{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:39:21Z","timestamp":1725500361457},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_21","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"291-302","source":"Crossref","is-referenced-by-count":1,"title":["A Compositional Multiple Policies Operating System Security Model"],"prefix":"10.1007","author":[{"given":"Lei","family":"Xia","sequence":"first","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Bell, D., La Padula, L.: Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547, vol. I, MITRE Corporation (1975)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Amoroso, E., Nguyen, T., Weiss, J., et al.: Towards an Approach to Measuring Software Trust. In: 1991 IEEE Symposium on Research in Security and Privacy, pp. 198\u2013218 (1991)","DOI":"10.1109\/RISP.1991.130788"},{"key":"21_CR3","volume-title":"The MULTICS System: An Examination of Its Structure","author":"E. Organick","year":"1972","unstructured":"Organick, E.: The MULTICS System: An Examination of Its Structure. MIT Press, Cambridge (1972)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Karger, P.A., Zurko, M.E., Bonin, D.W., et al.: A VMM security kernel for the VAX architecture. In: 1990 IEEE Symposium on Security and Privacy, pp. 2\u201319 (1990)","DOI":"10.1109\/RISP.1990.63834"},{"key":"21_CR5","unstructured":"Shapiro, J., Doerrie, M.S., Northup, E., et al.: Towards a Verified, General-Purpose Operating System Kernel. In: 1st NICTA Workshop on Operating System Verification (2004)"},{"key":"21_CR6","unstructured":"Biba, K.: Integrity Considerations for Secure Computer Systems. Technical Report MTR-3153, MITRE Corporation (1977)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Eswaran, K., Chamberlin, D.: Functional Specifications of Subsystem for Database Integrity. In: The International Conference on Very Large Data Bases (1975)","DOI":"10.1145\/1282480.1282484"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/32.55089","volume":"16","author":"J.L. Berger","year":"1990","unstructured":"Berger, J.L., Picciotto, J., Woodward, J.P.L., Cummings, P.T.: Compartmented mode workstation: Prototype highlights. IEEE Transactions on Software Engineering, Special Section on Security and Privacy\u00a016, 608\u2013618 (1990)","journal-title":"IEEE Transactions on Software Engineering, Special Section on Security and Privacy"},{"key":"21_CR9","unstructured":"Badger, L., Sterne, D.F., Sherman, D.L., et al.: A Domain and Type Enforcement UNIX Prototype. In: 5th USENIX UNIX Security Symposium (1995)"},{"key":"21_CR10","unstructured":"Spencer, R., Smalley, S., Hibler, M., et al.: The Flask Security Architecture: System Support for Diverse Security Policies. In: 8th USENIX Security Symposium, pp. 123\u2013139 (1999)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Lipner, S.: Non-Discretionary Controls for Commercial Applications. In: 1982 Symposium on Privacy and Security (1982)","DOI":"10.1109\/SP.1982.10022"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S. Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security\u00a03, 85\u2013106 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"21_CR13","unstructured":"Fraser, T.: LOMAC\u2013low water-mark mandatory access control for Linux. In: 9th USENIX Security Symposium (1999)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control. IEEE Computer\u00a029 (1996)","DOI":"10.1109\/2.485845"},{"key":"21_CR15","unstructured":"Loscocco, P., Smalley, S.: Meeting critical security objectives with security-enhanced linux. In: Ottawa Linux Symposium 2001 (2001)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Goldberg, R.P.: Architecture of virtual machines. In: AFIPS National Computer Conference, vol.\u00a042, pp. 309\u2013318 (1973)","DOI":"10.1145\/800122.803950"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Efstathopoulos, P., Krohn, M., VanDeBogart, S., et al.: Labels and Event Processes in the Asbestos Operating System. In: 20th Symposium on Operating Systems Principles (2005)","DOI":"10.1145\/1095810.1095813"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Radhakrishnan, M., Solworth, J.A.: Application Support in the Operating System Kernel. In: ACM Symposium on Information, Computer and Communications Security (2006)","DOI":"10.1145\/1128817.1128848"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: A Fast Capability System. In: 17th ACM symposium on Operating systems principles (1999)","DOI":"10.1145\/319151.319163"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J.H. Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer system. Proceedings of the IEEE\u00a063, 1278\u20131308 (1975)","journal-title":"Proceedings of the IEEE"},{"key":"21_CR21","unstructured":"Key Logic. The KeyKOS\/KeySAFE System Design (1989), http:\/\/www.agorics.com\/Library\/KeyKos\/keysafe\/Keysafe.html"},{"key":"21_CR22","unstructured":"Rushby, J.: Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, Computer Science Lab, SRI International (1992)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T13:20:58Z","timestamp":1557148858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}