{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:39:28Z","timestamp":1725489568680},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745723"},{"type":"electronic","value":"9783540745730"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74573-0_8","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T09:29:07Z","timestamp":1187861347000},"page":"69-78","source":"Crossref","is-referenced-by-count":5,"title":["Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard"],"prefix":"10.1007","author":[{"given":"Yeu-Pong","family":"Lai","sequence":"first","affiliation":[]},{"given":"Jui-Heng","family":"Tai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Information security: emerging cyber-security issues threaten federal information systems\u2019 United States Government Accountability Office, Report to Congressional Requesters (May 2005)"},{"key":"8_CR2","unstructured":"Ho, S.-Y.: The thread and situation of global information security market, Market Intelligence Center in Industrial Development Bureau Ministry of Economic Affairs, Technical Reports (July 7, 2006)"},{"key":"8_CR3","unstructured":"The practical plan to eliminate crisis events in information security for departments, National Information and Communication Security Taskforce, Programs (October 21, 2004)"},{"key":"8_CR4","unstructured":"The notifying and responding procedures for offense against information security in Executive Yuan and its departments. Researching, Developing and Evaluating Commission of Executive Yuan, Programs, (November 2, 2005)"},{"key":"8_CR5","unstructured":"Edwards, M.J.: Understanding network security (December 1997), Available at: http:\/\/www.windowsitlibrary.com\/Content\/121\/02\/1.html Accessed (May 1, 2006)"},{"key":"8_CR6","unstructured":"Nyoni, E.: Technical options oF computerized world (2000), (Accessed May 1, 2006), Available at: http:\/\/www.wmo.ch\/web\/www\/reports\/nyoni.html"},{"key":"8_CR7","unstructured":"CISCO, Network admission control (Accessed October 10, 2006), Available at http:\/\/www.cisco.com\/en\/US\/netsol\/ns466\/networking_solutions_package.html"},{"key":"8_CR8","unstructured":"Microsoft, Network access protection (Accessed October 10, 2006), Available at http:\/\/www.microsoft.com\/technet\/itsolutions\/network\/nap\/default.mspx"},{"key":"8_CR9","unstructured":"Whale Communications, Air gap architecture (Accessed May 1, 2006), Available at http:\/\/www.whalecommunications.com\/site\/whale\/corporate\/homepage.html"},{"key":"8_CR10","unstructured":"Farn, K.-J., Lin, S.-K., Cheng, T.-S.: First Step in the Definition of Network Segregation for Security. In: Proceedings of Information Security Conference 2005, Kau-Shong, Taiwan (June 2005)"},{"key":"8_CR11","unstructured":"Lee, Z.-P.: The secure isolation gap, China Pattern: CN2588677 (November 26, 2003)"},{"issue":"3","key":"8_CR12","first-page":"244","volume":"4","author":"X. Chen","year":"2005","unstructured":"Chen, X.: Feature and application of GAP technique. Ningxia Engineering Technology\u00a04(3), 244\u2013246 (2005)","journal-title":"Ningxia Engineering Technology"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"He, H.-J., Zhang, Y.-J., Jiao, X.-G., Hou, F.-Y.: The network security control device based on monitoring data exchange for the physical isolation, China Pattern: CN1421794 (June 4, 2003)","DOI":"10.1016\/S1353-4858(03)00805-5"},{"key":"8_CR14","unstructured":"Wang, Z.-H., Han, D.-W.: The physical isolation switches: introduction and practice, China Pattern:CN1464403 (December 31, 2003)"},{"key":"8_CR15","unstructured":"ISO\/IEC, Information technology - Code of practice for information security management, ISO\/IEC 17799 (2005)"}],"container-title":["Lecture Notes in Computer Science","Network-Based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74573-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T06:43:22Z","timestamp":1629614602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74573-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540745723","9783540745730"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74573-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}