{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:34:15Z","timestamp":1742992455181,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540410317"},{"type":"electronic","value":"9783540452997"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10722599_2","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T11:41:21Z","timestamp":1167478881000},"page":"17-36","source":"Crossref","is-referenced-by-count":22,"title":["Verification of a Formal Security Model for Multiapplicative Smart Cards"],"prefix":"10.1007","author":[{"given":"Gerhard","family":"Schellhorn","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wolfgang","family":"Reif","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Axel","family":"Schairer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paul","family":"Karger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vernon","family":"Austel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Toll","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Badger, L., Sterne, D.F., Sherman, D.L., Walker, K.M., Haghighat, S.A.: Practical domain and type enforcement for UNIX. In: 1995 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 66\u201377 (May 1995), http:\/\/www.tis.com\/docs\/research\/secure\/secure_dte_Proj2.html"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure Computer Sytems: Unified Exposition and Multics Interpretation. Technical Report ESD\u2013TR\u201375\u2013306, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA (March 1976), http:\/\/csrc.nist.gov\/publications\/history\/bell76.pdf","DOI":"10.21236\/ADA023588"},{"key":"2_CR3","unstructured":"Biba, K.J.: Integrity Considerations for Secure Computer Sytems. Technical Report ESD\u2013TR\u201376\u2013372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA (April 1977)"},{"key":"2_CR4","unstructured":"Boebert, W.E., Kain, R.Y.: A practical alternative to hierarchical integrity policies. In: 8th National Computer Security Conf., Gaithersburg, MD, pp. 18\u201327. National Computer Security Center and National Bureau of Standards (1985)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48257-1","volume-title":"Applied Formal Methods - FM-Trends 98","author":"D. Hutter","year":"1999","unstructured":"Hutter, D., Mantel, H., Rock, G., Stephan, W., Wolpers, A., Balser, M., Reif, W., Schellhorn, G., Stenzel, K.: Vse: Controlling the complexity in formal software developments. In: Hutter, D., Traverso, P. (eds.) FM-Trends 1998. LNCS, vol.\u00a01641. Springer, Heidelberg (1999)"},{"key":"2_CR6","unstructured":"Identification cards - identification cards - interrelated circuit(s) cards with contacts - part 4: Inter-industry commands for interchange. ISO\/IEC 7816-4, International Standards Organization (1995)"},{"key":"2_CR7","unstructured":"Information technology - security techniques \u2013 evaluation criteria for IT security. ISO\/IEC 15408, International Standards Organization (1999), http:\/\/csrc.nist.gov\/cc"},{"key":"2_CR8","unstructured":"ITSEC. Information Technology Security Evaluation Criteria, Version 1.2. Office for Official Publications of the European Communities, Brussels, Belgium (1991)"},{"key":"2_CR9","unstructured":"Karger, P.A., Austel, V., Toll, D.: A new mandatory security policy combining secrecy and integrity. RC 21717, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, March 15 (2000), http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/home"},{"key":"2_CR10","unstructured":"Karger, P.A., Austel, V., Toll, D.: Using a mandatory secrecy and integrity policy on smart cards and mobile devices. In (EUROSMART) Security Conference, Marseille, France, June 13-15, pp. 134\u2013148 (June 2000), RC 21736, Available at http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/home"},{"key":"2_CR11","unstructured":"Koob, F., Ullmann, M., Wittmann, S., Schellhorn, G., Reif, W., Schairer, A., Stephan, W.: A generic security model for multiapplicative smart cards \u2013 final report of the SMaCOS project (to appear as BSI report)"},{"key":"2_CR12","unstructured":"Lunt, T.F., Neumann, P.G., Denning, D., Schell, R.R., Heckman, M., Shockley, W.R.: Secure distributed data views \u2013 vol.1: Security policy and policy interpretation for a class A1 multilevel secure. Technical Report SRI-CSL-88-8, SRI International, Menlo Park, CA (August 1988)"},{"key":"2_CR13","volume-title":"Encyclopedia of Software Engineering","author":"J. McLean","year":"1994","unstructured":"McLean, J.: Security models. In: Marciniak, J. (ed.) Encyclopedia of Software Engineering. Wiley & Sons, Chichester (1994), http:\/\/chacs.nrl.navy.mil\/publications\/CHACS"},{"key":"2_CR14","volume-title":"The Multics System: An Examination of Its Structure","author":"E.I. Organick","year":"1972","unstructured":"Organick, E.I.: The Multics System: An Examination of Its Structure. The MIT Press, Cambridge (1972)"},{"key":"2_CR15","unstructured":"Philips semiconductors and IBM research to co-develop secure smart cards: Highly secure operating system and processor, suitable for multiple applications (February 1999), http:\/\/www.semiconductors.philips.com\/news\/content\/file_384.html"},{"key":"2_CR16","unstructured":"Rushby, J.: Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International, Menlo Park, CA, (1992), http:\/\/www.csl.sri.com\/~rushby\/reports\/csl-92-2.dvi.Z"},{"key":"2_CR17","unstructured":"Schell, R., Tao, T.F., Heckman, M.: Desingning the GEMSOS security kernel for security and performance. In: 8th National Computer Security Conference, Gaithersburg, MD, 30 September - 3 October, pp. 108\u2013119. DoD Computer Security Center and National Bureau of Standards (1985)"},{"key":"2_CR18","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/SP.1981.10007","volume-title":"1981 Symposium on Security and Privacy","author":"L.J. Shirley","year":"1981","unstructured":"Shirley, L.J., Schell, R.R.: Mechanism sufficiency validation by assignment. In: 1981 Symposium on Security and Privacy, Oakland, CA, April 27-29, pp. 26\u201332. IEEE Computer Society, Los Alamitos (1981)"},{"key":"2_CR19","unstructured":"Sterne, D.F., Benson, G.S.: The controlled application set paradigm for trusted systems. In: 1995 National Information Systems Security Conference, Baltimore, Maryland. National Computer Security Center and National Institute of Standards and Technology (1995), http:\/\/www.tis.com\/docs\/research\/secure\/secure_dte_proj2.html"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2000"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10722599_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T15:23:58Z","timestamp":1587309838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10722599_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540410317","9783540452997"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/10722599_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}