{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:15Z","timestamp":1725558675500},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_11","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"121-131","source":"Crossref","is-referenced-by-count":2,"title":["Security On-demand Architecture with Multiple Modules Support"],"prefix":"10.1007","author":[{"given":"Yanjun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Hongliang","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Qinghua","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Chunyang","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Bin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Wright, C., Cowan, C., Morris, J., Smalley, S., Kroah-Hartman, G.: Linux security modules: General security support for the linux kernel. In: Proceedings of the 11th USENIX Security Symposium","key":"11_CR1","DOI":"10.1109\/FITS.2003.1264934"},{"unstructured":"Rule Set Based Access Control, http:\/\/www.rsbac.org","key":"11_CR2"},{"unstructured":"Abrams, M.D., LaPadula, L.J., Eggers, K.W., et al.: Generalized Framework for Access Control: An Informal Description. In: Proceedings of the 13th National Computer Security Conference, October 1990, pp. 135\u2013143 (1990)","key":"11_CR3"},{"unstructured":"NSA Security Enhanced Linux, http:\/\/www.nsa.gov\/selinux","key":"11_CR4"},{"unstructured":"Spencer, R., Smalley, S., Loscocco, P., et al.: The Flask Security Architecture: System Support for Diverse Security Policies. In: Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 1999, pp. 123\u2013139 (1999)","key":"11_CR5"},{"unstructured":"Openwall Project, http:\/\/www.openwall.com","key":"11_CR6"},{"unstructured":"Bernaschi, M., et al.: REMUS: A Security-Enhanced Operating System","key":"11_CR7"},{"unstructured":"Garfinkel, T., Wagner, D.: Janus: A practical tool for application sandboxing","key":"11_CR8"},{"doi-asserted-by":"crossref","unstructured":"Bell, D., LaPadual, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. MTR-2997 Rev.1, The MITRE Corporation, Bedford, MA, USA (Mar 1976)","key":"11_CR9","DOI":"10.21236\/ADA023588"},{"unstructured":"Linux EA\/ACL project, http:\/\/acl.bestbits.at","key":"11_CR10"},{"issue":"2","key":"11_CR11","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control model. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"unstructured":"Chari, S.N., Cheng, P.-C.: BlueBoX: A Policy-Driven, Host-Based Intrusion Detection System","key":"11_CR12"},{"unstructured":"McVoy, L., Staelin, C.: lmbench: Portable tools for performance analysis. In: Proc. Winter 1996 USENIX, San Diego, CA, January 1996, pp. 279\u2013284 (1996)","key":"11_CR13"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:32:33Z","timestamp":1605760353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}