{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:14Z","timestamp":1725562394272},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_4","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"42-55","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Policy and Information Flow Security Model for Active Network"],"prefix":"10.1007","author":[{"given":"Zhengyou","family":"Xia","sequence":"first","affiliation":[]},{"given":"Yichuan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yiping","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Shiyong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Tennenhouse, D., Wetherall, D.: Towards an Active Network Architecture. In: Multimedia Computing and Networking, San Jose, CA (1996)","DOI":"10.1145\/231699.231701"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Wetherall, D., John, V., et al.: ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols. In: IEEE OPENARCH 1998, San Francisco, CA (April 1998)","DOI":"10.1109\/OPNARC.1998.662048"},{"key":"4_CR3","unstructured":"http:\/\/www.choices.cs.uiuc.edu\/Security\/seraphim\/May2000\/SecurityArchitecture.pdf\n                      \n                      \n                     a6AN Security working group (May 2000)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Campbell, R.H., Liu, Z.: Dynamic interoperable security architecture for active network. In: IEEE OPENARCH 2000, Israel, March 2000, pp. 32\u201341 (2000)","DOI":"10.1109\/OPNARC.2000.828133"},{"key":"4_CR5","unstructured":"Calvert, K.L.: Architectural framework for active networks, version 1.0 University of Kentucky (July 1999), \n                      \n                        http:\/\/www.ccgatech.edu\/project\/canes\/papers\/arch-1-0.ps.gz"},{"key":"4_CR6","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical Report ESD-TR-278, vol. 1, The Mitre Corp., Bedford, MA (1973)"},{"key":"4_CR7","unstructured":"Bell, D.E.: Secure computer systems: A re.nement of the mathematical model.Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA (1973)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The Chinese wall security policy. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, pp. 215\u2013228 (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Goguen, A., Meseguer, J.: Security policies and security models. In: Proc. of the 1982 Symposium on Security and Privacy, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"issue":"1","key":"4_CR10","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1995","unstructured":"Focardi, R., Gorrieri, R.: A Classification of Security Properties. JCS\u00a03(1), 5\u201333 (1995)","journal-title":"JCS"},{"issue":"9","key":"4_CR11","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/32.629493","volume":"23","author":"R. Focardi","year":"1997","unstructured":"Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Trans. on Soft. Eng.\u00a023(9), 550\u2013571 (1997)","journal-title":"IEEE Trans. on Soft. Eng."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:38Z","timestamp":1620011918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}