{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T16:40:02Z","timestamp":1736008802790,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540289487"},{"type":"electronic","value":"9783540319764"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11555223_16","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:44:10Z","timestamp":1127832250000},"page":"140-148","source":"Crossref","is-referenced-by-count":1,"title":["Environmentally-Aware Security Enforcement (EASE) for Cooperative Design and Engineering"],"prefix":"10.1007","author":[{"given":"Larry","family":"Korba","sequence":"first","affiliation":[]},{"given":"Yuefei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ronggong","family":"Song","sequence":"additional","affiliation":[]},{"given":"George","family":"Yee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Fuchs, L., Geyr, W., Richter, H., Poltrock, S., Frauenhofer, T., Daijavad, S.: Enabling intercompany team Collaboration. Enabling Technologies: Infrastructure for Collaborative Enterprises. In: Proceeding tenth IEEE International Workshop on WET ICE 2001, Cambridge, June 20-22, pp. 374\u2013379 (2001)","DOI":"10.1109\/ENABL.2001.953447"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Xu, Y., Song, R., Korba, L., Wang, L., Shen, W., Lang, S.: Distributed Device Networks with Security Constraints. IEEE Transactions on Industrial Informatics (2005) (Accepted)","DOI":"10.1109\/TII.2005.843826"},{"key":"16_CR3","unstructured":"Shen, W., Lang, S., Korba, L., Wang, L., Wong, B.: Reference Architecture for Internet Based Intelligent Shop Floors. In: Proceedings of the SPIE International Conference on Network Intelligence: Internet-Based Manufacturing, Vol. 4208, pp. 63-72 (2000)"},{"key":"16_CR4","unstructured":"Wang, L., Song, H., Cunningham, A.: Development of Wise-ShopFloor for Web-based Monitoring and Control, Technical Report from the Integrated Manufacturing Technology Institute, National Research Council of Canada, IMTI-TR-023 (2004\/02), 41 p. (January 2004)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"McDaniel, P., Prakash, A.: A flexible architecture for security policy enforcement. In: Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, April 2003, vol.\u00a02, pp. 234\u2013239 (2003)","DOI":"10.1109\/DISCEX.2003.1194971"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Wolthusen, S.D.: Security Policy Enforcement at the file system level in the Windows NT operating system family. In: Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, December 10-14 (2001)","DOI":"10.1109\/ACSAC.2001.991521"},{"issue":"1","key":"16_CR7","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable Security Policies. ACM Transactions on Information and System Security (TISSEC)\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A context-aware security architecture for emerging applications. In: Proc. of the 18th annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, December 9-13, pp. 249\u2013258 (2003)","DOI":"10.1109\/CSAC.2002.1176296"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Temdee, P., Korba, L.: Of Networks, Interactions and Agents: An Approach for Social Network Analysis. In: Proc. 6th International Conference on CSCW in Design, London, Ontario, July 12-14 (2001)","DOI":"10.1109\/CSCWD.2001.942280"}],"container-title":["Lecture Notes in Computer Science","Cooperative Design, Visualization, and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11555223_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T15:58:24Z","timestamp":1736006304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11555223_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540289487","9783540319764"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11555223_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}