{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:05:30Z","timestamp":1729627530704,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/iscst.2005.1553300","type":"proceedings-article","created":{"date-parts":[[2005,12,22]],"date-time":"2005-12-22T17:52:37Z","timestamp":1135273957000},"page":"100-105","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion detection and security policy framework for distributed environments"],"prefix":"10.1109","author":[{"given":"A.A.","family":"El Kalam","sequence":"first","affiliation":[]},{"given":"J.","family":"Briffaut","sequence":"additional","affiliation":[]},{"given":"C.","family":"Toinard","sequence":"additional","affiliation":[]},{"given":"M.","family":"Blanc","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An Intrusion Alert Correlator Based on Prerequisites of intrusions","year":"2002","author":"ning","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"13","article-title":"An intrusion-tolerant authorization scheme for internet applications","author":"deswarte","year":"2002","journal-title":"Supp to the Proceedings of the 2002 Int Conf on Dependable Systems and Networks (DSN 2002)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775101"},{"journal-title":"De?tection D'intrusion Parame?tre?e Par la Politique Par Controle de Flux de Re?fe?rences","year":"2003","author":"zimmermann","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738563"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","author":"bell","year":"1976","journal-title":"Secure Computer Systems Unified Exposition and Multics Interpretation"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"1","first-page":"437","article-title":"Protection","author":"lampson","year":"1971","journal-title":"Proc 5th Annual Princeton Conf on Information Science Systems"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004370"},{"key":"7","article-title":"An improved intrusion detecting method based on process profiling","volume":"43","author":"sato","year":"2002","journal-title":"IPSJ Journal"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-31","author":"bace","year":"2001","journal-title":"Intrusion Detection Systems"},{"key":"5","article-title":"Hardening large-scale networks security through a meta-policy framework","author":"blanc","year":"2004","journal-title":"Proc the Third Workshop on the Internet Telecommunications and Signal Processing (WITSP'04)"},{"journal-title":"Integrity Considerations for Secure Computer Systems","year":"1977","author":"biba","key":"4"},{"key":"9","first-page":"338","article-title":"A specification-based approach for building survivable systems","author":"sekar","year":"1998","journal-title":"Proc 21 St National Information Systems Security Conference"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601332"}],"event":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","start":{"date-parts":[[2005,5,20]]},"location":"St Louis, MO, USA","end":{"date-parts":[[2005,5,20]]}},"container-title":["Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005."],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/10408\/33068\/01553300.pdf?arnumber=1553300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T05:10:16Z","timestamp":1555045816000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/1553300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":16,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/iscst.2005.1553300","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}