{"version.version":"0.0.7","version.cm_url":"https://github.com/ceurws/ceur-spt","spt.html_url":"/Vol-1158/paper1.html","spt.description":null,"spt.id":"Vol-1158/paper1","spt.wikidataid":null,"spt.title":"Extraction of Insider Attack Scenarios from a Formal Information System Modeling","spt.pdfUrl":"https://ceur-ws.org/Vol-1158/paper1.pdf","spt.volume":{"number":1158,"acronym":"FMS 2014","wikidataid":"Q113544881","title":"Proceedings of the Formal Methods for Security Workshop","description":"Proceedings of FMS 2014 workshop","url":"http://ceur-ws.org/Vol-1158/","date":"2014-06-24","dblp":"conf/apn/2014fms","k10plus":"1016498306","urn":"urn:nbn:de:0074-1158-8"},"spt.session":null,"cvb.id":"Vol-1158/paper1","cvb.title":"Extraction of Insider Attack Scenarios from a Formal Information System Modeling","cvb.type":null,"cvb.position":null,"cvb.pagesFrom":null,"cvb.pagesTo":null,"cvb.authors":"","cvb.vol_number":"1158","cvb.pdf_name":"paper1.pdf","cvb.pages":"5-19","cvb.fail":null,"dblp.dblp_publication_id":"https://dblp.org/rec/conf/apn/RadhouaniILR14","dblp.dblp_proceeding_id":"https://dblp.org/rec/conf/apn/2014fms","dblp.volume_number":1158,"dblp.title":"Extraction of Insider Attack Scenarios from a Formal Information System Modeling.","dblp.authors":[{"dblp_author_id":"https://dblp.org/pid/06/7130","label":"Narjes Ben Rajeb","wikidata_id":null,"orcid_id":null,"gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/l/YvesLedru","label":"Yves Ledru","wikidata_id":null,"orcid_id":"0000-0002-0632-030X","gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/i/AkramIdani","label":"Akram Idani","wikidata_id":null,"orcid_id":"0000-0003-2267-3639","gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/137/1698","label":"Amira Radhouani","wikidata_id":null,"orcid_id":null,"gnd_id":null}],"dblp.pdf_id":"Vol-1158/paper1"}