{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:06:38Z","timestamp":1699833998741},"reference-count":6,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2006,10,27]],"date-time":"2006-10-27T00:00:00Z","timestamp":1161907200000},"content-version":"vor","delay-in-days":11349,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1975,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Within a programmed system, we may distinguish between different kinds of information in order to control the use of each kind by separate security policies, where each policy is tailored to the sensitivity and desired dissemination of that one kind of information. This paper analyses the implications of implementing security policies and describes mechanisms which can be used as the basis for constructing operating systems with the desired security attributes.<\/jats:p>","DOI":"10.1002\/spe.4380050403","type":"journal-article","created":{"date-parts":[[2006,11,17]],"date-time":"2006-11-17T13:54:44Z","timestamp":1163771684000},"page":"321-336","source":"Crossref","is-referenced-by-count":24,"title":["Towards the design of secure systems"],"prefix":"10.1002","volume":"5","author":[{"given":"Anita K.","family":"Jones","sequence":"first","affiliation":[]},{"given":"William A.","family":"Wulf","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,27]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365252"},{"key":"e_1_2_1_3_2","first-page":"27","volume-title":"Dynamic protection structures","author":"Lampson B. W.","year":"1969"},{"key":"e_1_2_1_4_2","first-page":"437","volume-title":"Protection","author":"Lampson B. W.","year":"1971"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361070"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/355616.364017"},{"key":"e_1_2_1_7_2","unstructured":"A. K.Jones.Protection in Programmed Systems Carnegie\u2010Mellon University Computer Science Department Report Ph. D. thesis 1973."}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380050403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380050403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T05:54:27Z","timestamp":1699768467000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380050403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1975,10]]},"references-count":6,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1975,10]]}},"alternative-id":["10.1002\/spe.4380050403"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380050403","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1975,10]]}}}