{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:01:13Z","timestamp":1725764473536},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319039633"},{"type":"electronic","value":"9783319039640"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03964-0_19","type":"book-chapter","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T02:34:56Z","timestamp":1387247696000},"page":"204-211","source":"Crossref","is-referenced-by-count":4,"title":["Using NATO Labelling to Support Controlled Information Sharing between Partners"],"prefix":"10.1007","author":[{"given":"Sander","family":"Oudkerk","sequence":"first","affiliation":[]},{"given":"Konrad","family":"Wrona","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Gallagher, S., Neugebauer, M.: Critical Infrastructure Information Sharing. In: IEEE International Conference on Technologies for Homeland Security (2004)"},{"key":"19_CR2","unstructured":"The National Association of Regulatory Utility Commissioners: 2007 Information Sharing Practices in Regulated Critical Infrastructure States (2007)"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Zhao, W., White, G.: A collaborative information sharing framework for Community Cyber Security. In: IEEE Conference on Technologies for Homeland Security (2012)","DOI":"10.1109\/THS.2012.6459892"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Ryutov, T., Kichkaylo, T., Neches, R., Orosz, M.: SFINKS: Secure focused information, news, and knowledge sharing. In: IEEE International Conference on Technologies for Homeland Security (2008)","DOI":"10.1109\/THS.2008.4534486"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Braghin, S., Fovino, I.N., Trombetta, A.: Advanced trust negotiation in critical infrastructures. In: 1st International Conference on Infrastructure Systems and Services (2008)","DOI":"10.1109\/INFRA.2008.5439656"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Flentge, F., Beyel, C., Rome, E.: Towards a standardised cross-sector information exchange on present risk factors. Critical Information Infrastructures Security (2008)","DOI":"10.1007\/978-3-540-89173-4_29"},{"key":"19_CR7","unstructured":"Oudkerk, S., Bryant, I., Eggen, A., Haakseth, R.: A Proposal for an XML Confidentiality Label Syntax and Binding of Metadata to Data Objects. In: NATO RTO Symposium on Information Assurance and Cyber Defence (2010)"},{"key":"19_CR8","unstructured":"Oudkerk, S., Lunt, G., Ross, A.: NATO Profile for the XML Confidentiality Label Syntax \u2013 Version 1.1, NCIA, The Hague, Netherlands (2013)"},{"key":"19_CR9","unstructured":"Oudkerk, S., Lunt, G., Ross, A.: NATO Profile for the Binding of Metadata to Data Objects \u2013 Version 1.1, NCIA, The Hague, Netherlands (2013)"},{"key":"19_CR10","unstructured":"W3C: XML Signature Syntax and Processing, 2nd edn., \n                    \n                      http:\/\/www.w3.org\/TR\/xmldsig-core\/"},{"key":"19_CR11","unstructured":"W3C XSL Working Group and W3C XML Query Working Group: XML Path Language (XPath) 2.0, 2nd edn (2010)"},{"key":"19_CR12","unstructured":"W3C XML Linking Working Group: XPointer Framework (2003)"},{"key":"19_CR13","unstructured":"Oudkerk, S.: NATO Cross-Domain Web Services Experiment at CWID 2007, NC3A, The Hague, Netherlands (2008)"},{"key":"19_CR14","unstructured":"Zeilenga, K., Melnikov, A.: Security Labels in Internet Email, draft-zeilenga-email-seclabel-05, IETF (2013)"},{"key":"19_CR15","unstructured":"ECMA: ECMA-376: Office Open XML File Formats, Part2: Open Packaging Conventions, 4th edn (2012)"},{"key":"19_CR16","unstructured":"ECMA: ECMA-262: ECMAScript Language Specification, 5.1 edn (2011)"},{"key":"19_CR17","unstructured":"Lunt, G., Oudkerk, S., Ross, A.: NATO Metadata Binding Service, NCIA, The Hague, Netherlands (2012)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03964-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T13:53:15Z","timestamp":1558792395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03964-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319039633","9783319039640"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03964-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}