{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:41:21Z","timestamp":1725493281954},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540654742"},{"type":"electronic","value":"9783540492481"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49248-8_7","type":"book-chapter","created":{"date-parts":[[2007,10,27]],"date-time":"2007-10-27T23:31:47Z","timestamp":1193527907000},"page":"163-185","source":"Crossref","is-referenced-by-count":0,"title":["Security of Computer Networks"],"prefix":"10.1007","author":[{"given":"Jan","family":"Verschuren","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,1,15]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Information Technology Security Evaluation Criteria (ITSEC), Version 1.2, June 1991.","DOI":"10.1016\/0142-0496(91)90133-P"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1145\/356850.356852","volume":"13","author":"C. E. Landwehr","year":"1981","unstructured":"Landwehr, Carl E., \u201cFormal Models for Computer Security\u201d, Computing Surveys, Vol. 13, No. 3, September 1981, pp. 247\u2013278","journal-title":"Computing Surveys"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Bell, D. Elliot and LaPadula, Leonard J., Secure Computer Systems: Unified Exposition and Multics Interpretation, MTR 2997 rev. 1, The MITRE Corporation, March 1976.","DOI":"10.21236\/ADA023588"},{"key":"7_CR4","unstructured":"Biba, K.J., Integrity Considerations for Secure Computer Systems, MTR-3153, The MITRE Corporation, June 1975; ESD-TR-76-372, April 1977."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Clarck, D.D., Wilson, D.R. \u201cA Comparison of Commercial and Military Computer Security Policies\u201d, Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, April 1987.","DOI":"10.1109\/SP.1987.10001"},{"key":"7_CR6","series-title":"Lect Notes Comput Sci","volume-title":"A Formal Approach to Security Architectures, Advances in Cryptology-EUROCRYPT\u2019 91","author":"R.A. Rueppel","year":"1991","unstructured":"Rueppel, R.A., A Formal Approach to Security Architectures, Advances in Cryptology-EUROCRYPT\u2019 91, Lecture Notes in Computer Science 547, D.W. Davies (Editor), Springer-Verlag."},{"key":"7_CR7","unstructured":"Open Systems Interconnection Reference Model, Part 1: Basic Reference Model, ISO 7498-1 (CCITT X.200). Melbourne 1988."},{"key":"7_CR8","unstructured":"Open Systems Interconnection Reference Model, Part 2: Security Architecture, ISO DIS 7498-2, July 19, 1988."}],"container-title":["Lecture Notes in Computer Science","State of the Art in Applied Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49248-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T15:05:39Z","timestamp":1684076739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49248-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540654742","9783540492481"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-49248-8_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}