{"id":"https://openalex.org/W2313304369","doi":"https://doi.org/10.1109/atnac.2015.7366799","title":"Protecting services from security mis-configuration","display_name":"Protecting services from security mis-configuration","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2313304369","doi":"https://doi.org/10.1109/atnac.2015.7366799","mag":"2313304369"},"language":"en","primary_location":{"id":"doi:10.1109/atnac.2015.7366799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/atnac.2015.7366799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069557219","display_name":"Nabeel Hadaad","orcid":null},"institutions":[{"id":"https://openalex.org/I35906937","display_name":"University of Misan","ror":"https://ror.org/05b5sds65","country_code":"IQ","type":"education","lineage":["https://openalex.org/I35906937"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Nabeel Hadaad","raw_affiliation_strings":["Faculty of Education, Misan University, Iraq"],"affiliations":[{"raw_affiliation_string":"Faculty of Education, Misan University, Iraq","institution_ids":["https://openalex.org/I35906937"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042418701","display_name":"Lauren Drury","orcid":"https://orcid.org/0000-0003-3309-5133"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Luke Drury","raw_affiliation_strings":["Infrastructure Services, University of Southern Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"Infrastructure Services, University of Southern Queensland, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071557744","display_name":"Ron Addie","orcid":"https://orcid.org/0000-0002-6664-8462"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ronald G. Addie","raw_affiliation_strings":["Computational and Environmental Science, University of Southern Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"Computational and Environmental Science, University of Southern Queensland, Australia","institution_ids":["https://openalex.org/I185523456"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069557219"],"corresponding_institution_ids":["https://openalex.org/I35906937"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68480158,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"16","issue":null,"first_page":"120","last_page":"125"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.722347617149353},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.7220893502235413},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7047044038772583},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6558713316917419},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5721042156219482},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.534119188785553},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.48791906237602234},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.47729551792144775},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.27466779947280884},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1703808605670929}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.722347617149353},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.7220893502235413},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7047044038772583},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6558713316917419},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5721042156219482},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.534119188785553},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.48791906237602234},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.47729551792144775},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.27466779947280884},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1703808605670929},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/atnac.2015.7366799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/atnac.2015.7366799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W170020907","https://openalex.org/W1482261514","https://openalex.org/W1492689271","https://openalex.org/W1493691219","https://openalex.org/W1581651736","https://openalex.org/W1831889228","https://openalex.org/W1972777832","https://openalex.org/W1973917827","https://openalex.org/W1981058821","https://openalex.org/W1985325392","https://openalex.org/W1989778648","https://openalex.org/W2010365467","https://openalex.org/W2012419258","https://openalex.org/W2012959900","https://openalex.org/W2013539581","https://openalex.org/W2021859872","https://openalex.org/W2036910349","https://openalex.org/W2050398201","https://openalex.org/W2065535821","https://openalex.org/W2089513810","https://openalex.org/W2107836699","https://openalex.org/W2117826841","https://openalex.org/W2122049982","https://openalex.org/W2132573216","https://openalex.org/W2138623315","https://openalex.org/W2144338762","https://openalex.org/W2149140802","https://openalex.org/W2160207938","https://openalex.org/W2165892480","https://openalex.org/W2170180420","https://openalex.org/W6629318960","https://openalex.org/W6629537596"],"related_works":["https://openalex.org/W2188814192","https://openalex.org/W2151761340","https://openalex.org/W1519114293","https://openalex.org/W2111277540","https://openalex.org/W2173238669","https://openalex.org/W2114705216","https://openalex.org/W2130339907","https://openalex.org/W2375663084","https://openalex.org/W2095363643","https://openalex.org/W1829795994"],"abstract_inverted_index":{"It":[0],"is":[1,28,34,97],"understood":[2],"that":[3,116,124],"ICT":[4],"security":[5,39,112],"can":[6,50,86,126],"be":[7,87],"defined":[8],"and":[9,22,58,83,89,102,136],"enforced":[10,88],"through":[11],"rules.":[12],"In":[13],"this":[14,63],"paper,":[15],"the":[16,77,108,128,131],"concept":[17,92],"of":[18,31,75,80,93,110,130],"rules":[19,40,81,119],"which":[20,49],"define":[21],"ensure":[23],"users'":[24],"access":[25],"to":[26,52,56,61,106],"services":[27],"introduced.":[29,98],"Examples":[30],"how":[32,76],"service":[33,57,84,94,117],"hindered":[35],"by":[36,114,134],"otherwise":[37],"sensible":[38],"are":[41,46,120],"presented.":[42],"Service":[43],"protection":[44,95,118],"policies":[45,96],"then":[47],"described":[48],"help":[51],"prevent":[53],"these":[54,125],"compromises":[55],"assist":[59],"us":[60],"measure":[62],"impact":[64],"where":[65],"it":[66],"occurs.":[67],"These":[68],"examples":[69],"include":[70],"demonstration":[71],"in":[72,104],"some":[73],"cases":[74],"combined":[78],"collection":[79],"(security":[82],"protection)":[85],"maintained.":[90],"The":[91],"We":[99,122],"use":[100],"ns3":[101],"Click":[103],"simulations":[105],"check":[107],"consistency":[109],"aggregate":[111],"policy":[113],"checking":[115],"valid.":[121],"show":[123],"improve":[127],"performance":[129],"network":[132,138],"experienced":[133],"users":[135],"increase":[137],"security.":[139]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
