{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:22Z","timestamp":1750306042407,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Army Research Laboratory","award":["W911NF-16-3-0001"],"award-info":[{"award-number":["W911NF-16-3-0001"]}]},{"name":"U.K. Ministry of Defence","award":["W911NF-16-3-0001"],"award-info":[{"award-number":["W911NF-16-3-0001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078881","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Distributed Intelligence"],"prefix":"10.1145","author":[{"given":"Seraphin B.","family":"Calo","sequence":"first","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Dinesh C.","family":"Verma","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1483085"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.09.014"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560326_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188184"},{"key":"e_1_3_2_1_6_1","unstructured":"B. Moore Ed. RFC 3460 Policy Core Information Model (PCIM) Extensions http:\/\/www.rfc-editor.org\/rfc\/rfc3460.txt   B. Moore Ed. RFC 3460 Policy Core Information Model (PCIM) Extensions http:\/\/www.rfc-editor.org\/rfc\/rfc3460.txt"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295145"},{"volume-title":"SPIE DS 2017 (to appear).","author":"Touma Maroun","key":"e_1_3_2_1_8_1","unstructured":"Maroun Touma , Elisa Bertino , Seraphin Calo , Brian Rivera , Dinesh Verma , Framework for behavioral analytics in anomaly identification , SPIE DS 2017 (to appear). Maroun Touma, Elisa Bertino, Seraphin Calo, Brian Rivera, Dinesh Verma, Framework for behavioral analytics in anomaly identification, SPIE DS 2017 (to appear)."},{"key":"e_1_3_2_1_9_1","volume-title":"Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning","author":"Lobo Jorge","year":"2011","unstructured":"Jorge Lobo , Jiefei Ma , Alessandra Russo , Emil Lupu , Seraphin B. Calo , Morris Sloman , Refinement of History-Based Policies , In Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning , Springer-Verlag , Berlin, Heidelberg 280--299 ( 2011 ). Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil Lupu, Seraphin B. Calo, Morris Sloman, Refinement of History-Based Policies, In Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, Springer-Verlag, Berlin, Heidelberg 280--299 (2011)."},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in Information Security","author":"S. Jajodia","year":"2011","unstructured":"S. Jajodia et. al. , eds., Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats , Advances in Information Security , Springer , 2011 . S. Jajodia et. al., eds., Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security, Springer, 2011."},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"IEEE Military Communications Conference, (MILCOM 2007","author":"Asmare E.","year":"2007","unstructured":"E. Asmare , N. Dulay , E. Lupu , M. Sloman , S. Calo , J. Lobo , Secure Dynamic Community Establishment in Coalitions , IEEE Military Communications Conference, (MILCOM 2007 ), Orlando FL , Oct 2007 , Pages 1 -- 7 . E. Asmare, N. Dulay, E. Lupu, M. Sloman, S. Calo, J. Lobo, Secure Dynamic Community Establishment in Coalitions, IEEE Military Communications Conference, (MILCOM 2007), Orlando FL, Oct 2007, Pages 1--7."},{"key":"e_1_3_2_1_12_1","volume-title":"Comparing Software Defined Architectures for Coalition Operations, submitted to International Conference on Military Communications and Information Systems","author":"Mishra V.","year":"2017","unstructured":"V. Mishra , D. Verma , C. Williams and K. Marcus , Comparing Software Defined Architectures for Coalition Operations, submitted to International Conference on Military Communications and Information Systems , 2017 . V. Mishra, D. Verma, C. Williams and K. Marcus, Comparing Software Defined Architectures for Coalition Operations, submitted to International Conference on Military Communications and Information Systems, 2017."}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078881","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078881","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078881"}},"subtitle":["Trends in the Management of Complex Systems"],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":12,"alternative-id":["10.1145\/3078861.3078881","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078881","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}