{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:55:41Z","timestamp":1729677341387,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.95","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"781-788","source":"Crossref","is-referenced-by-count":2,"title":["Mitigating Malicious Updates: Prevention of Insider Threat to Databases"],"prefix":"10.1109","author":[{"given":"Harini","family":"Ragavan","sequence":"first","affiliation":[]},{"given":"Brajendra","family":"Panda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/978-3-642-25560-1_23"},{"year":"2005","author":"bradford","journal-title":"Proceedings of the Twenty-First Annual Computer Security Applications Conference Tucson AZ","article-title":"A layered approach to insider threat detection and proactive forensics","key":"15"},{"key":"16","first-page":"1","article-title":"Insider abuse comprehension through capability acquisition graphs","author":"mathew","year":"2008","journal-title":"Proc 11th Int Conf Information Fusion"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/CSFW.1998.683168"},{"year":"2005","author":"maybury","journal-title":"Proceedings of the International Conference on Intelligence Analysis VA","article-title":"Analysis and detection of malicious insiders","key":"14"},{"key":"11","first-page":"181","article-title":"The inference problem and updates in relational databases","author":"farkas","year":"2001","journal-title":"Proceedings of the 15th IFIP WG11 3 Working Conference on Database and Application Security"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/69.895801"},{"year":"2004","author":"brackney","journal-title":"Proceedings of A March 2004 Workshop","article-title":"Understanding the insider threat","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1413140.1413158"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/MSP.2008.87"},{"key":"10","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/772862.772864","article-title":"The inference problem: A survey","volume":"4","author":"farkas","year":"2002","journal-title":"ACM SIGKDD Explorations"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/978-3-642-19056-8_20"},{"year":"2007","author":"franqueira","journal-title":"Proceedings of the 12th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD 2007) Trondheim Norway","article-title":"Defense against insider threat: A framework for gathering goal-based requirements","key":"6"},{"year":"2005","author":"ray","journal-title":"Proceedings of the 10th European Symposium on Research in Computer Security","article-title":"Using attack trees to identify malicious attacks from authorized insiders","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/CSAC.2003.1254322"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/DSN.2005.94"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/IAW.2007.381939"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680915.pdf?arnumber=6680915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:26:52Z","timestamp":1498091212000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.95","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}