{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T18:08:54Z","timestamp":1761588534548,"version":"build-2065373602"},"reference-count":31,"publisher":"IBM","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IBM J. Res. &amp; Dev."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1147\/jrd.2016.2560558","type":"journal-article","created":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T14:48:29Z","timestamp":1469630909000},"page":"7:1-7:12","source":"Crossref","is-referenced-by-count":4,"title":["A platform and analytics for usage and entitlement analytics"],"prefix":"10.1147","volume":"60","author":[{"given":"S. N.","family":"Chari","sequence":"first","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"T. A.","family":"Habeck","sequence":"additional","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"I.","family":"Molloy","sequence":"additional","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Y.","family":"Park","sequence":"additional","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"J. R.","family":"Rao","sequence":"additional","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"W.","family":"Teiken","sequence":"additional","affiliation":[{"name":"Google, New York, NY, USA"}]}],"member":"3082","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19260-9_11"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488213"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11425274_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295145"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462417"},{"journal-title":"Apache UIMA","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5120\/12136-8419"},{"journal-title":"Palantir Gotham","year":"0","key":"ref16"},{"journal-title":"RSA Adaptive Authentication","year":"0","key":"ref17"},{"journal-title":"Security engineering institute","year":"0","key":"ref18"},{"journal-title":"2007 Annual study U S cost of a data breach","year":"2007","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"journal-title":"Horizontal Integration Broader Access Models for Realizing Information Dominance","year":"2004","key":"ref4"},{"journal-title":"Mallet A machine learning for language toolkit","year":"2002","author":"mccallum","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","author":"bell","year":"1976","journal-title":"Secure Computer Systems Unified Exposition and Multics Interpretation"},{"journal-title":"Arcsight ESM","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1987.1165125"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"journal-title":"Security and fraud","year":"0","key":"ref8"},{"journal-title":"IBM QRadar Security Intelligence Platform","year":"0","key":"ref7"},{"journal-title":"State department anxious about possible leak of cables to wikileaks","year":"2010","author":"zetter","key":"ref2"},{"journal-title":"Anomaly Detection at Multiple Scales (ADAMS) broad agency announcement DARPA-BAA-11-04","year":"2010","key":"ref9"},{"journal-title":"Pentagon says Snowden took most U S secrets ever Rogers Bloomberg business","year":"2014","author":"strohm","key":"ref1"},{"journal-title":"IBM X-Force Threat Intelligence Quarterly","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"journal-title":"2015 Internet security threat report","year":"2015","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"journal-title":"IBM X-Force 2013-Mid-Year Trend and Risk Report","year":"2013","key":"ref23"},{"key":"ref26","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref25","first-page":"60","article-title":"Originator control in usage control","author":"park","year":"0","journal-title":"Proc 3rd Int Workshop Policies Distrib Syst Netw"}],"container-title":["IBM Journal of Research and Development"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5288520\/7523342\/07523361.pdf?arnumber=7523361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T18:03:20Z","timestamp":1761588200000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7523361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1147\/jrd.2016.2560558","relation":{},"ISSN":["0018-8646","0018-8646"],"issn-type":[{"type":"print","value":"0018-8646"},{"type":"electronic","value":"0018-8646"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}