{"id":"https://openalex.org/W49012193","doi":"https://doi.org/10.1007/978-3-642-03007-9_3","title":"An Approach to Security Policy Configuration Using Semantic Threat Graphs","display_name":"An Approach to Security Policy Configuration Using Semantic Threat Graphs","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W49012193","doi":"https://doi.org/10.1007/978-3-642-03007-9_3","mag":"49012193"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-03007-9_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-03007-9_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-03007-9_3.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-03007-9_3.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032696897","display_name":"Simon N. Foley","orcid":"https://orcid.org/0000-0002-0183-1215"},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Simon N. Foley","raw_affiliation_strings":["Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland"],"affiliations":[{"raw_affiliation_string":"Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113789109","display_name":"William M. Fitzgerald","orcid":null},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"William M. Fitzgerald","raw_affiliation_strings":["Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland"],"affiliations":[{"raw_affiliation_string":"Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032696897"],"corresponding_institution_ids":["https://openalex.org/I27577105"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.9956,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.90449029,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8464072942733765},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.6371617317199707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6333032846450806},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5740702152252197},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5668012499809265},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4395246207714081},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.43057146668434143}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8464072942733765},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.6371617317199707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6333032846450806},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5740702152252197},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5668012499809265},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4395246207714081},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.43057146668434143},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-03007-9_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-03007-9_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-03007-9_3.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.159.8437","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.8437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucc.ie/~simon/pubs/ifip2009.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-03007-9_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-03007-9_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-03007-9_3.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/1","display_name":"No poverty"}],"awards":[{"id":"https://openalex.org/G1454835122","display_name":null,"funder_award_id":"08/SRC/11403","funder_id":"https://openalex.org/F4320320847","funder_display_name":"Science Foundation Ireland"}],"funders":[{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W49012193.pdf","grobid_xml":"https://content.openalex.org/works/W49012193.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W58140099","https://openalex.org/W1482031469","https://openalex.org/W1504662986","https://openalex.org/W1522368393","https://openalex.org/W1555563750","https://openalex.org/W1585527934","https://openalex.org/W1638186213","https://openalex.org/W1654253310","https://openalex.org/W1677315679","https://openalex.org/W1867219652","https://openalex.org/W1933799439","https://openalex.org/W2037450860","https://openalex.org/W2077797310","https://openalex.org/W2077937403","https://openalex.org/W2084044852","https://openalex.org/W2133795641","https://openalex.org/W2146024157","https://openalex.org/W2146906033","https://openalex.org/W2153856994","https://openalex.org/W2493058093","https://openalex.org/W2495215577","https://openalex.org/W2561675875","https://openalex.org/W2626963916","https://openalex.org/W2733985360","https://openalex.org/W3146347964","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2003333417","https://openalex.org/W2378862226","https://openalex.org/W118236634","https://openalex.org/W2355326633","https://openalex.org/W2804669904","https://openalex.org/W2149777447","https://openalex.org/W2347456287","https://openalex.org/W2121651557","https://openalex.org/W2782969047","https://openalex.org/W4401210459"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
