{"id":"https://openalex.org/W2018293368","doi":"https://doi.org/10.1145/1978672.1978679","title":"Adversaries' Holy Grail","display_name":"Adversaries' Holy Grail","publication_year":2011,"publication_date":"2011-04-10","ids":{"openalex":"https://openalex.org/W2018293368","doi":"https://doi.org/10.1145/1978672.1978679","mag":"2018293368"},"language":"en","primary_location":{"id":"doi:10.1145/1978672.1978679","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1978672.1978679","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040348286","display_name":"Ian Molloy","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ian Molloy","raw_affiliation_strings":["IBM T. J. Watson Research Center"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105652031","display_name":"Jorge Lobo","orcid":"https://orcid.org/0000-0002-9438-0926"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jorge Lobo","raw_affiliation_strings":["IBM T. J. Watson Research Center"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048460582","display_name":"Suresh T. Chari","orcid":"https://orcid.org/0000-0002-3924-0971"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Suresh Chari","raw_affiliation_strings":["IBM T. J. Watson Research Center"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040348286"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.6727,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.93545402,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"54","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7854943871498108},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5784590840339661},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5368298888206482},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.49878716468811035},{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.4817521572113037},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47636672854423523},{"id":"https://openalex.org/keywords/holy-grail","display_name":"Holy Grail","score":0.4620389938354492},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44037947058677673},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4156178832054138},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25713157653808594},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1313745379447937}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7854943871498108},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5784590840339661},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5368298888206482},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.49878716468811035},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.4817521572113037},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47636672854423523},{"id":"https://openalex.org/C2781270358","wikidata":"https://www.wikidata.org/wiki/Q5885594","display_name":"Holy Grail","level":2,"score":0.4620389938354492},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44037947058677673},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4156178832054138},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25713157653808594},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1313745379447937},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1978672.1978679","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1978672.1978679","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8737583805","display_name":null,"funder_award_id":"W911NF-06-3-0001","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1503729935","https://openalex.org/W1953294450","https://openalex.org/W1969134774","https://openalex.org/W1974136169","https://openalex.org/W2000107752","https://openalex.org/W2015653806","https://openalex.org/W2043146366","https://openalex.org/W2043978338","https://openalex.org/W2061161497","https://openalex.org/W2103317919","https://openalex.org/W2117420919","https://openalex.org/W2138683527","https://openalex.org/W2141752622","https://openalex.org/W2150442700","https://openalex.org/W2161358272","https://openalex.org/W2163328802","https://openalex.org/W2164673530","https://openalex.org/W4255318870"],"related_works":["https://openalex.org/W1992504775","https://openalex.org/W2047186275","https://openalex.org/W1683803069","https://openalex.org/W2376892350","https://openalex.org/W2989678130","https://openalex.org/W2894577536","https://openalex.org/W2922255436","https://openalex.org/W3169554999","https://openalex.org/W3211902071","https://openalex.org/W2490016826"],"abstract_inverted_index":{"The":[0,30,102],"analysis":[1,77],"of":[2,32,41,88,110,114,141],"access":[3,49,63],"control":[4,50,64],"data":[5,51,132],"has":[6,52],"many":[7,81],"applications":[8],"in":[9,20,34,73,83],"information":[10],"security,":[11],"including:":[12],"role":[13],"mining":[14],"and":[15,27,66,86,93,100,112,164,169],"policy":[16],"learning;":[17],"discovering":[18],"errors":[19],"deployed":[21],"policies;":[22],"regulatory":[23],"compliance;":[24],"intrusion":[25],"detection;":[26],"risk":[28],"mitigation.":[29],"success":[31],"research":[33,168],"these":[35],"areas":[36],"hinges":[37],"on":[38,123,129,154,162,172],"the":[39,56,84,91,130,139,144],"availability":[40],"high":[42],"quality":[43],"real-world":[44,176],"data.":[45,177],"Thus":[46],"far,":[47],"little":[48],"been":[53],"released":[54,62],"to":[55,120,134],"public.":[57],"We":[58,148],"analyze":[59,138],"eight":[60],"publicly":[61],"datasets":[65,104,146,156],"contrast":[67],"them":[68],"with":[69,175],"three":[70],"client":[71,94,103],"policies":[72],"our":[74,173],"possession.":[75],"Our":[76],"indicates":[78],"there":[79],"are":[80],"differences":[82],"structure":[85],"distribution":[87,140],"permissions":[89],"between":[90],"public":[92,131,145],"datasets,":[95],"including":[96],"sparseness,":[97],"permission":[98],"distributions,":[99],"cohesion.":[101],"also":[105],"revealed":[106],"a":[107],"wide":[108],"range":[109],"semantics":[111],"granularities":[113],"permissions,":[115],"ranging":[116],"from":[117],"application-specific":[118],"rights":[119],"general":[121],"accounts":[122],"systems":[124],"we":[125,137],"could":[126],"not":[127,158],"observe":[128],"due":[133],"anonymization.":[135],"Finally,":[136],"user-attributes,":[142],"which":[143],"lack.":[147],"find":[149],"techniques":[150],"that":[151],"work":[152,159],"well":[153,161],"some":[155],"do":[157],"equally":[160],"others":[163],"discuss":[165],"possible":[166],"future":[167],"directions":[170],"based":[171],"experience":[174]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
