{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:12Z","timestamp":1750307592894,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T00:00:00Z","timestamp":1269216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["NSF-IIS-0916875"],"award-info":[{"award-number":["NSF-IIS-0916875"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1774088.1774487","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"1881-1882","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A framework for risk analysis in virtual directory security"],"prefix":"10.1145","author":[{"given":"William R.","family":"Claycomb","sequence":"first","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, New Mexico"}]},{"given":"Dongwan","family":"Shin","sequence":"additional","affiliation":[{"name":"New Mexico Tech, Socorro, New Mexico"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"203","volume-title":"September","author":"Chadwick D.","year":"2004","unstructured":"D. Chadwick . Threat Modelling for Active Directory. Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004) , September , pages 203 -- 212 , 2004 . D. Chadwick. Threat Modelling for Active Directory. Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004), September, pages 203--212, 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 7th International Workshop on Security in Information Systems (WOSIS 2009)","author":"Claycomb W.","year":"2009","unstructured":"W. Claycomb and D. Shin . An enhanced approach to using virtual directories for protecting sensitive information . In Proceedings of the 7th International Workshop on Security in Information Systems (WOSIS 2009) , May 2009 . W. Claycomb and D. Shin. An enhanced approach to using virtual directories for protecting sensitive information. In Proceedings of the 7th International Workshop on Security in Information Systems (WOSIS 2009), May 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2009.5335550"},{"key":"e_1_3_2_1_4_1","volume-title":"Inc.","author":"Logic Radiant","year":"2008","unstructured":"Radiant Logic , Inc. Using virtualization to leverage your investment in active directory. Technical report, Radiant Logic , Inc. , 2008 . Radiant Logic, Inc. Using virtualization to leverage your investment in active directory. Technical report, Radiant Logic, Inc., 2008."}],"event":{"name":"SAC'10: The 2010 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Sierre Switzerland","acronym":"SAC'10"},"container-title":["Proceedings of the 2010 ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1774088.1774487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:33Z","timestamp":1750250493000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":4,"alternative-id":["10.1145\/1774088.1774487","10.1145\/1774088"],"URL":"https:\/\/doi.org\/10.1145\/1774088.1774487","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}