{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:15Z","timestamp":1725558675878},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_10","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"109-120","source":"Crossref","is-referenced-by-count":2,"title":["Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model"],"prefix":"10.1007","author":[{"given":"Bin","family":"Liang","sequence":"first","affiliation":[]},{"given":"Heng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yanjun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. Saltzer","year":"1975","unstructured":"Saltzer, J., Schroeder, M.: The Protection of Information in Computer Systems. Proceedings of the IEEE\u00a063(9), 1278\u20131308 (1975)","journal-title":"Proceedings of the IEEE"},{"key":"10_CR2","unstructured":"Sendmail Inc. Sendmail Workaround for Linux Capabilities Bug, http:\/\/www.sendmail.org\/sendmail.8.10.1.LINUX-SECURITY.txt"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bell, D., LaPadual, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. MTR-2997 Rev.1, The MITRE Corporation, Bedford, MA, USA (March 1976)","DOI":"10.21236\/ADA023588"},{"key":"10_CR4","unstructured":"Wright, C., Cowan, C., Morris, J., Smalley, S., Kroah-Hartman, G.: Linux Security Modules: General Security Support for the Linux Kernel. Usenix Security Symp., Usenix Assoc., 17\u201331 (2002)"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/504909.504911","volume":"5","author":"M. Benaschi","year":"2002","unstructured":"Benaschi, M., Gabrielli, E., Mancini, L.: REMUS: A security-enhanced operating system. ACM Transaction on information and System Security\u00a05(1), 36\u201361 (2002)","journal-title":"ACM Transaction on information and System Security"},{"key":"10_CR6","unstructured":"Chen, H., Wagner, D., Dean, D.: Setuid Demystified. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA (2002)"},{"key":"10_CR7","unstructured":"Purczynski, W., Niewiadomski, J.: Wu-ftpd remote vulnerability (July 2003), http:\/\/www.isec.pl\/vulnerabilities\/isec-0011-wu-ftpd.txt"},{"key":"10_CR8","unstructured":"National Computer Security Center. Final Evaluation Report TIS Trusted XENIX version 4.0 (1994)"},{"key":"10_CR9","unstructured":"Huagang, X.: The Linux Intrusion Detection Project, http:\/\/www.lids.org"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1145\/762476.762477","volume":"6","author":"S.N. Chari","year":"2003","unstructured":"Chari, S.N., Cheng, P.: BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. ACM Transaction on information and System Security\u00a06(2), 173\u2013200 (2003)","journal-title":"ACM Transaction on information and System Security"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:32:32Z","timestamp":1605760352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}