{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:02:19Z","timestamp":1773655339472,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642147050","type":"print"},{"value":"9783642147067","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_27","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"337-344","source":"Crossref","is-referenced-by-count":17,"title":["Clarifying Integrity Control at the Trusted Information Environment"],"prefix":"10.1007","author":[{"given":"Dmitry P.","family":"Zegzhda","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter D.","family":"Zegzhda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maxim O.","family":"Kalinin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"ISO\/IEC 15408: Information technology. Security techniques. Evaluation criteria for IT security (2005)"},{"key":"27_CR2","unstructured":"Trusted Solaris, http:\/\/www.sun.com\/software\/solaris\/trustedsolaris"},{"key":"27_CR3","unstructured":"HPUX, http:\/\/docs.hp.com"},{"key":"27_CR4","unstructured":"RSBAC, http:\/\/www.rsbac.org\/documentation\/rsbac_handbook"},{"key":"27_CR5","unstructured":"GRSecurity, http:\/\/grsecurity.org"},{"key":"27_CR6","unstructured":"Astaro Security Gateway, http:\/\/www.astaro.com\/our_products\/astaro_security_gateway"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Alves-Foss, J., Taylor, C., Oman, P.: A multi-layered approach to security in high assurance system development. In: Proc. of 37th Annual Hawaii Intl. Conf. on System Science (HICSS-37), Hawaii (2004)","DOI":"10.1109\/HICSS.2004.1265709"},{"key":"27_CR8","volume-title":"Design of Feedback Control Systems","author":"R.T. Stefani","year":"2001","unstructured":"Stefani, R.T., et al.: Design of Feedback Control Systems. Oxford University Press, Oxford (2001)"},{"key":"27_CR9","volume-title":"Modern Control Systems","author":"R.C. Dorf","year":"2007","unstructured":"Dorf, R.C., Bishop, R.H.: Modern Control Systems. Prentice Hall, Englewood Cliffs (2007)"},{"key":"27_CR10","unstructured":"ISO\/IEC 17799: Information technology. Security techniques. Code of practice for information security management (2005)"},{"key":"27_CR11","unstructured":"Dillard, K., Maldonado, J., Warrender, B.: Microsoft Solutions for Security. Windows Server 2003 Security Guide. Microsoft (2003)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:36Z","timestamp":1606186596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}