Akhter . Knowledgesheet: A graphical spreadsheet interface for interactively developing a class of constraint programs . In Practical Aspects of Declarative Languages (PADL) , volume 1753 of Lecture Notes in Computer Science , pages 308 -- 323 . Springer , 2000 . G. Gupta and S. F. Akhter. Knowledgesheet: A graphical spreadsheet interface for interactively developing a class of constraint programs. In Practical Aspects of Declarative Languages (PADL), volume 1753 of Lecture Notes in Computer Science, pages 308--323. Springer, 2000."},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on Issues in the Theory of Security (WITS)","author":"Guttman J. D.","year":"2003","unstructured":"J. D. Guttman , A. L. Herzog , and J. D. Ramsdell . Information flow in operating systems: Eager formal methods . In Workshop on Issues in the Theory of Security (WITS) , 2003 . J. D. Guttman, A. L. Herzog, and J. D. Ramsdell. Information flow in operating systems: Eager formal methods. In Workshop on Issues in the Theory of Security (WITS), 2003."},{"key":"e_1_3_2_1_4_1","volume-title":"SLAT: Information flow in Security Enhanced Linux","author":"Guttman J. D.","year":"2003","unstructured":"J. D. Guttman , A. L. Herzog , and J. D. Ramsdell . SLAT: Information flow in Security Enhanced Linux , 2003 . Available from http:\/\/www.mitre.org\/tech\/selinux\/. J. D. Guttman, A. L. Herzog, and J. D. Ramsdell. SLAT: Information flow in Security Enhanced Linux, 2003. Available from http:\/\/www.mitre.org\/tech\/selinux\/."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/937527.937528"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium","author":"Jaeger T.","year":"2003","unstructured":"T. Jaeger , R. Sailer , and X. Zhang . Analyzing integrity protection in the SELinux example policy . In USENIX Security Symposium , 2003 . T. Jaeger, R. Sailer, and X. Zhang. Analyzing integrity protection in the SELinux example policy. In USENIX Security Symposium, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/S0743-1066(99)00005-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/944705.944721"},{"key":"e_1_3_2_1_9_1","volume-title":"31st International Conference on Very Large Databases (VLDB)","author":"Kasso M.","year":"2005","unstructured":"M. Kasso ., L.-M. Zen , A. Garg , and M. Genesereth . PrediCalc: A logical spreadsheet management system . In 31st International Conference on Very Large Databases (VLDB) , 2005 . M. Kasso., L.-M. Zen, A. Garg, and M. Genesereth. PrediCalc: A logical spreadsheet management system. In 31st International Conference on Very Large Databases (VLDB), 2005."},{"key":"e_1_3_2_1_10_1","volume-title":"2006 Security Enhanced Linux Symposium","author":"Kissinger A.","year":"2006","unstructured":"A. Kissinger and J. Hale . Lopol: A deductive database approach to policy analysis and rewriting . In 2006 Security Enhanced Linux Symposium , 2006 . A. Kissinger and J. Hale. Lopol: A deductive database approach to policy analysis and rewriting. In 2006 Security Enhanced Linux Symposium, 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"Meeting critical security objectives with security-enhanced Linux. In Proc. of 2001 Ottawa Linux Symposium","author":"Loscocco P.","year":"2001","unstructured":"P. Loscocco and S. Smalley . Meeting critical security objectives with security-enhanced Linux. In Proc. of 2001 Ottawa Linux Symposium , 2001 . Available from http:\/\/www.nsa.gov\/selinx\/. P. Loscocco and S. Smalley. Meeting critical security objectives with security-enhanced Linux. In Proc. of 2001 Ottawa Linux Symposium, 2001. Available from http:\/\/www.nsa.gov\/selinx\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Computing with Logic: Logic Programming and Prolog. Benjamin\/Cummings Publishers","author":"Maier D.","year":"1988","unstructured":"D. Maier and D. S. Warren . Computing with Logic: Logic Programming and Prolog. Benjamin\/Cummings Publishers , Menlo Park, CA , 1988 . ISBN 0-8053-6681-4, 535 pp. D. Maier and D. S. Warren. Computing with Logic: Logic Programming and Prolog. Benjamin\/Cummings Publishers, Menlo Park, CA, 1988. ISBN 0-8053-6681-4, 535 pp."},{"key":"e_1_3_2_1_13_1","author":"Merrit D.","year":"2005","unstructured":"D. Merrit , J. Paine , and M. Kassof . Special Spreadsheet Issue of AI Expert Newsletter , May 2005 . http:\/\/www.ainewsletter.com\/newsletters\/aix_0505.htm. D. Merrit, J. Paine, and M. Kassof. Special Spreadsheet Issue of AI Expert Newsletter, May 2005. http:\/\/www.ainewsletter.com\/newsletters\/aix_0505.htm.","journal-title":"Special Spreadsheet Issue of AI Expert Newsletter"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1180337.1180343"},{"key":"e_1_3_2_1_15_1","volume-title":"14th Usenix Security Symposium","author":"Ou X.","year":"2005","unstructured":"X. Ou , S. Govindavajhala , and A. W. Appel . MulVAL: A logic-based network security analyzer . In 14th Usenix Security Symposium , 2005 . X. Ou, S. Govindavajhala, and A. W. Appel. MulVAL: A logic-based network security analyzer. In 14th Usenix Security Symposium, 2005."},{"unstructured":"Quantrix. http:\/\/www.quantrix.com\/.  Quantrix. http:\/\/www.quantrix.com\/.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/11799573_29"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/11802167","volume-title":"PADL","author":"Saha D.","year":"2006","unstructured":"D. Saha and C. R. Ramakrishnan . Incremental evaluation of tabled prolog: Beyond pure logic programs . In PADL , volume 3819 of Lecture Notes in Computer Science , pages 215 -- 229 . Springer , 2006 . 10.1007\/11603023_15 D. Saha and C. R. Ramakrishnan. Incremental evaluation of tabled prolog: Beyond pure logic programs. In PADL, volume 3819 of Lecture Notes in Computer Science, pages 215--229. Springer, 2006. 10.1007\/11603023_15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_20_1","first-page":"112","volume-title":"Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS)","author":"Sarna-Starosta B.","year":"2004","unstructured":"B. Sarna-Starosta and S. D. Stoller . Policy analysis for security-enhanced linux . In Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS) , pages 112 , April 2004 . Available at http: \/\/www.cs.sunysb.edu\/~stoller\/WITS 2004.html. B. Sarna-Starosta and S. D. Stoller. Policy analysis for security-enhanced linux. In Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS), pages 112, April 2004. Available at http: \/\/www.cs.sunysb.edu\/~stoller\/WITS2004.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9575-1","volume-title":"Programming with sets","author":"Schwartz J. T.","year":"1986","unstructured":"J. T. Schwartz , R. B. Dewar , E. Schonberg , and E. Dubinsky . Programming with sets ; an introduction to SETL. Springer-Verlag , New York, NY, USA , 1986 . J. T. Schwartz, R. B. Dewar, E. Schonberg, and E. Dubinsky. Programming with sets; an introduction to SETL. Springer-Verlag, New York, NY, USA, 1986."},{"unstructured":"Tresys Technology. Policy tools for Security-Enhanced Linux. Available from http:\/\/www.tresys.com\/selinux\/.  Tresys Technology. Policy tools for Security-Enhanced Linux. Available from http:\/\/www.tresys.com\/selinux\/.","key":"e_1_3_2_1_22_1"},{"unstructured":"Tresys Technology. Security-Enhanced Linux reference policy. Available from http:\/\/oss.tresys.com\/projects\/refpolicy.  Tresys Technology. Security-Enhanced Linux reference policy. Available from http:\/\/oss.tresys.com\/projects\/refpolicy.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1007\/11575467_8"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS07","name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Fairfax Virginia USA"},"container-title":["Proceedings of the 2007 ACM workshop on Formal methods in security engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314436.1314443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314436.1314443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314436.1314443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":24,"alternative-id":["10.1145\/1314436.1314443","10.1145\/1314436"],"URL":"https:\/\/doi.org\/10.1145\/1314436.1314443","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}