{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:02:46Z","timestamp":1743112966196,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540586180"},{"type":"electronic","value":"9783540490340"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58618-0_68","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T11:38:00Z","timestamp":1330256280000},"page":"247-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Implementing secure dependencies over a network by designing a distributed security subsystem"],"prefix":"10.1007","author":[{"given":"Bruno","family":"d'Ausbourg","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"P. Bieber, F. Cuppens, \u201cA logical view of secure dependencies.\u201d In Journal of Computer Security, Vol. 1, Nr. 1, IOS Press, 1992","DOI":"10.3233\/JCS-1992-1105"},{"key":"16_CR2","series-title":"Technical Report ESD-TR-76-372","volume-title":"Integrity Considerations for Secure Computer Systems","author":"K. J. Biba","year":"1977","unstructured":"K. J. Biba, \u201cIntegrity Considerations for Secure Computer Systems\u201d, Technical Report ESD-TR-76-372, ESD\/AFSC, Hanscom AFB, Bedford, Mass., 1977. Also MITRE MTR-3153."},{"key":"16_CR3","volume-title":"Secure Computer Systems: Unified Exposition and Multics Interpretation","author":"D. E. Bell","year":"1975","unstructured":"D. E. Bell and L. J. Padula \u201cSecure Computer Systems: Unified Exposition and Multics Interpretation\u201d, MTR-2997, MITRE Corporation, Bedford, Mass. (1975)."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"B. d'Ausbourg and J.H. Llareus, \u201cM2S: A machine for multilevel security\u201d, in Proceedings of ESORICS92, Toulouse, France, 1992","DOI":"10.1007\/BFb0013908"},{"key":"16_CR5","unstructured":"G.Eizenberg, \u201cMandatory policy: secure system model\u201d. In AFCET, editor, European Workshop on Computer Security, Paris,1989."},{"key":"16_CR6","unstructured":"G.King \u201cA survey of commercially available secure LAN product\u201d, in Proc. Int. IEEE Conf. on Computer Security Applications, Tucson, Arizona, December 1989"},{"key":"16_CR7","unstructured":"ISO 7498-2, Organization for Standardization, Information Processing Systems \u2014 Open System Interconnection Reference Model \u2014 Security Architecture, 1988"},{"key":"16_CR8","unstructured":"Information Technology Security Evaluation Criteria, Harmonized Criteria of France, Germany, the Netherlaands, and the United Kingdom, 1990"},{"key":"16_CR9","unstructured":"H.L Johnson et al. \u201cIntegrity and Assurance of service Protection in a large, multipurpose, critical System\u201d, In Proceedings of the 15th National Computer Security Conference, Baltimore, MD, October 1992"},{"key":"16_CR10","unstructured":"E.S. Lee, B. Thomson, Peter I.P. Boulton and M. Stumm \u201cAn architecture for a Trusted Network\u201d European Symposium on Research in Computer Security, ESORICS90, Toulouse, France, 1990"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"J. McLean, \u201cSecurity Models and Information Flow\u201d \u201aIEEE Symposium on Security and Privacy, Oakland, 1990.","DOI":"10.21236\/ADA462529"},{"key":"16_CR12","series-title":"Technical report DoD 5200.28-STD","volume-title":"Trusted Computer Systems Evaluation Criteria","author":"NCSC. Department of Defense","year":"1985","unstructured":"NCSC. Department of Defense. Trusted Computer Systems Evaluation Criteria. Technical report DoD 5200.28-STD, National Computer Security Center, Fort Meade, MD, December 1985"},{"key":"16_CR13","unstructured":"National Computer Security Center Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-005, July 1987"},{"key":"16_CR14","unstructured":"N. E. Proctor and P. G. Neumann \u201cArchitectural implications of covert channels\u201d, In Proceedings of the 15th National Computer Security Conference, Baltimore, MD, October 1992"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"J.M. Rushby and B. Randell, \u201cA Distributed Secure System\u201d Computer vol 16 no 7, IEEE, July 1983","DOI":"10.1109\/MC.1983.1654443"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"P.Siron and B. d'Ausbourg \u201cA Secure Medium Access Control Protocol: Security versus Performances\u201d in Proceedings of ESORICS 94, Brighton, UK, November 1994.","DOI":"10.1007\/3-540-58618-0_69"},{"key":"16_CR17","unstructured":"J. Wood and D.H. Barnes \u201cA Practical Distributed System\u201d in Proceedings of the International Conference on System Security, London, October 1985"},{"key":"16_CR18","volume-title":"A practical Distributed System","author":"J. Wood","year":"1986","unstructured":"J. Wood \u201cA practical Distributed System\u201d in Proceedings of the Second International Conference on Secure Communication Systems, IEE, London, October 1986"},{"key":"16_CR19","unstructured":"R. Yavatkar, P. Pai and R. Finkel \u201cA reservation based CSMA Protocol for Integrated Manufacturing networks\u201d, Tecn. Rep. 216-92, Department of Comp. Sc., Univeristy of Kentucky, Lexington, KY"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 94"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58618-0_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:05:09Z","timestamp":1559505909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58618-0_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540586180","9783540490340"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-58618-0_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"7 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}