{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:25:34Z","timestamp":1743045934889,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540586180"},{"type":"electronic","value":"9783540490340"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58618-0_71","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T16:38:21Z","timestamp":1330274301000},"page":"299-318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["On the expressive power of the unary transformation model"],"prefix":"10.1007","author":[{"given":"Ravi S.","family":"Sandhu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Srinivas","family":"Ganta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"19_CR1","unstructured":"Ammann, P.E. and Sandhu, R.S. \u201cImplementing Transaction Control Expressions by Checking for Absence of Access Rights.\u201d Proc. Eighth Annual Computer Security Applications Conference, San Antonio, Texas, December 1992."},{"key":"19_CR2","unstructured":"Bell, D.E. and LaPadula, L.J. \u201cSecure Computer Systems: Unified Exposition and Multics Interpretation.\u201d MTR-2997, Mitre, Bedford, Massachusetts (1975)."},{"issue":"5","key":"19_CR3","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. E. Denning","year":"1976","unstructured":"Denning, D.E. \u201cA Lattice Model of Secure Information Flow.\u201d Communications of ACM 19(5):236\u2013243 (1976).","journal-title":"Communications of ACM"},{"issue":"8","key":"19_CR4","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M. H. Harrison","year":"1976","unstructured":"Harrison, M.H., Ruzzo, W.L. and Ullman, J.D. \u201cProtection in Operating Systems.\u201d Communications of ACM 19(8), 1976, pages 461\u2013471.","journal-title":"Communications of ACM"},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/0020-0190(85)90065-1","volume":"20","author":"J. McLean","year":"1985","unstructured":"McLean, J. \u201cA Comment on the \u2018Basic Security Theorem\u2019 of Bell and LaPadula.\u201d Information Processing Letters 20(2):67\u201370 (1985).","journal-title":"Information Processing Letters"},{"issue":"1","key":"19_CR6","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.48795","volume":"23","author":"J. McLean","year":"1990","unstructured":"McLean, J. \u201cSpecifying and Modeling Computer Security.\u201d IEEE Computer 23(1):9\u201316 (1990).","journal-title":"IEEE Computer"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S. \u201cTransformation of Access Rights.\u201d Proc. IEEE Symposium on Security and Privacy, Oakland, California, May 1989, pages 259\u2013268.","DOI":"10.1109\/SECPRI.1989.36300"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S. \u201cThe Typed Access Matrix Model\u201d IEEE Symposium on Research in Security and Privacy, Oakland, CA. 1992, pages 122\u2013136.","DOI":"10.1109\/RISP.1992.213266"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S. and Suri, G.S. \u201cNon-monotonic Transformations of Access Rights.\u201d Proc. IEEE Symposium on Research in Security and Privacy, Oakland, California, May 1992, pages 148\u2013161.","DOI":"10.1109\/RISP.1992.213264"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S. and Srinivas Ganta. \u201cOn the Minimality of Testing for Rights in Transformation Models.\u201d Proc. IEEE Symposium on Research in Security and Privacy, Oakland, California, May 16\u201318, 1994, pages 230\u2013241.","DOI":"10.1109\/RISP.1994.296578"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 94"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58618-0_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T22:36:34Z","timestamp":1742596594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58618-0_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540586180","9783540490340"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-58618-0_71","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"7 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}