{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T22:49:50Z","timestamp":1649026190654},"reference-count":33,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1993,1,1]],"date-time":"1993-01-01T00:00:00Z","timestamp":725846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessors and Microsystems"],"published-print":{"date-parts":[[1993,1]]},"DOI":"10.1016\/0141-9331(93)90044-8","type":"journal-article","created":{"date-parts":[[2003,3,15]],"date-time":"2003-03-15T06:33:26Z","timestamp":1047710006000},"page":"139-146","source":"Crossref","is-referenced-by-count":1,"title":["A model for security and protection in persistent systems"],"prefix":"10.1016","volume":"17","author":[{"given":"JL","family":"Keedy","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"No 4","key":"10.1016\/0141-9331(93)90044-8_BIB1","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1093\/comjnl\/26.4.360","article-title":"An approach to persistent programming","volume":"Vol 26","author":"Atkinson","year":"1983","journal-title":"Comput. J."},{"key":"10.1016\/0141-9331(93)90044-8_BIB2","author":"Atkinson","year":"1988"},{"key":"10.1016\/0141-9331(93)90044-8_BIB3","author":"Morrison","year":"1989"},{"key":"10.1016\/0141-9331(93)90044-8_BIB4","article-title":"Persistent object stores","volume":"71","author":"Brown","year":"1989"},{"key":"10.1016\/0141-9331(93)90044-8_BIB5","first-page":"339","article-title":"Information distribution aspects of design methodology","author":"Parnas","year":"1971"},{"issue":"No 12","key":"10.1016\/0141-9331(93)90044-8_BIB6","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1145\/361598.361623","article-title":"On the criteria to be used in decomposing systems into modules","volume":"Vol 15","author":"Parnas","year":"1972","journal-title":"Comm. ACM"},{"issue":"No 2","key":"10.1016\/0141-9331(93)90044-8_BIB7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/850657.850658","article-title":"On the duality of operating system structures","volume":"Vol 13","author":"Lauer","year":"1979","journal-title":"ACM Oper. Syst. Rev."},{"issue":"No 3","key":"10.1016\/0141-9331(93)90044-8_BIB8","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/365230.365252","article-title":"Programming semantics for multiprogrammed computations","volume":"Vol 9","author":"Dennis","year":"1966","journal-title":"Comm. ACM"},{"issue":"No 7","key":"10.1016\/0141-9331(93)90044-8_BIB9","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1145\/361011.361070","article-title":"Capability based addressing","volume":"Vol 17","author":"Fabry","year":"1974","journal-title":"Comm. ACM"},{"issue":"No 3","key":"10.1016\/0141-9331(93)90044-8_BIB10","first-page":"245","article-title":"Security and protection of data in the IBM System\/38","volume":"Vol 8","author":"Berstis","year":"1980","journal-title":"ACM Comput. Archit. News"},{"key":"10.1016\/0141-9331(93)90044-8_BIB11","series-title":"IBM System\/38 Technical Developments","first-page":"5154","article-title":"System\/38 addressing and authorization","author":"Berstis","year":"1978"},{"key":"10.1016\/0141-9331(93)90044-8_BIB12","first-page":"369","article-title":"The Rice research computer \u2014 a tagged architecture","volume":"Vol 40","author":"Feustal","year":"1972"},{"key":"10.1016\/0141-9331(93)90044-8_BIB13","author":"Organick","year":"1973"},{"key":"10.1016\/0141-9331(93)90044-8_BIB14","series-title":"Proceedings of the 5th Princetown Symposium on Information Sciences and Systems 1971","first-page":"18","article-title":"Protection","volume":"Vol 8","author":"Lampson","year":"1974"},{"issue":"No 5","key":"10.1016\/0141-9331(93)90044-8_BIB15","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1145\/42411.42412","article-title":"Stalking the wiley hacker","volume":"Vol 31","author":"Stoll","year":"1988","journal-title":"Comm. ACM"},{"key":"10.1016\/0141-9331(93)90044-8_BIB16","series-title":"Proceedings of the 18th Hawaii International Conference on Systems Sciences","first-page":"515","article-title":"MONADS-PC: a capability based workstation to support software engineering","author":"Rosenberg","year":"1985"},{"key":"10.1016\/0141-9331(93)90044-8_BIB17","series-title":"Proceedings of the International Workshop on Persistent Object Systems","first-page":"202","article-title":"Support for objects in the MONADS architecture","author":"Keedy","year":"1989"},{"key":"10.1016\/0141-9331(93)90044-8_BIB18","unstructured":"Rosenberg, J, Keedy, J L and Abramson, D'Addressing mechanisms for large virtual memories' Comput. J. to appear"},{"key":"10.1016\/0141-9331(93)90044-8_BIB19","series-title":"Security and Persistence","first-page":"188","article-title":"A secure RISC-based architecture supporting data persistence","author":"Koch","year":"1990"},{"key":"10.1016\/0141-9331(93)90044-8_BIB20","series-title":"Proceedings of the 22nd Hawaii International Conference on System Sciences","first-page":"338","article-title":"A massive memory supercomputer","author":"Rosenberg","year":"1989"},{"key":"10.1016\/0141-9331(93)90044-8_BIB21","series-title":"Proceedings of the International Workshop on Persistent Object Systems","first-page":"377","article-title":"A capability-based massive memory computer","author":"Rosenberg","year":"1990"},{"key":"10.1016\/0141-9331(93)90044-8_BIB22","series-title":"Proceedings of the 25th Hawaii International Conference on System Sciences","article-title":"Persistent protected modules and persistent processes as the basis for a more secure operating system","author":"Keedy","year":"1992"},{"key":"10.1016\/0141-9331(93)90044-8_BIB23","series-title":"IFIP-80, Proceedings of the 8th World Computer Congress","first-page":"337","article-title":"Paging and small segments: a memory management model","author":"Keedy","year":"1980"},{"key":"10.1016\/0141-9331(93)90044-8_BIB24","series-title":"Proceedings of the 18th Hawaii Conference on System Sciences","first-page":"515","article-title":"Implementing a large virtual memory in a distributed computing system","author":"Abramson","year":"1985"},{"key":"10.1016\/0141-9331(93)90044-8_BIB25","series-title":"Proceedings of the IFIP Conference on Distributed Systems","first-page":"105","article-title":"Addressing objects in a very large distributed system","author":"Br\u00f6ssler","year":"1987"},{"key":"10.1016\/0141-9331(93)90044-8_BIB26","series-title":"Security and Persistence, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information","first-page":"106","article-title":"Capabilities and encryption: the ultimate defence against security attacks?","author":"Freisleben","year":"1990"},{"key":"10.1016\/0141-9331(93)90044-8_BIB27","series-title":"12. GI\/ITG-Fachtagung Architektur von Rechensystemen","article-title":"Security in a persistent distributed operating system","author":"Keedy","year":"1992"},{"key":"10.1016\/0141-9331(93)90044-8_BIB28","series-title":"Security and Persistence, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information Bremen","first-page":"155","article-title":"A layered persistent architecture for Napier88","author":"Brown","year":"1990"},{"key":"10.1016\/0141-9331(93)90044-8_BIB29","series-title":"Security and Persistence, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information","first-page":"229","article-title":"Stability in a persistent store based on a large virtual memory","author":"Rosenberg","year":"1990"},{"key":"10.1016\/0141-9331(93)90044-8_BIB30","series-title":"Security and Persistence, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information","first-page":"246","article-title":"Stability in a network of MONADS-PC computers","author":"Henskens","year":"1990"},{"key":"10.1016\/0141-9331(93)90044-8_BIB31","series-title":"Security and Persistence, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information","first-page":"319","article-title":"Transactions in a segmented single level store architecture","author":"Br\u00f6ssler","year":"1990"},{"key":"10.1016\/0141-9331(93)90044-8_BIB32","unstructured":"Trusted Computer System Evaluation Criteria US Department of Defense"},{"key":"10.1016\/0141-9331(93)90044-8_BIB33","series-title":"IT Security Criteria: Criteria for the Evaluation of Trustworthiness of Information Technology Systems","year":"1989"}],"container-title":["Microprocessors and Microsystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0141933193900448?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0141933193900448?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T08:28:46Z","timestamp":1553502526000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0141933193900448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,1]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,1]]}},"alternative-id":["0141933193900448"],"URL":"https:\/\/doi.org\/10.1016\/0141-9331(93)90044-8","relation":{},"ISSN":["0141-9331"],"issn-type":[{"value":"0141-9331","type":"print"}],"subject":[],"published":{"date-parts":[[1993,1]]}}}