{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:20Z","timestamp":1725475820582},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_1","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"1-17","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Spalka","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Armin B.","family":"Cremers","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hartmut","family":"Lehmler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Bell, D.E., La Padula, L.J.: Secure computer system: Unified exposition and multics interpretation. MITRE Technical Report 2997. MITRE Corp, Bedford, MA (1975)","DOI":"10.21236\/ADA023588"},{"key":"1_CR2","unstructured":"Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison-Wesley, Wokingham (1994)"},{"issue":"4","key":"1_CR3","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/361284.361287","volume":"15","author":"R.W. Conway","year":"1972","unstructured":"Conway, R.W., Maxwell, W.L., Morgan, H.L.: On the Implementation of Security Measures in Information Systems. CACM\u00a015(4), 211\u2013220 (1972)","journal-title":"CACM"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Feiertag, R.J., Levitt, K.N., Robinson, L.: Proving multilevel security of a system design. In: 6th ACM Symposium on Operating System Principles. ACM SIGOPS Operating System Review, vol.\u00a011(5), pp. 57\u201365 (1977)","DOI":"10.1145\/800214.806547"},{"issue":"5","key":"1_CR5","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1145\/363095.363146","volume":"11","author":"R.M. Graham","year":"1968","unstructured":"Graham, R.M.: Protection in an Information Processing Utility. CACM\u00a011(5), 365\u2013369 (1968)","journal-title":"CACM"},{"issue":"2","key":"1_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/356546.356548","volume":"1","author":"L.J. Hoffman","year":"1969","unstructured":"Hoffman, L.J.: Computers and Privacy: A Survey. ACM CS\u00a01(2), 85\u2013103 (1969)","journal-title":"ACM CS"},{"issue":"3","key":"1_CR7","first-page":"247","volume":"13","author":"C.E. Landwehr","year":"1981","unstructured":"Landwehr, C.E.: Formal Models for Computer Security. ACMCS\u00a013(3), 247\u2013278 (1981)","journal-title":"ACMCS"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:42:11Z","timestamp":1556005331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/10718964_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}