{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:25:02Z","timestamp":1767338702683,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,29]]},"DOI":"10.1145\/3290688.3290694","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Decision Model for the Security and Utility Risk Evaluation (SURE) Framework"],"prefix":"10.1145","author":[{"given":"Angela K.","family":"Billard","sequence":"first","affiliation":[{"name":"Defence Science and Technology Group, Edinburgh, South Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"volume-title":"eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard","key":"e_1_3_2_1_1_1","unstructured":"2013. eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard . Burlington, MA . http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html 2013. eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard. Burlington, MA. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682762"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682761"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2013.6922054"},{"key":"e_1_3_2_1_6_1","volume-title":"Brown","author":"Britton David W.","year":"2007","unstructured":"David W. Britton and Ian A . Brown . 2007 . A Security Risk Measurement for the RAdAC Model. Master's thesis. Naval Postgraduate School, Monterey, California . www.dtic.mil\/dtic\/tr\/fulltext\/u2\/a467180.pdf David W. Britton and Ian A. Brown. 2007. A Security Risk Measurement for the RAdAC Model. Master's thesis. Naval Postgraduate School, Monterey, California. www.dtic.mil\/dtic\/tr\/fulltext\/u2\/a467180.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2010.5471991"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29963-6_11"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2012.6297931"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 10th International Workshop on Security in Information Systems (ICEIS","author":"Chen Liang","year":"2013","unstructured":"Liang Chen , Luca Gasparini , and Timothy J. Norman . 2013. XACML and Risk-Aware Access Controls . In Proceedings of the 10th International Workshop on Security in Information Systems (ICEIS 2013 ). SciTePress, Set\u00fabal, Portugal, 66--75. Liang Chen, Luca Gasparini, and Timothy J. Norman. 2013. XACML and Risk-Aware Access Controls. In Proceedings of the 10th International Workshop on Security in Information Systems (ICEIS 2013). SciTePress, Set\u00fabal, Portugal, 66--75."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.41"},{"key":"e_1_3_2_1_13_1","volume-title":"Secure Knowledge Management Workshop. National Security Agency","author":"McGraw Robert W.","year":"2004","unstructured":"Robert W. McGraw . 2004 . Securing Content in the Department of Defense's Global Information Grid . In Secure Knowledge Management Workshop. National Security Agency , Fort Meade, MD, 11. http:\/\/studylib.net\/doc\/10492582\/securing-content-in-the-department-of-defense%E2%80%99s-global-in... Robert W. McGraw. 2004. Securing Content in the Department of Defense's Global Information Grid. In Secure Knowledge Management Workshop. National Security Agency, Fort Meade, MD, 11. http:\/\/studylib.net\/doc\/10492582\/securing-content-in-the-department-of-defense%E2%80%99s-global-in..."},{"key":"e_1_3_2_1_14_1","volume-title":"NIST Privilege Management Workshop, Sheldon A. Durrant, Tanya Brewer, and Annie Sokol (Eds.). NIST","author":"McGraw Robert W.","year":"2009","unstructured":"Robert W. McGraw . 2009 . Risk Adaptable Access Control (RAdAC) . In NIST Privilege Management Workshop, Sheldon A. Durrant, Tanya Brewer, and Annie Sokol (Eds.). NIST , Gaithersburg, MD, 10. https:\/\/csrc.nist.gov\/csrc\/media\/events\/privilege-management-workshop\/documents\/radac-paper0001.pdf Robert W. McGraw. 2009. Risk Adaptable Access Control (RAdAC). In NIST Privilege Management Workshop, Sheldon A. Durrant, Tanya Brewer, and Annie Sokol (Eds.). NIST, Gaithersburg, MD, 10. https:\/\/csrc.nist.gov\/csrc\/media\/events\/privilege-management-workshop\/documents\/radac-paper0001.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595694"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755719"},{"volume-title":"Guide for Conducting Risk Assessments. NIST Pubs","author":"NIST.","key":"e_1_3_2_1_18_1","unstructured":"NIST. 2012. Guide for Conducting Risk Assessments. NIST Pubs . Gaithersburg, MD . NIST. 2012. Guide for Conducting Risk Assessments. NIST Pubs. Gaithersburg, MD."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA429342"},{"key":"e_1_3_2_1_20_1","volume-title":"Hassell","author":"Sandoval Juan E.","year":"2010","unstructured":"Juan E. Sandoval and Suzanne P . Hassell . 2010 . Measurement, identification and calculation of cyber defense metrics. In 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2010). IEEE, New York, NY, USA , 2174--2179. Juan E. Sandoval and Suzanne P. Hassell. 2010. Measurement, identification and calculation of cyber defense metrics. In 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2010). IEEE, New York, NY, USA, 2174--2179."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653721"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455794"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753319"}],"event":{"name":"ACSW 2019: Australasian Computer Science Week 2019","sponsor":["CORE - Computing Research and Education","Macquarie University-Sydney"],"location":"Sydney NSW Australia","acronym":"ACSW 2019"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290694","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290688.3290694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:17Z","timestamp":1750204397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":22,"alternative-id":["10.1145\/3290688.3290694","10.1145\/3290688"],"URL":"https:\/\/doi.org\/10.1145\/3290688.3290694","relation":{},"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"2019-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}