{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:37:11Z","timestamp":1742942231075,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":11,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_865","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:53:32Z","timestamp":1319723612000},"page":"815-818","source":"Crossref","is-referenced-by-count":2,"title":["Multiple Independent Levels of Security"],"prefix":"10.1007","author":[{"given":"Jim","family":"Alves-Foss","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"865_CR1_865","first-page":"251","volume":"19","author":"B Lampson","year":"1976","unstructured":"Lampson B, Sturgis H (May 1976) Reflections on an operating system design, Commun Assoc Comput Mach 19(5): 251\u2013266","journal-title":"Commun Assoc Comput Mach"},{"key":"865_CR2_865","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1007\/3-540-08755-9_11","volume-title":"Operating systems: an advanced course","author":"G Popek","year":"1978","unstructured":"Popek G, Kline C (Jan 1978) Design issues for secure computer networks. In: Operating systems: an advanced course. Lecture Notes in Computer Science, vol 60. Springer, pp 517\u2013546"},{"key":"865_CR3_865","unstructured":"Anderson J (1972) Computer security technology planning study, ESD-TR-73-51, ESD\/AFSC, Hanscom AFB, Bedford. \n                  http:\/\/csrc.nist.gov\/publications\/history\/ande72.pdf"},{"issue":"1","key":"865_CR4_865","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B Lampson","year":"1974","unstructured":"Lampson B (Jan 1974) Protection, In: Proceedings of Princeton symposium 1971. Reprinted in Oper Syst Rev 8(1):18\u201324","journal-title":"Reprinted in Oper Syst Rev"},{"key":"865_CR5_865","doi-asserted-by":"crossref","unstructured":"Rushby J (1981) Design and verification of secure systems. In: Proceedings of eighth ACM symposium on operating system principles, Asilomar, pp 12\u201321. \n                  http:\/\/www.csl.sri.com\/papers\/sosp81\/sosp81.pdf","DOI":"10.1145\/800216.806586"},{"key":"865_CR6_865","volume-title":"Partitioning for safety and security: requirements, mechanisms, and assurance","author":"J Rushby","year":"1999","unstructured":"Rushby J (1999) Partitioning for safety and security: requirements, mechanisms, and assurance. Tech Report: CR-1999-209347, NASA Langley Research Center"},{"key":"865_CR7_865","unstructured":"U.S. Government protection profiles for separation kernels in environments requiring high robustness. Version 1.03, July\u00a02007"},{"key":"865_CR8_865","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1504\/IJES.2006.014859","volume":"2","author":"J Alves-Foss","year":"2007","unstructured":"Alves-Foss J, Harrison WS, Oman P, Taylor C (2007) The MILS architecture for high assurance embedded systems. Int J Embed Syst 2:239\u2013247","journal-title":"Int J Embed Syst"},{"key":"865_CR9_865","unstructured":"Harrison WS, Hanebutte N, Oman P, Alves-Foss J (Oct 2005) The MILS architecture for a secure global information grid. CrossTalk 18(10):20\u201324. \n                  http:\/\/www.stsc.hill.af.mil\/CrossTalk\/2005\/10\/0510Harrisonetal.html"},{"key":"865_CR10_865","volume-title":"Using spark-ada to model and verify a MILS message router","author":"B Rossebo","year":"2006","unstructured":"Rossebo B, Oman P, Alves-Foss J, Blue R, Jaszkowiak P (2006) Using spark-ada to model and verify a MILS message router. In: Proceedings of international symposium on secure software engineering, Washington,\u00a0DC"},{"issue":"2","key":"865_CR11_865","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/JCS-2008-16202","volume":"16","author":"J Zhou","year":"2008","unstructured":"Zhou J, Alves-Foss J (2008) Security policy refinement and enforcement in secure computer systems design. J Comput Secur 16(2):107\u2013131","journal-title":"J Comput Secur"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:01:52Z","timestamp":1591056112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_865","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}