{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:29:18Z","timestamp":1743096558106,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540586180"},{"type":"electronic","value":"9783540490340"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58618-0_69","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T11:37:43Z","timestamp":1330256263000},"page":"267-279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A secure medium access control protocol: Security versus performances"],"prefix":"10.1007","author":[{"given":"Pierre","family":"Siron","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bruno","family":"d'Ausbourg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"P. Bieber, F. Cuppens: A logical view of secure dependencies. In Journal of Computer Security, Vol. 1, Nr. 1, IOS Press, 1992","DOI":"10.3233\/JCS-1992-1105"},{"key":"17_CR2","series-title":"MTR-2997","volume-title":"Secure Computer Systems: Unified Exposition and Multics Interpretation","author":"D. E. Bell","year":"1975","unstructured":"D. E. Bell and L. J. Padula: Secure Computer Systems: Unified Exposition and Multics Interpretation, MTR-2997, MITRE Corporation, Bedford, Mass. (1975)."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"B. d'Ausbourg and J.H. Llareus: M2S: A machine for multilevel security, European Symposium on Research in Computer Security, ESORICS92, Toulouse, France, 1992","DOI":"10.1007\/BFb0013908"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"B. d'Ausbourg: Implementing Secure Dependencies over a Network by designing a Distributed Security SubSystem, ESOR1CS94, Brighton, UK, 1994","DOI":"10.1007\/3-540-58618-0_68"},{"key":"17_CR5","unstructured":"G.Eizenberg: Mandatory policy: secure system model. In AFCET, editor, European Workshop on Computer Security, Paris, 1989."},{"key":"17_CR6","unstructured":"H. Golde: University of Washington version of MIT Network Simulator. October 1991. (available by anonymous FTP from june.cs.washington.edu)."},{"key":"17_CR7","unstructured":"A. Heybey: MIT Network simulator. MIT Laboratory for Computer Science, 1988."},{"key":"17_CR8","unstructured":"G.King: A survey of commercially available secure LAN product, in Proc. Int. IEEE Conf. on Computer Security Applications, Tucson, Arizona, December 1989"},{"key":"17_CR9","unstructured":"MIT: NETSIM mailing list, info-netsim@lcs.mit.edu."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"G.R. Sherman: The quality of a scientific simulation in SIMULETTER vol 15, n 3, July 1984.","DOI":"10.1145\/1102872.1102874"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Van Jacobson: Congestion avoidance and control, in Proc. of ACM SIGCOMM'88 Symposium, pp. 314\u2013329, August 1988.","DOI":"10.1145\/52324.52356"},{"key":"17_CR12","unstructured":"R. Yavatkar, P. Pai and R. Finkel: A reservation based CSMA Protocol for Integrated Manufacturing networks, Tecn. Rep. 216-92, Department of Comp. Sc., Univeristy of Kentucky, Lexington, KY."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 94"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58618-0_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:05:12Z","timestamp":1559505912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58618-0_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540586180","9783540490340"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-58618-0_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"7 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}