{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:57Z","timestamp":1750307097830,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381868","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"801-808","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Specification and validation of enterprise information security policies"],"prefix":"10.1145","author":[{"given":"Anirban","family":"Sengupta","sequence":"first","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]},{"given":"Chandan","family":"Mazumdar","sequence":"additional","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]},{"given":"Aditya","family":"Bagchi","sequence":"additional","affiliation":[{"name":"E.C.S.U., Indian Statistical Institute, Kolkata, India"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CA Technologies Threat Management Solutions - http:\/\/www.ca.com\/us\/products\/category\/it-security-solutions\/ThreatManagement.aspx CA Technologies Threat Management Solutions - http:\/\/www.ca.com\/us\/products\/category\/it-security-solutions\/ThreatManagement.aspx"},{"key":"e_1_3_2_1_2_1","unstructured":"Federal Office for Information Security. 2007. IT Baseline Protection Manual. Germany.  Federal Office for Information Security. 2007. IT Baseline Protection Manual . Germany."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674833"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103022.1103030"},{"key":"e_1_3_2_1_5_1","unstructured":"Metasploit Framework - http:\/\/www.metasploit.com\/framework\/ Metasploit Framework - http:\/\/www.metasploit.com\/framework\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Nessus Vulnerability Scanner - http:\/\/www.nessus.org Nessus Vulnerability Scanner - http:\/\/www.nessus.org"},{"key":"e_1_3_2_1_7_1","unstructured":"New Survey Shows Damaging Attacks Against Internal Corporate Networks Continue Unabated; Companies' Security Investment Shifting Inward - http:\/\/findarticles.com\/p\/articles\/mi_m0EIN\/is_2005_Feb_7\/ai_n9494538 New Survey Shows Damaging Attacks Against Internal Corporate Networks Continue Unabated; Companies' Security Investment Shifting Inward - http:\/\/findarticles.com\/p\/articles\/mi_m0EIN\/is_2005_Feb_7\/ai_n9494538"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Peltier T. R. 2004. Information Security Policies and Procedures Second Edition Auerbach Publications USA.   Peltier T. R. 2004. Information Security Policies and Procedures Second Edition Auerbach Publications USA.","DOI":"10.1201\/9780203488737"},{"key":"e_1_3_2_1_9_1","unstructured":"Retina - http:\/\/www.eeye.com\/Products\/Retina.aspx Retina - http:\/\/www.eeye.com\/Products\/Retina.aspx"},{"key":"e_1_3_2_1_10_1","unstructured":"Ross R. et. al. 2009. Recommended Security Controls for Federal Information Systems. NIST Special Publication 800--53. Revision 3. Maryland USA.  Ross R. et. al. 2009. Recommended Security Controls for Federal Information Systems. NIST Special Publication 800--53 . Revision 3. Maryland USA."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2009.5411976"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-010-9180-y"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/EAIT.2011.87"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830526"},{"key":"e_1_3_2_1_15_1","unstructured":"Site Security Handbook RFC 2196 - http:\/\/www.ietf.org\/rfc\/rfc2196.txt?number=2196 Site Security Handbook RFC 2196 - http:\/\/www.ietf.org\/rfc\/rfc2196.txt?number=2196"},{"key":"e_1_3_2_1_16_1","unstructured":"Soanes C. and Stevenson A. Ed. 2006. Concise Oxford English Dictionary. Eleventh Edition. Oxford University Press New York USA 475.  Soanes C. and Stevenson A. Ed. 2006. Concise Oxford English Dictionary . Eleventh Edition. Oxford University Press New York USA 475."},{"key":"e_1_3_2_1_17_1","unstructured":"The International Organization for Standardization The International Electrotechnical Commission (ISO\/IEC). 2005. ISO\/IEC 27002:2005 Information technology -- Security techniques - Code of practice for information security management. Edition 1. Switzerland.  The International Organization for Standardization The International Electrotechnical Commission (ISO\/IEC). 2005. ISO\/IEC 27002:2005 Information technology -- Security techniques - Code of practice for information security management . Edition 1. Switzerland."},{"key":"e_1_3_2_1_18_1","unstructured":"Top 10 Vulnerability Scanners - http:\/\/sectools.org\/vuln-scanners.html Top 10 Vulnerability Scanners - http:\/\/sectools.org\/vuln-scanners.html"},{"key":"e_1_3_2_1_19_1","unstructured":"Tenable SecurityCenter - http:\/\/www.nessus.org\/products\/sc\/ Tenable SecurityCenter - http:\/\/www.nessus.org\/products\/sc\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Unisys Managed Security Services - http:\/\/www.unisys.com\/unisys\/theme\/index.jsp?id=1036100020000010000 generation sequencing reads\". ACM-BCB 2010 Niagara Falls NY USA. 2010 ACM ISBN 978-1-4503-0438-2 Unisys Managed Security Services - http:\/\/www.unisys.com\/unisys\/theme\/index.jsp?id=1036100020000010000 generation sequencing reads\". ACM-BCB 2010 Niagara Falls NY USA. 2010 ACM ISBN 978-1-4503-0438-2"},{"key":"e_1_3_2_1_21_1","first-page":"256","volume-title":"J","author":"Alfred V.","year":"1990"},{"volume-title":"ATEC'06 Proceedings of the annual conference on USENIX' 06 Annual Technical conference page 23. ACM 2006","author":"Park R.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451986"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04769-5_4"},{"key":"e_1_3_2_1_25_1","unstructured":"P. Hayati V. Potdar Alex Talevski William F. Smyth \"Rule-Based On-the-fly Web Spambot Detection Using Action Strings\" 2010.  P. Hayati V. Potdar Alex Talevski William F. Smyth \"Rule-Based On-the-fly Web Spambot Detection Using Action Strings\" 2010."}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":25,"alternative-id":["10.1145\/2381716.2381868","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381868","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}