{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:13Z","timestamp":1750307053863,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T00:00:00Z","timestamp":1347926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,18]]},"DOI":"10.1145\/2413296.2413301","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Argumentation logic to assist in security administration"],"prefix":"10.1145","author":[{"given":"Jeff","family":"Rowe","sequence":"first","affiliation":[{"name":"UC Davis, Davis, CA, USA"}]},{"given":"Karl","family":"Levitt","sequence":"additional","affiliation":[{"name":"UC Davis, Davis, CA, USA"}]},{"given":"Simon","family":"Parsons","sequence":"additional","affiliation":[{"name":"Brooklyn College, CUNY, Brooklyn, NY, USA"}]},{"given":"Elizabeth","family":"Sklar","sequence":"additional","affiliation":[{"name":"Brooklyn College, CUNY, Brooklyn, NY, USA"}]},{"given":"Andrew","family":"Applebaum","sequence":"additional","affiliation":[{"name":"UC Davis, Davis, CA, USA"}]},{"given":"Sharmin","family":"Jalal","sequence":"additional","affiliation":[{"name":"UC Davis, Davis, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-008-9105-1"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence","author":"Amgoud L.","year":"1998","unstructured":"L. Amgoud and C. Cayrol . On the acceptability of arguments in preference-based argumentation framework . In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence , pages 1 -- 7 , 1998 . L. Amgoud and C. Cayrol. On the acceptability of arguments in preference-based argumentation framework. In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence, pages 1--7, 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014490210693"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-540-45248-5_8","volume-title":"Recent Advances in Intrusion Detection: 6th international symposium, RAID","author":"Balepin Ivan","year":"2003","unstructured":"Ivan Balepin , Sergei Maltsev , Jeff Rowe , and Karl Levitt . Using Specification-Based Intrusion Detection for Automated Response . In Recent Advances in Intrusion Detection: 6th international symposium, RAID 2003 , Pittsburgh, PA , USA , September 8-10, 2003: proceedings, page 136 . Springer-Verlag New York Inc, 2003. Ivan Balepin, Sergei Maltsev, Jeff Rowe, and Karl Levitt. Using Specification-Based Intrusion Detection for Automated Response. In Recent Advances in Intrusion Detection: 6th international symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003: proceedings, page 136. Springer-Verlag New York Inc, 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008308627745"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(01)00071-6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162668"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1055\/s-0038-1634427"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)00041-X"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2010.09.005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.319.7201.32"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.321.7252.28"},{"issue":"1","key":"e_1_3_2_1_14_1","first-page":"49","article-title":"Decision support for health care: the PROforma evidence base","volume":"14","author":"Fox J.","year":"2006","unstructured":"J. Fox , V. Patkar , and R. Thomson . Decision support for health care: the PROforma evidence base . Informatics in Primary Care , 14 ( 1 ): 49 -- 54 , 2006 . J. Fox, V. Patkar, and R. Thomson. Decision support for health care: the PROforma evidence base. Informatics in Primary Care, 14(1):49--54, 2006.","journal-title":"Informatics in Primary Care"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00871972"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.04.010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/10929179_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/860575.860717"},{"key":"e_1_3_2_1_19_1","volume-title":"A precise description of the ACL2 logic. In http:\/\/www.cs.utexas.edu\/users\/moore\/publications\/km97a.ps.gz. Dept. of Computer Sciences","author":"Kaufmann M.","year":"1997","unstructured":"M. Kaufmann and J S. Moore . A precise description of the ACL2 logic. In http:\/\/www.cs.utexas.edu\/users\/moore\/publications\/km97a.ps.gz. Dept. of Computer Sciences , University of Texas at Austin , 1997 . M. Kaufmann and J S. Moore. A precise description of the ACL2 logic. In http:\/\/www.cs.utexas.edu\/users\/moore\/publications\/km97a.ps.gz. Dept. of Computer Sciences, University of Texas at Austin, 1997."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Kim H.","year":"2004","unstructured":"H. Kim and B. Karp . Autograph: Toward automated, distributed worm signature detection . In Proceedings of the USENIX Security Symposium , 2004 . H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In Proceedings of the USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8683(03)00014-4"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(98)00078-2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.1995.tb00025.x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219745"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.1993.tb00309.x"},{"key":"e_1_3_2_1_27_1","first-page":"245","volume-title":"Proceedings of the 1st International Conference on Knowledge Representation and Reasoning","author":"Lin F.","year":"1989","unstructured":"F. Lin and Y. Shoham . Argument systems: a uniform basis for nonmonotonic reasoning . In Proceedings of the 1st International Conference on Knowledge Representation and Reasoning , pages 245 -- 255 , San Mateo, CA , 1989 . Morgan Kaufmann. F. Lin and Y. Shoham. Argument systems: a uniform basis for nonmonotonic reasoning. In Proceedings of the 1st International Conference on Knowledge Representation and Reasoning, pages 245--255, San Mateo, CA, 1989. Morgan Kaufmann."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.1987.tb00178.x"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 2nd Workshop on Formal Semantics and Pragmatics of Dialogue","author":"Maudet N.","year":"1998","unstructured":"N. Maudet and F. Evrard . A generic framework for dialogue game implementation . In Proceedings of the 2nd Workshop on Formal Semantics and Pragmatics of Dialogue , University of Twente, The Netherlands , May 1998 . N. Maudet and F. Evrard. A generic framework for dialogue game implementation. In Proceedings of the 2nd Workshop on Formal Semantics and Pragmatics of Dialogue, University of Twente, The Netherlands, May 1998."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence","author":"McBurney P.","year":"2000","unstructured":"P. McBurney and S. Parsons . Risk agoras: Dialectical argumentation for scientific reasoning. In C. Boutilier and M. Goldszmidt, editors , Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence , Stanford, CA, USA , 2000 . UAI. P. McBurney and S. Parsons. Risk agoras: Dialectical argumentation for scientific reasoning. In C. Boutilier and M. Goldszmidt, editors, Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence, Stanford, CA, USA, 2000. UAI."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015586128739"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(85)90042-6"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.04.005"},{"key":"e_1_3_2_1_34_1","volume-title":"Karl Levitt. Cooperative Response Strategies for Large Sacle Attack Mitigation. In Proceedings of the DARPA Information Survivability Conference and Exposition. DISCEX","author":"Nojiri Dai","year":"2003","unstructured":"Dai Nojiri , Jeff Rowe , and Karl Levitt. Cooperative Response Strategies for Large Sacle Attack Mitigation. In Proceedings of the DARPA Information Survivability Conference and Exposition. DISCEX , 2003 . Dai Nojiri, Jeff Rowe, and Karl Levitt. Cooperative Response Strategies for Large Sacle Attack Mitigation. In Proceedings of the DARPA Information Survivability Conference and Exposition. DISCEX, 2003."},{"key":"e_1_3_2_1_35_1","first-page":"267","volume-title":"Proceedings of Second International Conference on Multi-Agent Systems","author":"Parsons S.","year":"1996","unstructured":"S. Parsons and N. R. Jennings . Negotiation through argumentation -- a preliminary report . In Proceedings of Second International Conference on Multi-Agent Systems , pages 267 -- 274 , 1996 . S. Parsons and N. R. Jennings. Negotiation through argumentation -- a preliminary report. In Proceedings of Second International Conference on Multi-Agent Systems, pages 267--274, 1996."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000003742.50038.d3"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/8.3.261"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/13.3.347"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1104_4"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(92)90103-5"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/11663081.1997.10510900"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008278309945"},{"key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213004001922"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888907001051"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(80)90014-4"},{"key":"e_1_3_2_1_47_1","first-page":"45","volume-title":"In OSDI","author":"Singh Sumeet","year":"2004","unstructured":"Sumeet Singh , Cristian Estan , George Varghese , and Stefan Savage . Automated worm fingerprinting . In In OSDI , pages 45 -- 60 , 2004 . Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage. Automated worm fingerprinting. In In OSDI, pages 45--60, 2004."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_15"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.309"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFIN.2009.5339559"},{"key":"e_1_3_2_1_51_1","unstructured":"SRI International. Pvs specification and verification system. http:\/\/pvs.csl.sri.com\/.  SRI International. Pvs specification and verification system. http:\/\/pvs.csl.sri.com\/."},{"key":"e_1_3_2_1_52_1","first-page":"517","volume-title":"Proceedings of the Eleventh Joint Conference on Artificial Intelligence","author":"Sycara K.","year":"1989","unstructured":"K. Sycara . Argumentation : Planning other agents' plans . In Proceedings of the Eleventh Joint Conference on Artificial Intelligence , pages 517 -- 523 , 1989 . K. Sycara. Argumentation: Planning other agents' plans. In Proceedings of the Eleventh Joint Conference on Artificial Intelligence, pages 517--523, 1989."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00162699"},{"key":"e_1_3_2_1_54_1","volume-title":"Cambridge University Press","author":"Toulmin S.","year":"1958","unstructured":"S. Toulmin . The Uses of Argument . Cambridge University Press , Cambridge, England , 1958 . S. Toulmin. The Uses of Argument. Cambridge University Press, Cambridge, England, 1958."},{"key":"e_1_3_2_1_55_1","unstructured":"UCDavis DSL Group. Dsl faith. http:\/\/http:\/\/apps.facebook.com\/dsl_faith\/.  UCDavis DSL Group. Dsl faith. http:\/\/http:\/\/apps.facebook.com\/dsl_faith\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1093\/lpr\/mgm032"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511802034"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.315.7111.791"},{"key":"e_1_3_2_1_59_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","volume-title":"Erland Jonsson","author":"Wang Ke","year":"2004","unstructured":"Ke Wang and Salvatore J. Stolfo . Anomalous payload-based network intrusion detection . In Erland Jonsson , Alfonso Valdes, and Magnus Almgren,editors, Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004 , Sophia Antipolis, France, September 15-17, 2004. Proceedings, volume 3224 of Lecture Notes in Computer Science , pages 203 -- 222 . Springer , 2004. Ke Wang and Salvatore J. Stolfo. Anomalous payload-based network intrusion detection. In Erland Jonsson, Alfonso Valdes, and Magnus Almgren,editors, Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, volume 3224 of Lecture Notes in Computer Science, pages 203--222. Springer, 2004."},{"issue":"2","key":"e_1_3_2_1_60_1","first-page":"77","article-title":"The problem of proof","volume":"8","author":"Wigmore J. H.","year":"1913","unstructured":"J. H. Wigmore . The problem of proof . Illinois Law Review , 8 ( 2 ): 77 -- 103 , 1913 . J. H. Wigmore. The problem of proof. Illinois Law Review, 8(2):77--103, 1913.","journal-title":"Illinois Law Review"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.006"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.492975"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the Workshop on Computational Models of Natural Argument","author":"Yuan T.","year":"2002","unstructured":"T. Yuan , D. Moore , and A. Grierson . Educational human-computer debate: A computational dialectics approach. In G. Carenini, F. Grasso, and C. Reed, editors , Proceedings of the Workshop on Computational Models of Natural Argument , 2002 . T. Yuan, D. Moore, and A. Grierson. Educational human-computer debate: A computational dialectics approach. In G. Carenini, F. Grasso, and C. Reed, editors, Proceedings of the Workshop on Computational Models of Natural Argument, 2002."}],"event":{"name":"NSPW '12: The New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc","ACM Association for Computing Machinery","Microsoft Microsoft","CA Labs CA Labs"],"location":"Bertinoro Italy","acronym":"NSPW '12"},"container-title":["Proceedings of the 2012 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413296.2413301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2413296.2413301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:09Z","timestamp":1750238469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413296.2413301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,18]]},"references-count":63,"alternative-id":["10.1145\/2413296.2413301","10.1145\/2413296"],"URL":"https:\/\/doi.org\/10.1145\/2413296.2413301","relation":{},"subject":[],"published":{"date-parts":[[2012,9,18]]},"assertion":[{"value":"2012-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}