{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:13:00Z","timestamp":1730301180646,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.8","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"552-559","source":"Crossref","is-referenced-by-count":1,"title":["Trust Enhanced Security Architecture for Detecting Insider Threats"],"prefix":"10.1109","author":[{"given":"Udaya","family":"Tupakula","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Proceedings of ACM CCS October","article-title":"Blacksheep:detecting compromised hosts in homogeneous crowds","year":"2012","author":"bianchi","key":"15"},{"journal-title":"Proceedings of 42nd Hawaii International Conference on System Sciences","article-title":"Sidd: A framework for detecting sensitive data exfiltration by an insider attack","year":"2009","author":"liu","key":"13"},{"journal-title":"Proceedings of 6th USENIX Workshop on Hot Topics in Security (HotSec '11)","article-title":"Towards practical avoidance of information leakage in enterprise networks","year":"0","author":"croft","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.35"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1029146.1029154"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"2","first-page":"554","article-title":"Role-based access control","author":"ferraiolo","year":"1992","journal-title":"Proceedings of the 15th NIST-NCSC National Computer Security Conference"},{"key":"1","article-title":"Modeling human behaviour to anticipate insider threat","volume":"4","author":"greitzer","year":"2001","journal-title":"Journal of Strategic Security"},{"journal-title":"Avira Antivirus Software for Home and Business","year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.173"},{"journal-title":"The Open Source Network Intrusion Detection System Snort","year":"0","key":"6"},{"journal-title":"Proc 3rd DARPA Information Survivability Conf and Exposition","article-title":"Rt: A role-based trust-management framework","year":"2003","author":"li","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004365"},{"journal-title":"Proceedings of Advances in Neural Information Processing Systems Cambridge","article-title":"Intrusion detection with neural networks","year":"1998","author":"ryan","key":"9"},{"journal-title":"TCG Specification Architecture Overview Specification Revision 1 2","year":"2004","author":"computing group","key":"8"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680886.pdf?arnumber=6680886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:22:17Z","timestamp":1490228537000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.8","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}