{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:25:25Z","timestamp":1725456325827},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540632320"},{"type":"electronic","value":"9783540692379"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0027941","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T01:46:12Z","timestamp":1132623972000},"page":"26-37","source":"Crossref","is-referenced-by-count":4,"title":["An approach to dynamic domain and type enforcement"],"prefix":"10.1007","author":[{"given":"Jonathon","family":"Tidswell","sequence":"first","affiliation":[]},{"given":"John","family":"Potter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,16]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Badger, L., et al, Practical Domain and Type Enforcement for UNIX In Proc. 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995.","DOI":"10.1109\/SECPRI.1995.398923"},{"key":"4_CR2","unstructured":"Bai, Y., and V. Varadharajan, A Model Based Semantics for Transformations of Authorization Policies In Proc. 20th Australasian Computer Science Conference, Sydney, Australia, February 1997."},{"key":"4_CR3","unstructured":"Boebert, W. E. and R. Y. Kain, A Practical Alternative to Hierarchical Integrity Policies In Proc. of 8th National Computer Security Conference, Gaithersburg, MD, 1985. pp 18\u201327"},{"key":"4_CR4","unstructured":"Borenstein, N. K. EMail With A Mind of Its Own: The Safe-Tel Language for Enabled Mail In Proc. Upper Layer Protocols, Architectures and Applications, 1994."},{"key":"4_CR5","unstructured":"Clark, D. D., and D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies In Proc. 1987 IEEE Symposium on Security and Privacy\u201d, April 1987. pp. 184\u2013194."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Lampson, B. W., Protection In Proc. Fifth Princeton Symposium on Information Sciences and Systems, Princeton University, March 1971 pp 437\u2013443, reprinted in Operating Systems Review, 8, 1 January 1974, pp. 18\u201324.","DOI":"10.1145\/775265.775268"},{"key":"4_CR7","unstructured":"Sandhu, R. S., A Lattice Interpretation of the Chinese Wall Policy In Proc. 15th NIST-NCSC National Computer Security Conference, 1992. pp 329\u2013339"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Sandu, R., and G. S. Suri, Non-Monotonic Transformation of Access Rights In Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1992.","DOI":"10.1109\/RISP.1992.213264"},{"key":"4_CR9","unstructured":"Sami Saydjari, O., J. Beckman and J. Leaman, LOCKing Computers Securely In Proc. 10th DoD\/NBS Computer Security Conference, Gaithersburg, MD. September 1987. pp 129\u2013140."},{"key":"4_CR10","unstructured":"Tidswell, J., and Potter, J., Domain and Type Enforcement in a \u03bc,-Kernel In Proceedings 20th Australasian Computer Science Conference, Sydney, Australia, February 1997."},{"key":"4_CR11","unstructured":"Walker, K. M., et al, Confining Root Programs with Domain and Type Enforcement (DTE) In proc. 1996 Usenix Security Symposium, San Jose, CA."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0027941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T22:47:23Z","timestamp":1586558843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0027941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540632320","9783540692379"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0027941","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}