{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:03:45Z","timestamp":1761944625109,"version":"build-2065373602"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2006,10,1]],"date-time":"2006-10-01T00:00:00Z","timestamp":1159660800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SCI CHINA SER F"],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1007\/s11432-006-2014-6","type":"journal-article","created":{"date-parts":[[2006,10,4]],"date-time":"2006-10-04T06:06:10Z","timestamp":1159941970000},"page":"545-565","source":"Crossref","is-referenced-by-count":3,"title":["A formal model for integrity protection based on DTE technique"],"prefix":"10.1007","volume":"49","author":[{"given":"Qingguang","family":"Ji","sequence":"first","affiliation":[]},{"given":"Sihan","family":"Qing","sequence":"additional","affiliation":[]},{"given":"Yeping","family":"He","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2014_CR1","first-page":"298","volume-title":"Fourth Aerospace Computer Security Applications Conference","author":"R. R. Jueneman","year":"1988","unstructured":"Jueneman R R. Integrity controls for military and commercial applications. In: Fourth Aerospace Computer Security Applications Conference. Florida: IEEE Computer Society Press, 1988. 298\u2013322"},{"key":"2014_CR2","doi-asserted-by":"crossref","unstructured":"Ruthberg Z G, Polk W T. Report of the Invitational Workshop on Data Integrity, National Institute of Standards and Technology. NIST Special Publication, September, 1989. 500\u2013168","DOI":"10.6028\/NIST.SP.500-168"},{"key":"2014_CR3","unstructured":"Mayfield T, Boore J M, Welke S R. Integrity-oriented control objectives: Proposed revision to the trusted computer systems evaluation criteria (TCSEC, DoD5200.28.STD), IDA document D-967, prepared for National Security Agency (US, available at http:\/\/www.mirrors.wiretapped.net\/security\/inf\/reference\/ncse-publications\/C-TR-111-91.pdf"},{"key":"2014_CR4","unstructured":"Information technology \u2014 Security techniques \u2014 Evaluation criteria for IT security \u2014 Part 2: Security functional requirements, ISO\/IEC 15408-2, 1999, International Standards Organization"},{"issue":"1","key":"2014_CR5","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/0167-4048(95)97025-6","volume":"14","author":"M. D. Abrams","year":"1995","unstructured":"Abrams M D, Joyce M V. Trusted system concepts. Computers and Security, 1995, 14(1): 45\u201356","journal-title":"Computers and Security"},{"key":"2014_CR6","unstructured":"Bell D E. Multipolicy machine Model. In: Proceedings of the 1994 ACM SIGSAC on New Security Paradigms Workshop. Little Compton, RI USA, August 1994, 2\u20139"},{"key":"2014_CR7","doi-asserted-by":"crossref","unstructured":"Mayfield T, Roskos J E, Welke S R, et al. Integrity in automated information systems, NCSC Technical Report, National Computer Security Center, 1991, 91","DOI":"10.21236\/ADA245555"},{"key":"2014_CR8","first-page":"257","volume-title":"Database Security, VII: Status and Prospects","author":"R. S. Sandhu","year":"1993","unstructured":"Sandhu R S. On five definitions of data integrity. In: Keefe T F, Landwehr C E, eds. Database Security, VII: Status and Prospects. Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Guntersville, Alabama, 1993. 257\u2013267"},{"key":"2014_CR9","first-page":"187","volume-title":"Information Security: An Integrated Collection of Essays","author":"L. J. LaPadula","year":"1995","unstructured":"LaPadula L J. Rule-set modeling of a trusted computer system. In: Abrams M D, Jajodia S, Podell H J, eds. Information Security: An Integrated Collection of Essays. Los Alamitos: IEEE Computer Society Press, 1995. 187\u2013226"},{"key":"2014_CR10","unstructured":"Kargar P A, Austel V, Toll D. A new mandatory security policy combining secrecy and integrity. IBM research report RC21717, 2000"},{"key":"2014_CR11","unstructured":"Fraser T. LOMAC: Low Water-Mark Integrity Protection for COTS Environments. NAI Labs report 0775, 2000"},{"key":"2014_CR12","unstructured":"Ott A. The Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension. In: 8th International Linux Kongress, Enschede, November 2001. Available at http:\/\/www.rsbac.org\/doc\/media\/linux-kongress\/linux-kongress.html ."},{"key":"2014_CR13","unstructured":"Smith R E. Sidewinder: Defense in Depth using Type Enforcement. Secure Computing Corporation Report, 2000"},{"key":"2014_CR14","first-page":"66","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"L. Badger","year":"1995","unstructured":"Badger L, Sterne D F, Sherman D L, et al. Practical domain and type enforcement for UNIX. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1995. 66\u201377"},{"key":"2014_CR15","unstructured":"Walker K M, Sterne D F, Badger M L, et al. Confining root programs with domain and type enforcement (DTE). In: Proceedings of 1996 Usenix Security Symposium, San Jose, CA, 1996. Available at http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec96\/walker.html ."},{"key":"2014_CR16","doi-asserted-by":"crossref","unstructured":"Tidswell J E, Potter J M. An approach to dynamic domain and type enforcement, Lecture Notes in Computer Science, Volume 1270. In: Proceedings of the 2nd Australasian Conference on Information Security and Privacy, July 1997, 26\u201337","DOI":"10.1007\/BFb0027941"},{"key":"2014_CR17","volume-title":"Secure computing: The secure Ada target approach, Advance in Computer System Security. Volume 3","author":"W. E. Boebert","year":"1988","unstructured":"Boebert W E, Kain R Y, Young W D. Secure computing: The secure Ada target approach, Advance in Computer System Security. Volume 3. Turn R, ed. Boston\/London: Artech House, INC, 1988"},{"key":"2014_CR18","volume-title":"Computer viruses: theory and experiments, Advance in Computer System Security, Volume 3","author":"F. Cohen","year":"1988","unstructured":"Cohen F. Computer viruses: theory and experiments, Advance in Computer System Security, Volume 3, Turn R, ed. Boston\/London: Artech House, INC, 1988"},{"key":"2014_CR19","doi-asserted-by":"crossref","unstructured":"Lee T M P. Using mandatory integrity to enforce \u2018commercial\u2019 security. In: Proceedings of IEEE Symposium on Security and Privacy, 1988, 140\u2013146","DOI":"10.1109\/SECPRI.1988.8106"},{"key":"2014_CR20","first-page":"151","volume-title":"Role-based application design and enforcement","author":"D. J. Thomsen","year":"1991","unstructured":"Thomsen D J. Role-based application design and enforcement. In: Jajodia S, Landwehr C E, eds. Database Security, IV: Status and Prospects, North-Holland, 1991. 151\u2013168"},{"key":"2014_CR21","volume-title":"Commercial integrity, roles and object orientation","author":"M. Nyanchama","year":"1994","unstructured":"Nyanchama M. Commercial integrity, roles and object orientation. Ph.D dissertation. The University of Western Ontario, London, Ontario, 1994"},{"key":"2014_CR22","doi-asserted-by":"crossref","unstructured":"Lipner S. Non-discretionary control for commercial applications. In: Proceedings of IEEE 1982 Symposium on Research in Security and Privacy, April 1982, 2\u201310","DOI":"10.1109\/SP.1982.10022"},{"key":"2014_CR23","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/SECPRI.1998.674820","volume-title":"Proceedings of 1998 IEEE Symposium on Research in Security and Privacy","author":"T. Fraser","year":"1998","unstructured":"Fraser T, Badger L. Ensuring continuity during dynamic security policy reconfiguration in DTE. In: Proceedings of 1998 IEEE Symposium on Research in Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1998. 15\u201326"},{"key":"2014_CR24","first-page":"232","volume-title":"Proceedings of 1986 IEEE Symposium on Research in Security and Privacy","author":"J. T. Haigh","year":"1986","unstructured":"Haigh J T, Young W D. Extending the noninterference version of MLS for SAT. In: Proceedings of 1986 IEEE Symposium on Research in Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1986, 232\u2013239"},{"key":"2014_CR25","unstructured":"Ji Q G, Tang L Y, Sheng Q N, ERCIST OS V4.0 security policy formal model and its applications (in Chinese), Engineering Research Center for Information Security Technology, the technical documentation of the \u201cstructured protection class\u201d secure operating system, Mar. 2003"},{"issue":"2","key":"2014_CR26","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1145\/501963.501966","volume":"4","author":"T. Jaeger","year":"2001","unstructured":"Jaeger T, Tidswell J E. Practical safety in flexible access control models. ACM Transactions on Information and System Security, 2001, 4(2): 158\u2013190","journal-title":"ACM Transactions on Information and System Security"},{"key":"2014_CR27","doi-asserted-by":"crossref","unstructured":"Hoffman J. Implementing RBAC on a type enforced system Proc. 13th Annual Computer Security Applications Conference, December 1997, 158\u2013163","DOI":"10.1109\/CSAC.1997.646185"}],"container-title":["Science in China Series F: Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-006-2014-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-006-2014-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-006-2014-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T03:24:17Z","timestamp":1736565857000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-006-2014-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["2014"],"URL":"https:\/\/doi.org\/10.1007\/s11432-006-2014-6","relation":{},"ISSN":["1009-2757","1862-2836"],"issn-type":[{"type":"print","value":"1009-2757"},{"type":"electronic","value":"1862-2836"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}