{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:22:32Z","timestamp":1743049352394,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540562467"},{"type":"electronic","value":"9783540474883"}],"license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/bfb0013908","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T02:24:15Z","timestamp":1132712655000},"page":"373-391","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["M2S: A machine for multilevel security"],"prefix":"10.1007","author":[{"given":"Bruno","family":"d'Ausbourg","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean-Henri","family":"Llareus","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"key":"20_CR1","unstructured":"Bieber, F. Cuppens and G. Eizenberg: Fondements th\u00e9oriques de la S\u00e9curit\u00e9 Informatique. Rapport 2\/3366.00\/DERI, Centre d'Etudes et de Recherches de Toulouse, 1990."},{"key":"20_CR2","volume-title":"Technical Report ESD-TR-76-372, ESD\/AFSC","author":"K. J. Biba","year":"1977","unstructured":"K. J. Biba: Integrity Considerations for Secure Computer Systems, Technical Report ESD-TR-76-372, ESD\/AFSC, Hanscom AFB, Bedford, Mass., 1977. Also MITRE MTR-3153."},{"key":"20_CR3","volume-title":"MTR-75-306","author":"D.E. Bell","year":"1975","unstructured":"D.E. Bell, L.J. LaPadula: \u201cSecure Computer Systems: Unified Exposition and Multics Interpretation\u201d-MTR-75-306, MITRE Corporation, Bedford, Mass, March 1975"},{"key":"20_CR4","unstructured":"J. M. Beckman, J.R. Leaman and O.S. Saydjari: LOCK trak: Navigating Uncharted Space, IEEE Symposium on Security and Privacy, Oakland, 1989."},{"key":"20_CR5","unstructured":"Trusted Computer Systems Evaluation Criteria.Technical report DoD 5200.28-STD, National Computer Security Center, Fort Meade, MD, December 1985"},{"key":"20_CR6","unstructured":"G.Eizenberg: Mandatory policy: secure system model. In AFCET, editor, European Workshop on Computer Security, Paris, 1989."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"L. J. Fraim: Scomp, a solution to the Multilevel Security Problem. In IEEE Computer, July 1983.","DOI":"10.1109\/MC.1983.1654440"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"J. Goguen and J. Meseguer: Unwiding and Inference Control. IEEE Symposium on Security and Privacy, Oakland, 1984.","DOI":"10.1109\/SP.1984.10019"},{"key":"20_CR9","unstructured":"Panel SessionKernel Performance Issues, Proc. Symp. Security and Privacy, IEEE Cat. No 81CH1629-5, Oakland, Calif.,1981."},{"key":"20_CR10","volume-title":"AFIPS Conf. Proc., Vol 48","author":"E. J. McCauley","year":"1979","unstructured":"E. J. McCauley and P. J. Drongowski: KSOS The Design of a Secure Operating System, AFIPS Conf. Proc., Vol 48, AFIPS Press, Montvale, N.J., 1979."},{"key":"20_CR11","volume-title":"AFIPS Conf. Proc., Vol. 48, 1979 NCC","author":"G. J. Popek","year":"1979","unstructured":"G. J. Popek: UCLA Secure Unix, AFIPS Conf. Proc., Vol. 48, 1979 NCC, AFIPS Press, Montvale, N.J., 1979."},{"key":"20_CR12","unstructured":"M. Schaffer and G. Walsh: LOCK\/ix: On implementing Unix on the LOCK TCB, 11th NCSC Conference, 1988."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0013908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:03:30Z","timestamp":1559505810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0013908"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"ISBN":["9783540562467","9783540474883"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/bfb0013908","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1992]]},"assertion":[{"value":"9 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}