{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:23Z","timestamp":1725490523712},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_21","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T09:47:02Z","timestamp":1188294422000},"page":"277-291","source":"Crossref","is-referenced-by-count":3,"title":["The Role of the Development Process in Operating System Security"],"prefix":"10.1007","author":[{"given":"Christian","family":"Payne","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"issue":"11","key":"21_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R. Anderson","year":"1994","unstructured":"Ross Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32\u201340, November 1994.","journal-title":"Communications of the ACM"},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R. Baskerville","year":"1993","unstructured":"Richard Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4):375\u2013414, 1993.","journal-title":"ACM Computing Surveys"},{"key":"21_CR3","unstructured":"David E. Bell and Leonard J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, Mitre Corporation, Bedford, MA, 1973."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Silvana Castano, Giancarlo Martella, and Pierangela Samarati. A new approach to security system development. In Proceedings of the 1994 ACM SIGSAC on New Security Paradigms Workshop, pages 82\u201388, 1994.","DOI":"10.1109\/NSPW.1994.656236"},{"issue":"7","key":"21_CR5","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/129902.129907","volume":"35","author":"S. Chokhani","year":"1992","unstructured":"Santosh Chokhani. Trusted products evaluation. Communications of the ACM, 35(7):64\u201376, 1992.","journal-title":"Communications of the ACM"},{"key":"21_CR6","unstructured":"Simson Garfinkel and Eugene Spafford. Practical Unix and Internet Security. O'Reilly & Associates, second edition, 1996."},{"issue":"3","key":"21_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/85.601735","volume":"19","author":"D. Mackenzie","year":"1997","unstructured":"Donald Mackenzie and Garrell Pottinger. Mathematics, technology, and trust: Formal verification, computer security and the U.S. military. IEEE Annals of the History of Computing, 19(3):41\u201359, 1997.","journal-title":"IEEE Annals of the History of Computing"},{"issue":"2","key":"21_CR8","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/0020-0190(85)90065-1","volume":"20","author":"J. McLean","year":"1985","unstructured":"John McLean. A comment on the \u201cBasic Security Theorem\u201d of Bell and LaPadula. Information Processing Letters, 20(2):67\u201370, 1985.","journal-title":"Information Processing Letters"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0164-1212(94)00086-3","volume":"31","author":"D. N. J. Mostert","year":"1995","unstructured":"D. N. J. Mostert and S. H. von Solms. A technique to include computer security, safety, and resilience requirements as part of the requirements specification. Journal of Systems Software, 31:45\u201353, 1995.","journal-title":"Journal of Systems Software"},{"key":"21_CR10","unstructured":"National Computer Security Center. NCSC-TG-002 Trusted Product Evaluations-A Guide for Vendors, 22 June 1990. \u201cBright Blue Book\u201d, Available Online: \n                    http:\/\/www.radium.ncsc.mil\/tpep\/library\/rainbow\/NCSC-TG-002.html"},{"key":"21_CR11","unstructured":"Peter G. Neumann. Architectures and formal representations for secure systems. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, 2 October 1995. SRI Project 6401, Prepared for the US Department of Defense."},{"key":"21_CR12","unstructured":"Christian Payne. Security Through Design as a Paradigm for Systems Development, 1999. Murdoch University, Perth, Western Australia."},{"key":"21_CR13","unstructured":"Charles P. Pfleeger. Security in Computing. Prentice-Hall, Upper Saddle River, New Jersey, 1997."},{"key":"21_CR14","unstructured":"Deborah Russell and G. T. Gangemi Sr. Computer Security Basics. O'Reilly & Associates, 1992."},{"key":"21_CR15","unstructured":"Bruce Schneier. Why cryptography is harder than it looks. Online: \n                    http:\/\/www.counterpane.com\/whycrypto.html\n                    \n                  , 1997."},{"key":"21_CR16","unstructured":"SecurityFocus.Com. BUGTRAQ VulDB Stats. Online: \n                    http:\/\/www.securityfocus.com\/vdb\/stats.html\n                    \n                  , May 2000."},{"key":"21_CR17","unstructured":"U. S. Department of Defense, Washington, D. C. Trusted Computer System Evaluation Criteria, 1985. DOD 5200.28-STD."},{"key":"21_CR18","unstructured":"Chenxi Wang and William A. Wulf. Towards a framework for security measurement. In Proceedings of the 20th National Information Systems Security Conference, pages 522\u2013533, 1997."},{"key":"21_CR19","unstructured":"J. L. Whitten, L. D. Bentley, and V. M. Barlow. Systems Analysis and Design Methods. Irwin, 1994."},{"key":"21_CR20","unstructured":"Hans U. Zoebelein. The Internet operating system counter. Online: \n                    http:\/\/leb.net\/hzo\/ioscount\/\n                    \n                  , April 1999."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T22:51:30Z","timestamp":1550875890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}