{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T07:44:43Z","timestamp":1749023083332,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656630"},{"type":"electronic","value":"9783540491354"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49135-x_11","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T17:12:26Z","timestamp":1179767546000},"page":"67-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Application-Oriented Security Policies and Their Composition"],"prefix":"10.1007","author":[{"given":"Virgil D.","family":"Gligor","sequence":"first","affiliation":[]},{"given":"Serban I.","family":"Gavrila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"11_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Stepwise Refinement of Distributed Systems","author":"M. Abadi","year":"1990","unstructured":"M. Abadi, L. Lamport: Composing specifications. In J. W. de Bakker, W. P. de Roever, G. Rosenberg (eds).: Stepwise Refinement of Distributed Systems. Lecture Notes in Computer Science, Vol. 430, Springer-Verlag, Berlin Heidelberg New York, 1990."},{"issue":"4","key":"11_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/0020-0190(85)90056-0","volume":"21","author":"B. Alpern","year":"1985","unstructured":"B. Alpern, F. Schneider: Defining Liveness. Information Processing Letters, vol. 21, no. 4, October 1985, pp. 181\u2013185.","journal-title":"Information Processing Letters"},{"key":"11_CR3","unstructured":"Common Criteria for Information Technology Security Evaluation, Version 2.0 Draft, GISA, NNCSA, CESG, NIST, NSA, December 1997."},{"key":"11_CR4","volume":"1","year":"1992","unstructured":"Federal Criteria for Information Technology Security, Vol. 1, Chapter 3 and Appendix Version 1.0, NIST, NSA, December 1992.","journal-title":"Federal Criteria for Information Technology Security"},{"key":"11_CR5","unstructured":"V. D. Gligor, S. I. Gavrila, and D. Ferraiolo: On the Formal Definition of Separation-of-Duty Policies and their Composition. Proc. of the 1998 IEEE Symp. on Security and Privacy, Oakland, California, May 1998 (to appear)."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"H. M. Hinton and E. S. Lee: The Composability of Policies. Proc. of 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1994, pp. 258\u2013281.","DOI":"10.1145\/191177.191243"},{"issue":"1","key":"11_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/32.481534","volume":"22","author":"J. McLean","year":"1996","unstructured":"J. McLean: A general theory of composition for a class of \u201cpossibilistic\u201d properties. IEEE Transactions on Software Engineering, vol. 22, no. 1, January 1996, pp. 53\u201366.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"11_CR8","unstructured":"Trusted Database Interpretation of the TCSEC, NCSC-TG-21, Version 1, National Computer Security Center, April 1991."},{"key":"11_CR9","unstructured":"Trusted Recovery Guideline, NCSC-TG-022, Version 1, National Computer Security Center, December 1989."},{"key":"11_CR10","unstructured":"W. R. Shockley and R. R. Schell: TCB Subsets for Incremental Evaluation. Proc. of the Third Aerospace Computer Security Conference Orlando, Florida, December 1987, pp. 131\u2013139."},{"key":"11_CR11","unstructured":"Unified INFOSEC Criteria, INFOSEC Concepts, Section 3, Dependencies among TCSEC Requirements (unclassified), National Security Agency, 1993."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"A. Zakinthinos and E. S. Lee: A General Theory of Security Properties. Proc. of 1997 IEEE Symposium on Security and Privacy, Oakland, California, May 1997, pp. 94\u2013102.","DOI":"10.1109\/SECPRI.1997.601322"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49135-X_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T14:39:20Z","timestamp":1737038360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49135-X_11"}},"subtitle":["Position Paper"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540656630","9783540491354"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-49135-x_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"29 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}