{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T15:50:11Z","timestamp":1725637811250},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540416456"},{"type":"electronic","value":"9783642566752"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/978-3-642-56675-2_8","type":"book-chapter","created":{"date-parts":[[2011,11,26]],"date-time":"2011-11-26T01:07:34Z","timestamp":1322269654000},"page":"93-102","source":"Crossref","is-referenced-by-count":0,"title":["Verteiltes Filtern mit Contags und Sicherheits-Labeln"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Kabatnik","sequence":"first","affiliation":[]},{"given":"Reiner","family":"Sailer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"8_CR1","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"D. E. Denning: A Lattice Model of Secure Information Flow. Communications of the ACM, Vol. 19, No. 5, May 1976, pp. 236\u2013243.","journal-title":"Communications of the ACM"},{"key":"8_CR2","volume-title":"Security Options for the Internet Protocol","author":"S Kent","year":"1991","unstructured":"S. Kent: Security Options for the Internet Protocol. Nov 1991. RFC 1108."},{"key":"8_CR3","first-page":"75","volume-title":"The MITRE Corp","author":"DE Bell","year":"1975","unstructured":"D. E. Bell, L. J. LaPadula: Computer Security Model Unified Exposition and Multics Interpretation, The MITRE Corp., ESD-TR-75-306, Ma., June 1975. (NTIS # AD A023588)"},{"key":"8_CR4","first-page":"119","volume-title":"1969 Fall Joint Computer Conference, AFIPS","author":"C Weissman","year":"1969","unstructured":"C. Weissman: Security Controls in the ADEPT-50 Time Sharing System. 1969 Fall Joint Computer Conference, AFIPS, Vol 35, AFIPS Press, Montvale, N. J., 1969, pp. 119\u2013133."},{"key":"8_CR5","volume-title":"Using a Mandatory Secrecy and Integrity Policy on Smart Cards and Mobile Devices. EUROSMART Security Conference","author":"PA Karger","year":"2000","unstructured":"P. A. Karger, V. R. Austel, D. C. Toll: Using a Mandatory Secrecy and Integrity Policy on Smart Cards and Mobile Devices. EUROSMART Security Conference, June 2000."},{"key":"8_CR6","first-page":"76","volume-title":"Integrity Considerations for Secure Computer Systems","author":"KJ Biba","year":"1977","unstructured":"K. J. Biba: Integrity Considerations for Secure Computer Systems. ESD-TR-76-732, HQ Electronic Systems Division, Hanscom AFB, Ma., April 1977."},{"issue":"11","key":"8_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"RS Sandhu","year":"1993","unstructured":"R. S. Sandhu: Lattice-Based Access Control Models. IEEE Computer, Vol. 26, No. 11, November 1993, pages 9\u201319.","journal-title":"IEEE Computer"},{"key":"8_CR8","volume-title":"Modelling of Secure Interconnection. Communication Fraud Control Association","author":"M Kabalnik","year":"1999","unstructured":"M. Kabalnik, R. Sailer: Modelling of Secure Interconnection. Communication Fraud Control Association, 1999 Spring International Conference in Ismaning\/Gcrmany, May 1999."},{"key":"8_CR9","first-page":"37","volume-title":"Distributed Firewalls. login","author":"S Bellovin","year":"1999","unstructured":"S. Bellovin: Distributed Firewalls. login, Nov 1999, pp. 37\u201339. URL: http:\/\/www.research.att.com\/~smb\/papers\/distfw.pdf"},{"issue":"4","key":"8_CR10","first-page":"30","volume":"38","author":"R Sailer","year":"1996","unstructured":"Sailer, R., K\u00fchn, P.: Ein Domain-Konzept zur systematischen und wirtschaftlichen Integration von Sicherheit in Kommunikationsnetzen. Informationstechnik und Technische Informatik. Bd. 38 (1996) Heft 4, S. 30\u201333.","journal-title":"Informationstechnik und Technische Informatik"},{"key":"8_CR11","volume-title":"The Impact of Network Interconnection on Network Integrity. British Telecommunications Engineering","author":"K Ward","year":"1995","unstructured":"K. Ward: The Impact of Network Interconnection on Network Integrity. British Telecommunications Engineering, Vol. 13, January, 1995."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Sailer, R.: Security Services in an Open Service Environment. Proc. 14th ACSAC, Phoenix, Arizona, IEEE Computer Society, Los Alamitos, pp. 223\u2013234.","DOI":"10.1109\/CSAC.1998.738624"},{"key":"8_CR13","volume-title":"Recommendation Q.704: Specification of Signalling System No. 7 \u2014 Message transfer part \u2014 Signalling network functions and messages; ITU","author":"ITU-T","year":"1996","unstructured":"ITU-T Recommendation Q.704: Specification of Signalling System No. 7 \u2014 Message transfer part \u2014 Signalling network functions and messages; ITU, 1996."}],"container-title":["Informatik aktuell","Kommunikation in Verteilten Systemen (KiVS)"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-56675-2_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T10:25:07Z","timestamp":1620296707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-56675-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540416456","9783642566752"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-56675-2_8","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[2001]]}}}