{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:29:09Z","timestamp":1743053349864,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642001987"},{"type":"electronic","value":"9783642001994"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00199-4_3","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T13:26:36Z","timestamp":1238073996000},"page":"32-36","source":"Crossref","is-referenced-by-count":1,"title":["Idea: Trusted Emergency Management"],"prefix":"10.1007","author":[{"given":"Timothy E.","family":"Levin","sequence":"first","affiliation":[]},{"given":"Cynthia E.","family":"Irvine","sequence":"additional","affiliation":[]},{"given":"Terry V.","family":"Benzel","sequence":"additional","affiliation":[]},{"given":"Thuy D.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Ganesha","family":"Bhaskara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","volume-title":"Proc. of Computer Security Architecture Workshop","author":"C.E. Irvine","year":"2008","unstructured":"Irvine, C.E., Levin, T.E., Clark, P.C., Nguyen, T.D.: A security architecture for transient trust. In: Proc. of Computer Security Architecture Workshop, Fairfax, Virginia, USA. ACM, New York (2008)"},{"key":"3_CR2","unstructured":"Levin, T.E., Irvine, C.E., Benzel, T.V., Nguyen, T.D., Clark, P.C., Bhaskara, G.: Trusted emergency management. Technical Report NPS-CS-09-001, Naval Postgraduate School, Monterey, CA (Naval Postgraduate School)"},{"key":"3_CR3","first-page":"190","volume-title":"Proc. of Symposium on Security and Privacy, Oakland, CA","author":"C.J. McCollum","year":"1990","unstructured":"McCollum, C.J., Messing, J.R., Notargiacomo, L.: Beyond the pale of MAC and DAC: defining new forms of access control. In: Proc. of Symposium on Security and Privacy, Oakland, CA, pp. 190\u2013200. IEEE Computer Society, Los Alamitos (1990)"},{"key":"3_CR4","volume-title":"Proc. of Annual Computer Security Applications Conference","author":"G. Grossman","year":"1995","unstructured":"Grossman, G.: Immediacy in distributed trusted systems. In: Proc. of Annual Computer Security Applications Conference, New Orleans, Louisiana. IEEE Computer Societ, Los Alamitos (1995)"},{"key":"3_CR5","unstructured":"Levin, T., Bhaskara, G., Nguyen, T.D., Clark, P.C., Benzel, T.V., Irvine, C.E.: Securecore security architecture: Authority mode and emergency management. Technical Report NPS-CS-07-012 and ISI-TR-647, Naval Postgraduate School and USC Information Science Institute, Monterey, CA (October 2007)"},{"key":"3_CR6","unstructured":"NSA: U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, Version 1.03. National Security Agency (June 2007)"},{"key":"3_CR7","first-page":"37","volume-title":"Proc. of Computer Security Architecture Workshop","author":"T.E. Levin","year":"2007","unstructured":"Levin, T.E., Irvine, C.E., Weissman, C., Nguyen, T.D.: Analysis of three multilevel security architectures. In: Proc. of Computer Security Architecture Workshop, Fairfax, Virginia, USA, pp. 37\u201346. ACM, New York (2007)"},{"key":"3_CR8","unstructured":"Clark, P.C., Irvine, C.E., Levin, T.E., Nguyen, T.D., Vidas, T.M.: Securecore software architecture: Trusted path application (TPA) requirements. Technical Report NPS-CS-07-001, Naval Postgraduate School, Monterey, CA (December 2007)"},{"key":"3_CR9","first-page":"389","volume-title":"Proc. of 14th ACM conference on Computer and communications security","author":"J.S. Dwoskin","year":"2007","unstructured":"Dwoskin, J.S., Lee, R.B.: Hardware-rooted trust for secure key management and transient trust. In: Proc. of 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, pp. 389\u2013400. ACM, New York (2007)"},{"key":"3_CR10","unstructured":"TCG: TCG specification architecture overview. Technical Report 1.2, Trusted Computing Group (April 2004)"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"S. Smith","year":"1999","unstructured":"Smith, S., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks\u00a031, 831\u2013860 (1999)","journal-title":"Computer Networks"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Anderson, R.J.: A security policy model for clinical information systems. In: IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 30\u201343 (1996)","DOI":"10.1109\/SECPRI.1996.502667"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00199-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T18:00:09Z","timestamp":1739037609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00199-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642001987","9783642001994"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00199-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}