{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,22]],"date-time":"2024-12-22T13:40:02Z","timestamp":1734874802343,"version":"3.32.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1978,6,1]],"date-time":"1978-06-01T00:00:00Z","timestamp":265507200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer and Information Sciences"],"published-print":{"date-parts":[[1978,6]]},"DOI":"10.1007\/bf00975884","type":"journal-article","created":{"date-parts":[[2005,1,9]],"date-time":"2005-01-09T02:15:56Z","timestamp":1105236956000},"page":"157-191","source":"Crossref","is-referenced-by-count":7,"title":["An operation-control scheme for authorization in computer systems"],"prefix":"10.1007","volume":"7","author":[{"given":"Naftaly","family":"Minsky","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","unstructured":"E. Cohen and D. Jefferson, ?Protection in the Hydra Operating System,? inProceedings of the Fifth Symposium on Operational System Principles (November, 1975).","DOI":"10.1145\/800213.806532"},{"key":"CR2","volume-title":"Structured Programming","author":"O. J. Dahl","year":"1972","unstructured":"O. J. Dahl and C. A. R. Hoare, ?Hierarchical Program Structures,? inStructured Programming, Dahl, Dijkstra, and Hoare, eds. (New York, Academic Press, 1972)."},{"key":"CR3","unstructured":"G. S. Graham and P. J. Denning, ?Protection-Principle and Practice,? inProceedings of the 1972 SJCC (AFIPS Press, 1972)."},{"key":"CR4","doi-asserted-by":"crossref","unstructured":"M. H. Harrison,et al., ?On Protection in Operating Systems,?Proceedings of the Fifth Annual SIGOPS Conference (1975).","DOI":"10.1145\/800213.806517"},{"key":"CR5","doi-asserted-by":"crossref","unstructured":"A. K. Jones and W. A. Wulf, ?Towards the design of secure systems,?Software Pract. Exper. 321?336 (1975).","DOI":"10.1002\/spe.4380050403"},{"key":"CR6","doi-asserted-by":"crossref","unstructured":"A. K. Jones and B. Liskov, ?An Access Control Facility for Programming Languages,? Technical Report, Carnegie Mellon University (1976).","DOI":"10.21236\/ADA027845"},{"key":"CR7","unstructured":"B. Lampson, ?Protection,? inProceedings of the Fifth Princeton Symposium on Information Science and Systems (March 1971), pp. 437?443."},{"key":"CR8","doi-asserted-by":"crossref","unstructured":"B. Lampson and S. Sturgis, ?Reflections on an operating-system design,?Commun. ACM (May, 1976).","DOI":"10.1145\/360051.360074"},{"key":"CR9","doi-asserted-by":"crossref","unstructured":"T. A. Linden, ?Operating system structures to support security and reliable software,?Sum. ACM, to be published.","DOI":"10.6028\/NBS.TN.919"},{"key":"CR10","doi-asserted-by":"crossref","unstructured":"B. Liskov and S. Zilles, ?Programming with abstract data types,?SIGPLAN Not. (April, 1974).","DOI":"10.1145\/942572.807045"},{"key":"CR11","doi-asserted-by":"crossref","unstructured":"N. Minsky, ?Intentional resolution of privacy protection in database systems,?Commun. ACM (March, 1976).","DOI":"10.1145\/360018.360027"},{"key":"CR12","unstructured":"N. Minsky, ?An Activator-Based Protection Scheme,? Rutgers Technical Report (July, 1976)."},{"key":"CR13","unstructured":"M. Rosenblit and N. Minsky, ?On the Decidability Problem of the Safety of Protection Systems,? Rutgers University Technical Report (February, 1976)."},{"key":"CR14","doi-asserted-by":"crossref","unstructured":"G. Popek and C. S. Kline, ?Verifiable Secure Operating System Software? [AFIPS (1974NCC), 145?151],Proceedings of the 1974 NCC (AFIPS Press, 1972), pp. 145?151.","DOI":"10.1145\/1500175.1500204"},{"key":"CR15","volume-title":"Ph.D. thesis","author":"D. Redell","year":"1974","unstructured":"D. Redell, ?Naming and Protection in Extendible Operating Systems,? Ph.D. thesis, University of California, Berkeley (1974)."},{"key":"CR16","doi-asserted-by":"crossref","unstructured":"J. H. Saltzer and M. D. Schroeder, ?The protection of information in computer systems,?Proc. IEEE 63(9) (September, 1975).","DOI":"10.1109\/PROC.1975.9939"},{"key":"CR17","doi-asserted-by":"crossref","unstructured":"C. Weissman, ?Security controls in the ADEPT-50 time-sharing system,? in1969 AFIPS Conference Proceedings, Vol. 35, pp. 119?133.","DOI":"10.1145\/1478559.1478574"},{"key":"CR18","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1145\/355616.364017","volume":"17","author":"W. Wulf","year":"1974","unstructured":"W. Wulf, ?HYDRA: The kernel of a multiprocessor operating system,?Commun. ACM 17:337?345 (June, 1974).","journal-title":"Commun. ACM"},{"key":"CR19","unstructured":"W. A. Wulf, ?ALPHARD: Towards a Language to Support Structured Programs,? CMU Technical Report (April, 1974)."}],"container-title":["International Journal of Computer &amp; Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00975884.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00975884\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00975884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,22]],"date-time":"2024-12-22T13:10:43Z","timestamp":1734873043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00975884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1978,6]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1978,6]]}},"alternative-id":["BF00975884"],"URL":"https:\/\/doi.org\/10.1007\/bf00975884","relation":{},"ISSN":["0091-7036","1573-7640"],"issn-type":[{"type":"print","value":"0091-7036"},{"type":"electronic","value":"1573-7640"}],"subject":[],"published":{"date-parts":[[1978,6]]}}}