{"id":"https://openalex.org/W2069242349","doi":"https://doi.org/10.1145/1178618.1178620","title":"Methods and limitations of security policy reconciliation","display_name":"Methods and limitations of security policy reconciliation","publication_year":2006,"publication_date":"2006-08-01","ids":{"openalex":"https://openalex.org/W2069242349","doi":"https://doi.org/10.1145/1178618.1178620","mag":"2069242349"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1178618.1178620","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055368149","display_name":"Patrick McDaniel","orcid":"https://orcid.org/0000-0003-2091-7484"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick McDaniel","raw_affiliation_strings":["[Computer Science and Engineering, Pennsylvania State University, University Park, PA]"],"affiliations":[{"raw_affiliation_string":"[Computer Science and Engineering, Pennsylvania State University, University Park, PA]","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019723791","display_name":"Atul Prakash","orcid":"https://orcid.org/0000-0002-4907-3687"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Atul Prakash","raw_affiliation_strings":["Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI#TAB#"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI#TAB#","institution_ids":["https://openalex.org/I27837315"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":13.346,"has_fulltext":false,"cited_by_count":64,"citation_normalized_percentile":{"value":0.967135,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"9","issue":"3","first_page":"259","last_page":"291"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.80355},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security Policy","score":0.7033111},{"id":"https://openalex.org/keywords/exposition","display_name":"Exposition (narrative)","score":0.5142069},{"id":"https://openalex.org/keywords/representation","display_name":"Representation","score":0.47513035}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8288521},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.80355},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.7033111},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.66688967},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5895334},{"id":"https://openalex.org/C2776285698","wikidata":"https://www.wikidata.org/wiki/Q2642214","display_name":"Exposition (narrative)","level":2,"score":0.5142069},{"id":"https://openalex.org/C123587114","wikidata":"https://www.wikidata.org/wiki/Q2101508","display_name":"Policy analysis","level":2,"score":0.4845175},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.47513035},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4594018},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.45825163},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.45666295},{"id":"https://openalex.org/C138268822","wikidata":"https://www.wikidata.org/wiki/Q1051925","display_name":"Resolution (logic)","level":2,"score":0.41329908},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21588174},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.14751202},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.14026353},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.11166525},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07795152},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1178618.1178620","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.61,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":50,"referenced_works":["https://openalex.org/W1482673219","https://openalex.org/W1485636583","https://openalex.org/W1507739880","https://openalex.org/W1526098002","https://openalex.org/W1549050756","https://openalex.org/W1558396271","https://openalex.org/W1560144807","https://openalex.org/W1582075201","https://openalex.org/W1733324781","https://openalex.org/W1860215963","https://openalex.org/W1949661937","https://openalex.org/W1958859150","https://openalex.org/W1967951878","https://openalex.org/W1980456917","https://openalex.org/W1984820433","https://openalex.org/W2011039300","https://openalex.org/W2034419863","https://openalex.org/W2036265926","https://openalex.org/W2043144080","https://openalex.org/W2047686393","https://openalex.org/W2064967060","https://openalex.org/W2083004560","https://openalex.org/W2098629476","https://openalex.org/W2098646237","https://openalex.org/W2103243421","https://openalex.org/W2103546069","https://openalex.org/W2103685727","https://openalex.org/W2106293438","https://openalex.org/W2106539366","https://openalex.org/W2122440889","https://openalex.org/W2124065260","https://openalex.org/W2131758172","https://openalex.org/W2134323418","https://openalex.org/W2140471436","https://openalex.org/W2142437106","https://openalex.org/W2142963826","https://openalex.org/W2144794336","https://openalex.org/W2156186849","https://openalex.org/W2166566648","https://openalex.org/W2170262248","https://openalex.org/W2170496240","https://openalex.org/W2914982603","https://openalex.org/W4241433670","https://openalex.org/W4285719527","https://openalex.org/W4298207198","https://openalex.org/W4300388644","https://openalex.org/W4300591638","https://openalex.org/W43322059","https://openalex.org/W4353004773","https://openalex.org/W78126060"],"related_works":["https://openalex.org/W4285408982","https://openalex.org/W2393973626","https://openalex.org/W2392646799","https://openalex.org/W2188814192","https://openalex.org/W2111277540","https://openalex.org/W2107355607","https://openalex.org/W2105261429","https://openalex.org/W2087536126","https://openalex.org/W2012419258","https://openalex.org/W1519114293"],"abstract_inverted_index":{"A":[0],"security":[1],"policy":[2,32,72,83,106,120],"specifies":[3],"session":[4],"participant":[5,18],"requirements.":[6],"However,":[7],"existing":[8,105],"frameworks":[9],"provide":[10],"limited":[11],"facilities":[12],"for":[13,38,61],"the":[14,23,46,62,71,76,81,97,114,122],"automated":[15],"reconciliation":[16,28,41,48],"of":[17,27,49,66,80,87,91,101,118],"policies.":[19],"This":[20],"paper":[21],"considers":[22],"limits":[24],"and":[25,42,64,78,89,99,116],"methods":[26],"in":[29,45],"a":[30],"general-purpose":[31],"model.":[33],"We":[34,108],"identify":[35],"an":[36],"algorithm":[37],"efficient":[39,59],"two-policy":[40],"show":[43],"that,":[44],"worst-case,":[47],"three":[50],"or":[51],"more":[52],"policies":[53,102],"is":[54,94],"intractable.":[55],"Further,":[56],"we":[57,74],"suggest":[58],"heuristics":[60],"detection":[63],"resolution":[65],"intractable":[67],"reconciliation.":[68],"Based":[69],"upon":[70],"model,":[73,93],"describe":[75],"design":[77],"implementation":[79],"Ismene":[82,119],"language.":[84],"The":[85],"expressiveness":[86],"Ismene,":[88],"indirectly":[90],"our":[92],"demonstrated":[95],"through":[96],"representation":[98],"exposition":[100],"supported":[103],"by":[104],"languages.":[107],"conclude":[109],"with":[110],"brief":[111],"notes":[112],"on":[113],"integration":[115],"enforcement":[117],"within":[121],"Antigone":[123],"communication":[124],"system.":[125]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2069242349","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":4}],"updated_date":"2024-12-10T15:37:54.502386","created_date":"2016-06-24"}