{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:58:51Z","timestamp":1725634731890},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_7","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T11:31:18Z","timestamp":1321529478000},"page":"98-107","source":"Crossref","is-referenced-by-count":0,"title":["Trusted Subjects Configuration Based on TE Model in MLS Systems"],"prefix":"10.1007","author":[{"given":"Shangjie","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yeping","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"15408, I.: Common criteria for information technology security evaluation part 3: Security assurance components. Tech. Rep. CCMB-2009-07-003, Common Criteria (July 2009)"},{"key":"7_CR2","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/SP.1983.10001","volume-title":"Proceedings of the 1983 IEEE Symposium on Security and Privacy","author":"D.E. Bell","year":"1983","unstructured":"Bell, D.E.: Secure computer systems: A retrospective. In: Proceedings of the 1983 IEEE Symposium on Security and Privacy, pp. 161\u2013162. IEEE Computer Society, Washington, DC, USA (1983)"},{"key":"7_CR3","first-page":"32","volume-title":"2nd Aerospace Computer Security Conference","author":"D.E. Bell","year":"1986","unstructured":"Bell, D.E.: Secure computer systems: A network interpretation. In: 2nd Aerospace Computer Security Conference, pp. 32\u201339. IEEE Computer Society, Los Alamitos (1986)"},{"key":"7_CR4","first-page":"212","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"D.E. Bell","year":"1988","unstructured":"Bell, D.E.: Security policy modeling for the next-generation packet switch. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 212\u2013216. IEEE Computer Society, Washington, DC, USA (1988)"},{"key":"7_CR5","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system: a mathematical model. Tech. Rep. ESD-TR-73-278, Electronic System Division, Air Force Systems Commond (November 1973)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system:unified exposition and multics interpretation. Tech. Rep. MTR-2997 Rev.1, Mitre Corporation (March 1976)","DOI":"10.21236\/ADA023588"},{"key":"7_CR7","first-page":"198","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004","author":"S. Chong","year":"2004","unstructured":"Chong, S., Myers, A.C.: Security policies for downgrading. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 198\u2013209. ACM, New York (2004)"},{"key":"7_CR8","unstructured":"Department of Defense Trusted computer system evaluation criteria. Tech. Rep. DoD 5200.28-STD, Natioinal Computer Security Center (December 1985)"},{"key":"7_CR9","first-page":"212","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"S. Foley","year":"1989","unstructured":"Foley, S.: A model for secure information flow. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 212\u2013216. IEEE Computer Society, Washington, DC, USA (1989)"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TSE.1987.232893","volume":"13","author":"V.D. Gligor","year":"1987","unstructured":"Gligor, V.D., Chandersekaran, C.S., Chapman, R.S., Dotterer, L.J., Hecht, M.S., Jiang, W.D., Johri, A., Luckenbaugh, G.L., Vasudevan, N.: Design and implementation of secure xenix. IEEE Trans. Softw. Eng.\u00a013(2), 208\u2013221 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR11","first-page":"91","volume-title":"Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007","author":"B. Hicks","year":"2007","unstructured":"Hicks, B., Rueda, S., St.Clair, L., Jaeger, T., McDaniel, P.: A logical specification and analysis for selinux mls policy. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 91\u2013100. ACM, New York (2007)"},{"key":"7_CR12","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-642-14292-5_28","volume-title":"Networked Digital Technologies","author":"J. Jan\u00e1\u010dek","year":"2010","unstructured":"Jan\u00e1\u010dek, J.: Two dimensional labelled security model with partially trusted subjects and its enforcement using sELinux DTE mechanism. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds.) NDT 2010. Communications in Computer and Information Science, vol.\u00a087, pp. 259\u2013272. Springer, Heidelberg (2010)"},{"key":"7_CR13","first-page":"31","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"J. Landauer","year":"1989","unstructured":"Landauer, J., Redmond, T., Benzel, T.: Formal policies for trusted processes. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 31\u201340. IEEE Computer Society, Washington, DC, USA (1989)"},{"key":"7_CR14","first-page":"368","volume-title":"4th Aerospace Computer Security Applications Conference","author":"F. Mayer","year":"1988","unstructured":"Mayer, F.: An interpretation of a refined bell-la padula model for the tmach kernel. In: 4th Aerospace Computer Security Applications Conference, pp. 368\u2013378. IEEE Computer Society Press, Los Alamitos (December 1988)"},{"key":"7_CR15","unstructured":"NCSC: Trusted network interpretation of the trusted computer system evaluation criteria. Tech. Rep. NCSC-TG-005, National Computer Security Center (July 1987)"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1360\/jos180730","volume":"18","author":"W. Yan-Jun","year":"2007","unstructured":"Yan-Jun, W., Hong-Liang, L., Chen, Z.: A multi-level security model with least privilege support for trusted subject. Journal of Software\u00a018(3), 730\u2013738 (2007)","journal-title":"Journal of Software"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T13:32:45Z","timestamp":1593264765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}