{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:07Z","timestamp":1750307587577,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T00:00:00Z","timestamp":1252368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,9,8]]},"DOI":"10.1145\/1719030.1719035","type":"proceedings-article","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T13:16:50Z","timestamp":1282655810000},"page":"23-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["What is the shape of your security policy?"],"prefix":"10.1145","author":[{"given":"Sven","family":"T\u00fcrpe","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168615"},{"volume-title":"Wiley","year":"2008","author":"Anderson Ross J.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1177240"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.37"},{"key":"e_1_3_2_1_5_1","unstructured":"Common criteria for information technology security evaluation v3.1. available online http:\/\/www.commoncriteriaportal.org\/ 2006.  Common criteria for information technology security evaluation v3.1. available online http:\/\/www.commoncriteriaportal.org\/ 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Menahem Friedman and Abraham Kandel. Introduction to pattern recognition: statistical structural neural and fuzzy logic approaches. World scientific 1999.  Menahem Friedman and Abraham Kandel. Introduction to pattern recognition: statistical structural neural and fuzzy logic approaches. World scientific 1999.","DOI":"10.1142\/3641"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"volume-title":"May\/June","year":"2007","author":"Hypponen Mikko","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.824819"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01238023"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2007.07.002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1658822.1658842"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_15_1","unstructured":"Frank Swiderski and Window Snyder. Threat Modeling. Microsoft Press 2004.   Frank Swiderski and Window Snyder. Threat Modeling. Microsoft Press 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"D. Whitley and J.P. Watson. Complexity theory and the no free lunch theorem. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques page 317 2005.  D. Whitley and J.P. Watson. Complexity theory and the no free lunch theorem. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques page 317 2005.","DOI":"10.1007\/0-387-28356-0_11"},{"key":"e_1_3_2_1_18_1","unstructured":"Xerox workcentre\/workcentre pro 232\/238\/245\/255\/265\/275 multifunction systems security target. available online http:\/\/www.commoncriteriaportal.org\/files\/epfiles\/ST_VID10135-ST.pdf 2005.  Xerox workcentre\/workcentre pro 232\/238\/245\/255\/265\/275 multifunction systems security target. available online http:\/\/www.commoncriteriaportal.org\/files\/epfiles\/ST_VID10135-ST.pdf 2005."},{"key":"e_1_3_2_1_19_1","unstructured":"Xerox workcentre\/workcentre pro 232\/238\/245\/255\/265\/275 multifunction systems validation report. available online http:\/\/www.commoncriteriaportal.org\/files\/epfiles\/ST_VID10135-VR.pdf 2006.  Xerox workcentre\/workcentre pro 232\/238\/245\/255\/265\/275 multifunction systems validation report. available online http:\/\/www.commoncriteriaportal.org\/files\/epfiles\/ST_VID10135-VR.pdf 2006."}],"event":{"name":"NSPW '09: 2009 New Security Paradigms Workshop","sponsor":["NSF National Science Foundation","Computer Associates Inc.","Microsoft Research Microsoft Research","U.S. Department of Homeland Security","U.S. Department of Defense"],"location":"Oxford United Kingdom","acronym":"NSPW '09"},"container-title":["Proceedings of the 2009 workshop on New security paradigms workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1719030.1719035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1719030.1719035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:25Z","timestamp":1750250485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1719030.1719035"}},"subtitle":["security as a classification problem"],"short-title":[],"issued":{"date-parts":[[2009,9,8]]},"references-count":18,"alternative-id":["10.1145\/1719030.1719035","10.1145\/1719030"],"URL":"https:\/\/doi.org\/10.1145\/1719030.1719035","relation":{},"subject":[],"published":{"date-parts":[[2009,9,8]]},"assertion":[{"value":"2009-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}