{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:34:58Z","timestamp":1725467698869},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647324"},{"type":"electronic","value":"9783540691013"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0053743","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T10:57:43Z","timestamp":1152183463000},"page":"308-319","source":"Crossref","is-referenced-by-count":3,"title":["A dynamically typed access control model"],"prefix":"10.1007","author":[{"given":"Jonathon E.","family":"Tidswell","sequence":"first","affiliation":[]},{"given":"John M.","family":"Potter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"28_CR1","unstructured":"W. E. Boebert and R. Y. Kain. A Practical Alternative to Hierarchical Integrity Policies. In Proceedings of the 8th National Computer Security Conference, Gaithersburg, Maryland, 1985."},{"key":"28_CR2","unstructured":"D Bell and L LaPadula. Secure Computer Systems: Mathematical Foundations (Volume 1). Technical Report ESD-TR-73-278, Mitre Corporation, 1973."},{"key":"28_CR3","volume-title":"The Java Language Specification","author":"J. Gosling","year":"1996","unstructured":"James Gosling, Bill Joy, and Guy Steele. The Java Language Specification. Addison-Wesley, Menlo Park, California, August 1996."},{"key":"28_CR4","volume-title":"Smalltalk-80: The Interactive Programming Environment","author":"A Goldberg","year":"1984","unstructured":"A Goldberg. Smalltalk-80: The Interactive Programming Environment. Addison-Wesley, Wokingham, England, 1984."},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Michael A Harrison, Walter L Ruzzo, and Jeffrey D Ullman. Protection in operating systems. Communications of the ACM, 19(8), August 1976.","DOI":"10.1145\/360303.360333"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"B. W. Lampson. Protection. In Proceedings Fifth Princeton Symposium on Information Sciences and Systems, March 1971. reprinted in Operating Systems Review, 8, 1, January 1974, pages 18\u201324.","DOI":"10.1145\/775265.775268"},{"key":"28_CR7","unstructured":"Ravi S Sandhu. The Typed Access Matrix Model. In IEEE Symposium on Security and Privacy, May 1992."},{"key":"28_CR8","unstructured":"Ravi S Sandhu and Srinivas Ganta. On testing for absence of rights in access control models. In Proceeding of the IEEE Computer Security Foundation Workshop, June 1993."},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Jonathon Tidswell and John Potter. An Approach to Dynamic Domain and Type Enforcement. In Proceedings of the Second Australasian Conference on Information Security and Privacy, July 1997.","DOI":"10.1007\/BFb0027941"},{"key":"28_CR10","unstructured":"Jonathon Tidswell and John Potter. Domain and Type Enforcement in a \u039c-Kernel. In Proceedings of the 20th Australasian Computer Science Conference, February 1997."},{"key":"28_CR11","volume-title":"Project Oberon","author":"N. Wirth","year":"1992","unstructured":"Niklaus Wirth and J\u00fcrg Gutknecht. Project Oberon. Addison-Wesley, Wokingham, England, 1992."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T17:22:33Z","timestamp":1555694553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647324","9783540691013"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0053743","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}