{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:27:24Z","timestamp":1725460044077},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402080692"},{"type":"electronic","value":"9781402080708"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8070-0_26","type":"book-chapter","created":{"date-parts":[[2006,3,2]],"date-time":"2006-03-02T03:21:25Z","timestamp":1141269685000},"page":"358-371","source":"Crossref","is-referenced-by-count":3,"title":["FlexFlow: A Flexible Flow Control Policy Specification Framework"],"prefix":"10.1007","author":[{"given":"Shiping","family":"Chen","sequence":"first","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/BF02341854","volume":"8","author":"C. Baral","year":"1992","unstructured":"C. Baral and V.S. Subrahmanian. Stable and extension class theory for logic programs and default theories. Journal of Automated Reasoning, 8:345\u2013366, 1992.","journal-title":"Journal of Automated Reasoning"},{"key":"26_CR2","volume-title":"Report M74-244","author":"D.E. Bell","year":"1975","unstructured":"D.E. Bell and L.J. LaPadula. Secure computer systems: Mathematical foundations and model. Report M74-244, Mitre Corp., Bedford, MA, 1975."},{"key":"26_CR3","volume-title":"Report ISE-TR-03-04","author":"S. Chen","year":"2003","unstructured":"S. Chen, D. Wijesekera, and S. Jajodia. Flexflow: A flexible flow control policy specification framework. Report ISE-TR-03-04, Center for Secure Information Systems, Fairfax, VA, 2003."},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"D.E. Denning. A lattice model of secure information flow. Communication of ACM, pages 236\u2013243, May 1976.","DOI":"10.1145\/360051.360056"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia. Providing flexibility in information flow control for object-oriented systems. In Proceedings of the IEEE Symposium on Security and Privacy, pages 130\u2013140, Oakland, CA, May 1997. IEEE.","DOI":"10.1109\/SECPRI.1997.601328"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"S.N. Foley. A model for secure information flow. In Proceedings of the IEEE symposium on Security and Privacy, Oakland, CA, May 1989.","DOI":"10.1109\/SECPRI.1989.36299"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"A. V. Gelder. The alternating fixpoint of logic programs with negation. In Proc. 8th ACM Symposium on Principles of Database Systems, pages 1\u201310, 1989.","DOI":"10.1145\/73721.73722"},{"key":"26_CR8","unstructured":"M. Gelfond and V. Lifschitz. The stable model semantics for logic programming. In Proc. Fifth International Conference and Symposium on Logic Programming, pages 1070\u20131080, 1988."},{"issue":"4","key":"26_CR9","first-page":"1","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(4): 1\u201357, June 2001.","journal-title":"ACM Transactions on Database Systems"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"C.J. McCollum, J.R. Messing, and L. Notargiacomo. Beyond the pale of mac and dac-defining new forms of access control. In Proceedings of the IEEE symposium on Security and Privacy, pages 190\u2013200, Oakland, CA, May 1990.","DOI":"10.1109\/RISP.1990.63850"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"A.C. Myers and B. Liskov. A decentralized model for information flow control. In Proceedings of the 16th ACM Symposium on Operating System Principles, pages 129\u2013142, Saint-Malo, France, October 1997.","DOI":"10.1145\/268998.266669"},{"issue":"4","key":"26_CR12","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/69.617048","volume":"9","author":"P. Samarati","year":"1997","unstructured":"P. Samarati, E. Bertino, A. Ciampichetti, and S. Jajodia. Information flow control in object-oriented systems. IEEE Transactions on Knowledge and Data Engineering, 9(4):524\u2013538, July\u2013Aug. 1997.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["IFIP International Federation for Information Processing","Data and Applications Security XVII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8070-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,9]],"date-time":"2019-02-09T16:33:21Z","timestamp":1549730001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8070-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402080692","9781402080708"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8070-0_26","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}