{"id":"https://openalex.org/W1545849364","doi":"https://doi.org/10.1109/dexa.2007.146","title":"Patterns in Security Enforcement Policy Development","display_name":"Patterns in Security Enforcement Policy Development","publication_year":2007,"publication_date":"2007-09-01","ids":{"openalex":"https://openalex.org/W1545849364","doi":"https://doi.org/10.1109/dexa.2007.146","mag":"1545849364"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dexa.2007.146","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/5449644/04312920.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051226686","display_name":"Dan Thomsen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210102027","display_name":"Cyber Defense Agency (United States)","ror":"https://ror.org/016hg3c35","country_code":"US","type":"company","lineage":["https://openalex.org/I4210102027"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dan Thomsen","raw_affiliation_strings":["Cyber Defence Agency Limited Liability Company, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Defence Agency Limited Liability Company, USA","institution_ids":["https://openalex.org/I4210102027"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5051226686"],"corresponding_institution_ids":["https://openalex.org/I4210102027"],"apc_list":null,"apc_paid":null,"fwci":0.958,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":8,"citation_normalized_percentile":{"value":0.795019,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":null,"issue":null,"first_page":"744","last_page":"748"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-policy","display_name":"Security Policy","score":0.7431407}],"concepts":[{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.75983},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.7431407},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6555619},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.63220364},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.52437115},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.43568414},{"id":"https://openalex.org/C2778753569","wikidata":"https://www.wikidata.org/wiki/Q1960395","display_name":"Span (engineering)","level":2,"score":0.41888842},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.41607124},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2764423},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26733363},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.14327076},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13540596},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C147176958","wikidata":"https://www.wikidata.org/wiki/Q77590","display_name":"Civil engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dexa.2007.146","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://ris.utwente.nl/ws/files/5449644/04312920.pdf","pdf_url":"https://ris.utwente.nl/ws/files/5449644/04312920.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://ris.utwente.nl/ws/files/5449644/04312920.pdf","pdf_url":"https://ris.utwente.nl/ws/files/5449644/04312920.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1512485814","https://openalex.org/W1514888816","https://openalex.org/W1660390307","https://openalex.org/W2029554959","https://openalex.org/W2063838657","https://openalex.org/W2083586095","https://openalex.org/W2122114768","https://openalex.org/W2133457275","https://openalex.org/W2137092177","https://openalex.org/W2137642315","https://openalex.org/W2138105615","https://openalex.org/W2140757415","https://openalex.org/W2144346642","https://openalex.org/W2145290685","https://openalex.org/W2157813460","https://openalex.org/W2163382775","https://openalex.org/W2166602595","https://openalex.org/W63977079"],"related_works":["https://openalex.org/W3094039898","https://openalex.org/W2375663084","https://openalex.org/W2188814192","https://openalex.org/W2173238669","https://openalex.org/W2153264224","https://openalex.org/W2151761340","https://openalex.org/W2130339907","https://openalex.org/W2114705216","https://openalex.org/W2111277540","https://openalex.org/W1519114293"],"abstract_inverted_index":{"Creating":[0],"security":[1,18,50],"enforcement":[2],"policies":[3],"is":[4,10],"a":[5,14,31,53],"complex":[6],"design":[7,36],"problem":[8],"that":[9,33,44],"often":[11],"done":[12],"using":[13,52],"native":[15,25],"GUI.":[16],"A":[17],"policy":[19,51],"for":[20],"an":[21],"enterprise":[22],"must":[23],"span":[24],"applications":[26],"and":[27],"be":[28],"expressed":[29],"in":[30],"format":[32],"best":[34],"captures":[35],"problems.":[37],"This":[38],"paper":[39],"looks":[40],"at":[41],"the":[42],"patterns":[43],"emerge":[45],"when":[46],"developing":[47],"enterprising":[48],"spanning":[49],"language":[54],"based":[55],"approach.":[56]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1545849364","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-01-22T23:38:46.372899","created_date":"2016-06-24"}