{"id":"https://openalex.org/W1570845098","doi":"https://doi.org/10.1007/bfb0013912","title":"ASAX: Software architecture and rule-based language for universal audit trail analysis","display_name":"ASAX: Software architecture and rule-based language for universal audit trail analysis","publication_year":1992,"publication_date":"1992-01-01","ids":{"openalex":"https://openalex.org/W1570845098","doi":"https://doi.org/10.1007/bfb0013912","mag":"1570845098"},"language":"en","primary_location":{"id":"doi:10.1007/bfb0013912","is_oa":false,"landing_page_url":"https://doi.org/10.1007/bfb0013912","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078163685","display_name":"Naji Habra","orcid":null},"institutions":[{"id":"https://openalex.org/I149768937","display_name":"University of Namur","ror":"https://ror.org/03d1maw17","country_code":"BE","type":"education","lineage":["https://openalex.org/I149768937"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Naji Habra","raw_affiliation_strings":["Institut d'Informatique, University of Namur, 21, Rue Grandgagnage, B-5000, Namur, Belgium","[University of Namur]"],"affiliations":[{"raw_affiliation_string":"Institut d'Informatique, University of Namur, 21, Rue Grandgagnage, B-5000, Namur, Belgium","institution_ids":["https://openalex.org/I149768937"]},{"raw_affiliation_string":"[University of Namur]","institution_ids":["https://openalex.org/I149768937"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025418652","display_name":"Baudouin Le Charlier","orcid":null},"institutions":[{"id":"https://openalex.org/I149768937","display_name":"University of Namur","ror":"https://ror.org/03d1maw17","country_code":"BE","type":"education","lineage":["https://openalex.org/I149768937"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Baudouin Le Charlier","raw_affiliation_strings":["Institut d'Informatique, University of Namur, 21, Rue Grandgagnage, B-5000, Namur, Belgium","[University of Namur]"],"affiliations":[{"raw_affiliation_string":"Institut d'Informatique, University of Namur, 21, Rue Grandgagnage, B-5000, Namur, Belgium","institution_ids":["https://openalex.org/I149768937"]},{"raw_affiliation_string":"[University of Namur]","institution_ids":["https://openalex.org/I149768937"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042551774","display_name":"A. Mounji","orcid":null},"institutions":[{"id":"https://openalex.org/I149768937","display_name":"University of Namur","ror":"https://ror.org/03d1maw17","country_code":"BE","type":"education","lineage":["https://openalex.org/I149768937"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Abdelaziz Mounji","raw_affiliation_strings":["Institut d'Informatique, University of Namur, 21, Rue Grandgagnage, B-5000, Namur, Belgium","[University of Namur]"],"affiliations":[{"raw_affiliation_string":"Institut d'Informatique, University of Namur, 21, Rue Grandgagnage, B-5000, Namur, Belgium","institution_ids":["https://openalex.org/I149768937"]},{"raw_affiliation_string":"[University of Namur]","institution_ids":["https://openalex.org/I149768937"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045291734","display_name":"Isabelle Mathieu","orcid":null},"institutions":[{"id":"https://openalex.org/I91993116","display_name":"Sirris","ror":"https://ror.org/01qr26m26","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I91993116"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Isabelle Mathieu","raw_affiliation_strings":["Siemens-Nixdorf Software S.A., 11, rue de Neverl\u00e9e, B-5080, Rhisnes, Belgium","Siemens-Nixdorf Software S.A"],"affiliations":[{"raw_affiliation_string":"Siemens-Nixdorf Software S.A., 11, rue de Neverl\u00e9e, B-5080, Rhisnes, Belgium","institution_ids":["https://openalex.org/I91993116"]},{"raw_affiliation_string":"Siemens-Nixdorf Software S.A","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078163685"],"corresponding_institution_ids":["https://openalex.org/I149768937"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.3304,"has_fulltext":false,"cited_by_count":90,"citation_normalized_percentile":{"value":0.87261632,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"435","last_page":"450"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8541196584701538},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6535530686378479},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.6401511430740356},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.6339895725250244},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5923349857330322},{"id":"https://openalex.org/keywords/audit-trail","display_name":"Audit trail","score":0.5647149085998535},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5490666627883911},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5206927061080933},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4609987735748291},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43252095580101013},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.34839266538619995},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19487544894218445},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.09161990880966187}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8541196584701538},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6535530686378479},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.6401511430740356},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.6339895725250244},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5923349857330322},{"id":"https://openalex.org/C80958533","wikidata":"https://www.wikidata.org/wiki/Q1047174","display_name":"Audit trail","level":3,"score":0.5647149085998535},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5490666627883911},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5206927061080933},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4609987735748291},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43252095580101013},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.34839266538619995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19487544894218445},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.09161990880966187},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/bfb0013912","is_oa":false,"landing_page_url":"https://doi.org/10.1007/bfb0013912","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.55.247","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.247","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ftp://ftp.info.fundp.ac.be/pub/users/amo/papers/esorics92.ps.Z","raw_type":"text"},{"id":"pmh:oai:dial.uclouvain.be:boreal:101949","is_oa":false,"landing_page_url":"http://hdl.handle.net/2078.2/101949","pdf_url":null,"source":{"id":"https://openalex.org/S4306400166","display_name":"Digital Access to Libraries","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800384882","host_organization_name":"Harris County Public Library","host_organization_lineage":["https://openalex.org/I2800384882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lecture Notes in Computer Science, Vol. 648, p. 435-450 (1992)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:pure.unamur.be:openaire_cris_publications/77d42c2b-1520-47c3-bcc0-05f94c4f46c7","is_oa":false,"landing_page_url":"https://researchportal.unamur.be/en/publications/77d42c2b-1520-47c3-bcc0-05f94c4f46c7","pdf_url":null,"source":{"id":"https://openalex.org/S4406922457","display_name":"Repository of the University of Namur","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Habra, N, Le Charlier, B, Mounji, A & Mathieu, I 1992, Asax : Software architecture and rule-based language for universal audit trail analysis. in J-J Quisquater, G Eizenberg & Y Deswarte (eds), Computer Security - ESORICS 1992 - 2nd European Symposium on Research in Computer Security, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 648 LNCS, Springer Verlag, pp. 435-450, 2nd European Symposium on Research in Computer Security, ESORICS 1992, Toulouse, France, 23/11/92.","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1913306154","https://openalex.org/W2086267700","https://openalex.org/W2098780004","https://openalex.org/W2125730508","https://openalex.org/W2150847526","https://openalex.org/W2153363952","https://openalex.org/W3214373139","https://openalex.org/W4248932050","https://openalex.org/W4285719527","https://openalex.org/W6639720596","https://openalex.org/W6674878267","https://openalex.org/W6679026589"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W4240977217","https://openalex.org/W3036524962","https://openalex.org/W2124184151","https://openalex.org/W2750461430","https://openalex.org/W2487194309","https://openalex.org/W2948428544","https://openalex.org/W2374959091","https://openalex.org/W2079105056"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
