{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:29Z","timestamp":1725562589765},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_16","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T05:14:43Z","timestamp":1281503683000},"page":"209-216","source":"Crossref","is-referenced-by-count":3,"title":["Genetic Optimization of Access Control Schemes in Virtual Local Area Networks"],"prefix":"10.1007","author":[{"given":"Igor","family":"Saenko","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Bubnov, R.V., Chernikov, A.S.: Basic principles of security in an integrated information system to support the management of the University. Vestnik MSTU Bauman, No.2 (2004) (in Russian)"},{"key":"16_CR2","unstructured":"Simonenko, S.N.: Review of discretionary access control mechanisms in relation to information systems, http:\/\/www.philippovich.ru\/Library\/Books\/ITS\/wwwbook\/IST7\/simonenko\/Simonenko.htm#_ftn1 (in Russian)"},{"key":"16_CR3","unstructured":"Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems (1971)"},{"key":"16_CR4","volume-title":"Computer Security: art and science","author":"M. Bishop","year":"2002","unstructured":"Bishop, M.: Computer Security: art and science. Pearson Education, Inc., Boston (2002)"},{"key":"16_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/b106962","volume-title":"Computer Network Security","author":"J.M. Kizza","year":"2005","unstructured":"Kizza, J.M.: Computer Network Security. Springer Science+Business Media, Inc., New York (2005)"},{"key":"16_CR6","unstructured":"Galatenko, V.A.: Identification and authentication, access control, http:\/\/www.citforum.ru\/security\/articles\/galatenko (in Russian)"},{"key":"16_CR7","unstructured":"Gyikovich, V.Y.: Fundamentals of Information Technology Security, http:\/\/bezpeka.ladimir.kiev.ua\/pq\/show\/zi.htm (in Russian)"},{"key":"16_CR8","unstructured":"Hildebrandt, W.: Security at all levels. LAN\u00a011 (2004) (in Russian)"},{"key":"16_CR9","unstructured":"Research Report: Secure Use of VLANs: An @stake Security Assessment (2002)"},{"key":"16_CR10","unstructured":"The main protective mechanisms used in systems to protect information, http:\/\/asher.ru\/security\/book\/its\/07 (in Russian)"},{"key":"16_CR11","unstructured":"How To Design an Access Control Matrix for Your Organization, http:\/\/www.howtodothings.com\/business\/how-to-design-an-access-control-matrix-for-your-organization"},{"key":"16_CR12","unstructured":"Wang, G., Dexter, T.W., Punch, V.F., Goodman, E.D.: Optimization of GA and Within a GA for a 2-Dimensional Layout Problem. In: First International Conference on Evolutionary Computation and Its Application (1996)"},{"key":"16_CR13","unstructured":"Shaffer, J.D., Eshelman, L.J.: Combinatorial Optimization by Genetic Algorithms: The Value of the Genotype\/Phenotype Distinction. In: First International Conference on Evolutionary Computation and Its Application (1996)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:36:31Z","timestamp":1619771791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}