{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:39:29Z","timestamp":1769924369859,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,11]],"date-time":"2009-10-11T00:00:00Z","timestamp":1255219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,11]]},"DOI":"10.1145\/1629575.1629605","type":"proceedings-article","created":{"date-parts":[[2009,10,13]],"date-time":"2009-10-13T15:11:11Z","timestamp":1255446671000},"page":"305-320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Heat-ray"],"prefix":"10.1145","author":[{"given":"John","family":"Dunagan","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Alice X.","family":"Zheng","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Daniel R.","family":"Simon","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060675"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586140"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2004.1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007355"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security","author":"Bhatkar S.","year":"2003"},{"key":"e_1_3_2_1_6_1","volume-title":"Springer","author":"Bousquet O.","year":"2003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.889094"},{"key":"e_1_3_2_1_8_1","volume-title":"NDSS","author":"Chen S.","year":"2005"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security","author":"Chong S.","year":"2007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2007.19.3.792"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security","author":"Cowan C.","year":"1998"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"E. Dijkstra. A Note on Two Problems in Connexion with Graph Theory. Numerische Mathematik 1(269--271):1 1959.  E. Dijkstra. A Note on Two Problems in Connexion with Graph Theory. Numerische Mathematik 1(269--271):1 1959.","DOI":"10.1007\/BF01386390"},{"key":"e_1_3_2_1_15_1","unstructured":"EC2. http:\/\/aws.amazon.com\/ec2.  EC2. http:\/\/aws.amazon.com\/ec2."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"C. Ellison B. Frantz B. Lampson R. Rivest B. Thomas and T. Ylonen. SPKI Certificate Theory 1999.  C. Ellison B. Frantz B. Lampson R. Rivest B. Thomas and T. Ylonen. SPKI Certificate Theory 1999.","DOI":"10.17487\/rfc2693"},{"key":"e_1_3_2_1_17_1","unstructured":"Ethernet Address Resolution Protocol. http:\/\/tools.ietf.org\/html\/rfc826.  Ethernet Address Resolution Protocol. http:\/\/tools.ietf.org\/html\/rfc826."},{"key":"e_1_3_2_1_18_1","unstructured":"Forefront. http:\/\/www.microsoft.com\/forefront.  Forefront. http:\/\/www.microsoft.com\/forefront."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.19"},{"key":"e_1_3_2_1_20_1","volume-title":"Support Vector Learning for Ordinal Regression. In International Conference on Artificial Neural Networks","author":"Herbrich R.","year":"1999"},{"key":"e_1_3_2_1_21_1","volume-title":"Eds. Handbook of Biometrics. Springer","author":"Flynn A.","year":"2007"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/773301"},{"key":"e_1_3_2_1_23_1","volume-title":"Addison-Wesley","author":"Johansson J.","year":"2005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095820"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945452"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047918"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792241175"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"e_1_3_2_1_30_1","unstructured":"Live ID. http:\/\/winliveid.spaces.live.com\/.  Live ID. http:\/\/winliveid.spaces.live.com\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167211"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1142717.1142723"},{"key":"e_1_3_2_1_34_1","volume-title":"Stanford University","author":"Munzner T.","year":"2000"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180337.1180343"},{"key":"e_1_3_2_1_36_1","volume-title":"NDSS","author":"Newsome J.","year":"2005"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029225"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Security","author":"Ou X.","year":"2005"},{"key":"e_1_3_2_1_39_1","volume-title":"HotBots","author":"Provos N.","year":"2007"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"e_1_3_2_1_41_1","volume-title":"Wiley","author":"Rankl W.","year":"2004"},{"key":"e_1_3_2_1_42_1","volume-title":"Crypto","author":"Rivest R.","year":"1996"},{"key":"e_1_3_2_1_43_1","volume-title":"NDSS","author":"Schechter S.","year":"2006"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01009-X"},{"key":"e_1_3_2_1_45_1","unstructured":"Secure4Privilege White Paper on Unix Root Accounts. http:\/\/www.s4software.com\/PDF\/s4privilege_whitepaper.pdf.  Secure4Privilege White Paper on Unix Root Accounts. http:\/\/www.s4software.com\/PDF\/s4privilege_whitepaper.pdf."},{"key":"e_1_3_2_1_46_1","unstructured":"Security Assertion Markup Language. http:\/\/saml.xml.org.  Security Assertion Markup Language. http:\/\/saml.xml.org."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/77600.77620"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830526"},{"key":"e_1_3_2_1_49_1","unstructured":"A. Singer. Tempting Fate. USENIX login 30(1):27--30 2005.  A. Singer. Tempting Fate. USENIX login 30(1):27--30 2005."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/66093.66095"},{"key":"e_1_3_2_1_51_1","volume-title":"USENIX","author":"Steiner J.","year":"1988"},{"key":"e_1_3_2_1_52_1","volume-title":"Computer-Attack Graph Generation Tool. In DARPA Information Survivability Conference and Expo (DISCEX)","author":"Swiler L.","year":"2001"},{"key":"e_1_3_2_1_53_1","unstructured":"Symark White Paper on Unix Root Accounts. http:\/\/www.symark.com\/downloads\/whitepapers\/Symark_Privileged_Access_Control.html.  Symark White Paper on Unix Root Accounts. http:\/\/www.symark.com\/downloads\/whitepapers\/Symark_Privileged_Access_Control.html."},{"key":"e_1_3_2_1_54_1","unstructured":"System Center Operations Manager. http:\/\/www.microsoft.com\/systemcenter\/operationsmanager.  System Center Operations Manager. http:\/\/www.microsoft.com\/systemcenter\/operationsmanager."},{"key":"e_1_3_2_1_55_1","unstructured":"User-Workstations Attribute. http:\/\/msdn.microsoft.com\/en-us\/library\/ms680868(VS.85).aspx.  User-Workstations Attribute. http:\/\/msdn.microsoft.com\/en-us\/library\/ms680868(VS.85).aspx."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"G. Wahba. Support Vector Machines Reproducing Kernel Hilbert Spaces and Randomized GACV. MIT Press 1999.  G. Wahba. Support Vector Machines Reproducing Kernel Hilbert Spaces and Randomized GACV. MIT Press 1999.","DOI":"10.7551\/mitpress\/1130.003.0009"},{"key":"e_1_3_2_1_57_1","volume-title":"USENIX Security","author":"Winkler I.","year":"1995"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273033"},{"key":"e_1_3_2_1_59_1","volume-title":"FOCS","author":"Young N.","year":"2001"},{"key":"e_1_3_2_1_60_1","volume-title":"OSDI","author":"Zeldovich N.","year":"2006"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"}],"event":{"name":"SOSP09: ACM SIGOPS 22nd Symposium on Operating Systems Principles","location":"Big Sky Montana USA","acronym":"SOSP09","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629575.1629605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1629575.1629605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:27Z","timestamp":1750249407000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629575.1629605"}},"subtitle":["combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs"],"short-title":[],"issued":{"date-parts":[[2009,10,11]]},"references-count":61,"alternative-id":["10.1145\/1629575.1629605","10.1145\/1629575"],"URL":"https:\/\/doi.org\/10.1145\/1629575.1629605","relation":{},"subject":[],"published":{"date-parts":[[2009,10,11]]},"assertion":[{"value":"2009-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}