{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T04:18:18Z","timestamp":1742617098251,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540512950"},{"type":"electronic","value":"9783540461869"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1989]]},"DOI":"10.1007\/3-540-51295-0_115","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T20:52:17Z","timestamp":1330203137000},"page":"1-15","source":"Crossref","is-referenced-by-count":0,"title":["ITOSS: An integrated toolkit for operating system security"],"prefix":"10.1007","author":[{"given":"Michael","family":"Rabin","sequence":"first","affiliation":[]},{"given":"J. D.","family":"Tygar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,31]]},"reference":[{"key":"1_CR1","volume-title":"IBM's Early Computers","author":"C. J. Bashe","year":"1986","unstructured":"Bashe, C. J., L. R. Johnson, J. H. Palmer, and E. W. Pugh. IBM's Early Computers MIT Press, Cambridge, Massachusetts, 1986."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"\u201cAnalysis of a Kernel Verification.\u201d Proceedings of the 1984 Symposium on Security and Privacy, Oakland, California, May 1984, pp. 125\u2013131.","DOI":"10.1109\/SP.1984.10015"},{"issue":"5","key":"1_CR3","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1145\/363095.363139","volume":"11","author":"R. C. Daley","year":"1968","unstructured":"Daley, R. C., and Dennis, J. B. \u201cVirtual Memory, Processes, and Sharing in MULTICS.\u201d Communications of the ACM, 11:5, pp. 306\u2013312 (May 1968).","journal-title":"Communications of the ACM"},{"key":"1_CR4","first-page":"5","volume":"22","author":"R. A. DeMillo","year":"1979","unstructured":"DeMillo, R. A., R. J. Lipton, and A. J. Perlis. \u201cSocial Processes and Proofs of Theorems and Programs.\u201d Communications of the ACM, 22:5, (May 1979).","journal-title":"Communications of the ACM"},{"issue":"5","key":"1_CR5","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1145\/363095.363143","volume":"11","author":"E. W. Dijkstra","year":"1968","unstructured":"Dijkstra, E. W. \u201cThe Structure of the \u2018THE\u2019 Multiprogramming System.\u201d Communications of the ACM, 11:5, pp. 341\u2013346 (May 1968).","journal-title":"Communications of the ACM"},{"key":"1_CR6","unstructured":"Trusted Computer System Evaluation Criteria. Computer Security Center, Department of Defense, Fort Meade, Maryland. (CSC-STD-001-83) March 1985."},{"issue":"8b","key":"1_CR7","doi-asserted-by":"crossref","first-page":"1649","DOI":"10.1002\/j.1538-7305.1984.tb00058.x","volume":"63","author":"F. T. Grampp","year":"1984","unstructured":"Grampp, F. T., and R. H. Morris. \u201cUNIX Operating System Security.\u201d AT&T Bell Laboratories Technical Journal, 63:8b, pp. 1649\u20131672 (October 1984).","journal-title":"AT&T Bell Laboratories Technical Journal"},{"key":"1_CR8","volume-title":"Information Security: An Elusive Goal","author":"G. F. Jelen","year":"1985","unstructured":"Jelen, G. F. Information Security: An Elusive Goal. Program on Information Resources Policy, Harvard University, Cambridge, Massachusetts. June 1985."},{"issue":"10","key":"1_CR9","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. W. Lampson","year":"1973","unstructured":"Lampson, B. W. \u201cA Note on the Confinement Problem.\u201d Communications of the ACM, 16:10, pp. 613\u2013615 (October 1973).","journal-title":"Communications of the ACM"},{"issue":"5","key":"1_CR10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/323627.323630","volume":"19","author":"B. W. Lampson","year":"1985","unstructured":"Lampson, B. W. \u201cProtection.\u201d ACM Operating Systems Review, 19:5, pp. 13\u201324 (December 1985).]","journal-title":"ACM Operating Systems Review"},{"issue":"3","key":"1_CR11","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/0020-0190(85)90065-1","volume":"20","author":"J. McLean","year":"1985","unstructured":"McLean, J. \u201cA Comment on the \u2018Basic Security Theorem\u2019 of Bell and La-Padula.\u201d Information Processing Letters, 20:3, pp. 67\u201370 (1985).","journal-title":"Information Processing Letters"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"McLean, J. \u201cReasoning About Security Models.\u201d Personal Communication, 1986.","DOI":"10.21236\/ADA465058"},{"key":"1_CR13","volume-title":"The Multics System","author":"E. I. Organick","year":"1972","unstructured":"Organick, E. I. The Multics System. MIT Press, Cambridge, Massachusetts, 1972."},{"key":"1_CR14","volume-title":"Fingerprinting by Random Polynomials","author":"M. O. Rabin","year":"1981","unstructured":"Rabin, M. O. \u201cFingerprinting by Random Polynomials.\u201d TR-15-81. Center for Research in Computing Technology, Harvard University, Cambridge, Massachusetts. 1981."},{"issue":"7","key":"1_CR15","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1145\/361011.361061","volume":"17","author":"D. M. Ritchie","year":"1974","unstructured":"Ritchie, D. M. and Thompson, K. \u201cThe UNIX Time-Sharing System.\u201d Communications of the ACM, 17:7, pp. 365\u2013375 (July 1974).","journal-title":"Communications of the ACM"},{"issue":"3","key":"1_CR16","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1145\/361268.361275","volume":"15","author":"M. D. Schroeder","year":"1972","unstructured":"Schroeder, M. D., and J. H. Saltzer. \u201cA Hardware Architecture for Implementing Protection Rings.\u201d Communications of the ACM, 15:3, pp. 157\u2013170 (March 1972).","journal-title":"Communications of the ACM"},{"issue":"11","key":"1_CR17","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A. \u201cHow to Share a Secret.\u201d Communications of the ACM, 22:11, pp. 612\u2013613 (November 1979).","journal-title":"Communications of the ACM"},{"issue":"8","key":"1_CR18","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1145\/358198.358210","volume":"27","author":"K. Thompson","year":"1984","unstructured":"Thompson, K. \u201cReflections on Trusting Trust.\u201d Communications of the ACM, 27:8, pp. 761\u2013763 (August 1984).","journal-title":"Communications of the ACM"},{"key":"1_CR19","volume-title":"HYDRA\/C.mmp","author":"W. A. Wulf","year":"1981","unstructured":"Wulf, W. A., R. Levin, S. P. Harbison. HYDRA\/C.mmp. McGraw-Hill, New York, NY, 1981."}],"container-title":["Lecture Notes in Computer Science","Foundations of Data Organization and Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-51295-0_115.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T20:52:49Z","timestamp":1742590369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-51295-0_115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989]]},"ISBN":["9783540512950","9783540461869"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-51295-0_115","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1989]]}}}