{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:19Z","timestamp":1750306639107,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T00:00:00Z","timestamp":1403654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,25]]},"DOI":"10.1145\/2613087.2613107","type":"proceedings-article","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T14:23:03Z","timestamp":1404224583000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Monitor placement for large-scale systems"],"prefix":"10.1145","author":[{"given":"Nirupama","family":"Talele","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Jason","family":"Teutsch","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Robert","family":"Erbacher","sequence":"additional","affiliation":[{"name":"Army Research Lab, Adelphi, MD, USA"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"M.\n      Albanese S.\n      Jajodia A.\n      Pugliese and \n      V. S.\n      Subrahmanian\n  . \n  Scalable detection of cyber attacks\n  . In N. Chaki and A. Cortesi editors CISIM volume \n  245\n   of \n  Communications in Computer and Information Science pages \n  9\n  --\n  18\n  . \n  Springer 2011\n  .  M. Albanese S. Jajodia A. Pugliese and V. S. Subrahmanian. Scalable detection of cyber attacks. In N. Chaki and A. Cortesi editors CISIM volume 245 of Communications in Computer and Information Science pages 9--18. Springer 2011.","DOI":"10.1007\/978-3-642-27245-5_4"},{"key":"e_1_3_2_1_2_1","volume-title":"Virginia Tech","author":"Almohri H. M. J.","year":"2014","unstructured":"H. M. J. Almohri , D. Yao , L. T. Watson , and X. Ou . Security optimization of dynamic networks with probabilistic graph modeling and linear programming. Technical report , Virginia Tech , 2014 . H. M. J. Almohri, D. Yao, L. T. Watson, and X. Ou. Security optimization of dynamic networks with probabilistic graph modeling and linear programming. Technical report, Virginia Tech, 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"issue":"148","key":"e_1_3_2_1_4_1","first-page":"13","article-title":"An introduction to novell apparmor","volume":"2006","author":"Bauer M.","unstructured":"M. Bauer . Paranoid penguin : An introduction to novell apparmor . Linux J. , 2006 ( 148 ): 13 --, Aug. 2006. M. Bauer. Paranoid penguin: An introduction to novell apparmor. Linux J., 2006(148):13--, Aug. 2006.","journal-title":"Linux J."},{"key":"e_1_3_2_1_7_1","first-page":"377","volume-title":"Proceedings of the first annual Conference of the ASCI","author":"Bik A. J.","year":"1994","unstructured":"A. J. Bik and H. A. Wijshoff . Implementation of fourier-motzkin elimination . In Proceedings of the first annual Conference of the ASCI , pages 377 -- 386 . Citeseer , 1994 . A. J. Bik and H. A. Wijshoff. Implementation of fourier-motzkin elimination. In Proceedings of the first annual Conference of the ASCI, pages 377--386. Citeseer, 1994."},{"key":"e_1_3_2_1_8_1","volume-title":"NDSS","author":"Chen H.","year":"2009","unstructured":"H. Chen , N. Li , and Z. Mao . Analyzing and comparing the protection quality of security enhanced operating systems . In NDSS , 2009 . H. Chen, N. Li, and Z. Mao. Analyzing and comparing the protection quality of security enhanced operating systems. In NDSS, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"Firewalls and Internet security: repelling the wily hacker","author":"Cheswick W. R.","year":"2003","unstructured":"W. R. Cheswick , S. M. Bellovin , and A. D. Rubin . Firewalls and Internet security: repelling the wily hacker . Addison-Wesley Longman Publishing Co., Inc. , 2003 . W. R. Cheswick, S. M. Bellovin, and A. D. Rubin. Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc., 2003."},{"key":"e_1_3_2_1_10_1","unstructured":"Introduction to labeled Networking in Linux. http:\/\/www.linuxfoundation.jp\/jp_uploads\/seminar20080709\/paul_moore-r1.pdf.  Introduction to labeled Networking in Linux. http:\/\/www.linuxfoundation.jp\/jp_uploads\/seminar20080709\/paul_moore-r1.pdf."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792225297"},{"key":"e_1_3_2_1_12_1","volume-title":"Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security, 28(1):18--28","author":"Garcia-Teodoro P.","year":"2009","unstructured":"P. Garcia-Teodoro , J. Diaz-Verdejo , G. Macia-Fernandez , and E. Vazquez . Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security, 28(1):18--28 , 2009 . P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, and E. Vazquez. Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security, 28(1):18--28, 2009."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762174.1762199"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866340"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24006-3_8"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium","author":"Jaeger T.","year":"2003","unstructured":"T. Jaeger , R. Sailer , and X. Zhang . Analyzing integrity protection in the SELinux example policy . In USENIX Security Symposium , Aug. 2003 . T. Jaeger, R. Sailer, and X. Zhang. Analyzing integrity protection in the SELinux example policy. In USENIX Security Symposium, Aug. 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11957-6_18"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429115"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"key":"e_1_3_2_1_22_1","unstructured":"J. Morris. New Secmark-based network controls for SELinux. http:\/\/james-morris.livejournal.com\/11010.html.  J. Morris. New Secmark-based network controls for SELinux. http:\/\/james-morris.livejournal.com\/11010.html."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420991"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/269005.266669"},{"key":"e_1_3_2_1_25_1","unstructured":"Network based intrusion detection configuration. http:\/\/www.cisco.com\/en\/US\/docs\/solutions\/Enterprise\/Data_Center\/ServerFarmSec_2.1\/8_NIDS.pdf.  Network based intrusion detection configuration. http:\/\/www.cisco.com\/en\/US\/docs\/solutions\/Enterprise\/Data_Center\/ServerFarmSec_2.1\/8_NIDS.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948137"},{"key":"e_1_3_2_1_27_1","volume-title":"Critical Issues in C4I","author":"Noel S.","year":"2009","unstructured":"S. Noel and S. Jajodia . Advanced vulnerability analysis and intrusion detection through predictive attack graphs . In Critical Issues in C4I , Armed Forces Communications and Electronics Association (AFCEA) Solutions Series . International Journal of Command and Control, 2009 . S. Noel and S. Jajodia. Advanced vulnerability analysis and intrusion detection through predictive attack graphs. In Critical Issues in C4I, Armed Forces Communications and Electronics Association (AFCEA) Solutions Series. International Journal of Command and Control, 2009."},{"key":"e_1_3_2_1_28_1","unstructured":"Security-enhanced linux. http:\/\/www.nsa.gov\/research\/selinux\/.  Security-enhanced linux. http:\/\/www.nsa.gov\/research\/selinux\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"e_1_3_2_1_30_1","volume-title":"Workshop on Foundations of Computer Security (FCS'09)","author":"Pike L.","year":"2009","unstructured":"L. Pike . Post-hoc separation policy analysis with graph algorithms . In Workshop on Foundations of Computer Security (FCS'09) . Affiliated with Logic in Computer Science (LICS ), August 2009 . L. Pike. Post-hoc separation policy analysis with graph algorithms. In Workshop on Foundations of Computer Security (FCS'09). Affiliated with Logic in Computer Science (LICS), August 2009."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(99)00011-8"},{"key":"e_1_3_2_1_32_1","volume-title":"WITS","author":"Sarna-Starosta B.","year":"2004","unstructured":"B. Sarna-Starosta and S. D. Stoller . Policy analysis for Security-Enhanced Linux . In WITS , April 2004 . B. Sarna-Starosta and S. D. Stoller. Policy analysis for Security-Enhanced Linux. In WITS, April 2004."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830526"},{"key":"e_1_3_2_1_34_1","unstructured":"Snort Intrusion Detection\/Prevention System. http:\/\/www.snort.org\/.  Snort Intrusion Detection\/Prevention System. http:\/\/www.snort.org\/."},{"key":"e_1_3_2_1_35_1","unstructured":"Sun Microsystems. Trusted Solaris operating environment - a technical overview. http:\/\/www.sun.com.  Sun Microsystems. Trusted Solaris operating environment - a technical overview. http:\/\/www.sun.com."},{"key":"e_1_3_2_1_36_1","unstructured":"Suricata Intrusion Detection\/Prevention System. http:\/\/suricata-ids.org\/.  Suricata Intrusion Detection\/Prevention System. http:\/\/suricata-ids.org\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36563-8_2"},{"key":"e_1_3_2_1_38_1","unstructured":"Tresys. SETools - Policy Analysis Tools for SELinux. Available at http:\/\/oss.tresys.com\/projects\/setools.  Tresys. SETools - Policy Analysis Tools for SELinux. Available at http:\/\/oss.tresys.com\/projects\/setools."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28756-5_20"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.04.001"},{"key":"e_1_3_2_1_41_1","first-page":"15","volume-title":"Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference","author":"Watson R. N. M.","year":"2001","unstructured":"R. N. M. Watson . TrustedBSD : Adding trusted operating system features to FreeBSD . In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference , pages 15 -- 28 , 2001 . R. N. M. Watson. TrustedBSD: Adding trusted operating system features to FreeBSD. In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pages 15--28, 2001."},{"key":"e_1_3_2_1_42_1","volume-title":"OSDI","author":"Zeldovich N.","year":"2006","unstructured":"N. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazi\u00e9res . Making information ow explicit in HiStar . In OSDI , 2006 . N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazi\u00e9res. Making information ow explicit in HiStar. In OSDI, 2006."}],"event":{"name":"SACMAT '14: 19th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London Ontario Canada","acronym":"SACMAT '14"},"container-title":["Proceedings of the 19th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2613087.2613107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2613087.2613107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:57Z","timestamp":1750229757000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2613087.2613107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,25]]},"references-count":39,"alternative-id":["10.1145\/2613087.2613107","10.1145\/2613087"],"URL":"https:\/\/doi.org\/10.1145\/2613087.2613107","relation":{},"subject":[],"published":{"date-parts":[[2014,6,25]]},"assertion":[{"value":"2014-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}