{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T00:54:13Z","timestamp":1648515253967},"reference-count":24,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1993,1,1]],"date-time":"1993-01-01T00:00:00Z","timestamp":725846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessors and Microsystems"],"published-print":{"date-parts":[[1993,1]]},"DOI":"10.1016\/0141-9331(93)90048-c","type":"journal-article","created":{"date-parts":[[2003,3,15]],"date-time":"2003-03-15T06:33:26Z","timestamp":1047710006000},"page":"183-192","source":"Crossref","is-referenced-by-count":0,"title":["Persistent system architectures: a comparison"],"prefix":"10.1016","volume":"17","author":[{"given":"Manfred","family":"Reitenspie\u00df","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/0141-9331(93)90048-C_BIB1","series-title":"Security and Persistence","year":"1990"},{"key":"10.1016\/0141-9331(93)90048-C_BIB2","volume":"V1.2","year":"1992"},{"key":"10.1016\/0141-9331(93)90048-C_BIB3","year":"1992"},{"key":"10.1016\/0141-9331(93)90048-C_BIB4","series-title":"Security in Computing","author":"Pfleeger","year":"1989"},{"key":"10.1016\/0141-9331(93)90048-C_BIB5","first-page":"68","article-title":"Methoden und Modelle der Fehlertoleranz","volume":"Vol 9","author":"Belli","year":"1986","journal-title":"Inform. Spektr."},{"key":"10.1016\/0141-9331(93)90048-C_BIB6","article-title":"Modelling security in distributed systems","author":"Riess","year":"1989"},{"key":"10.1016\/0141-9331(93)90048-C_BIB7","series-title":"Security and Persistence","article-title":"Persistent languages and architectures","author":"Morrison","year":"1990"},{"key":"10.1016\/0141-9331(93)90048-C_BIB8","series-title":"X\/Open Portability Guide X\/Open Company Ltd","year":"1989"},{"key":"10.1016\/0141-9331(93)90048-C_BIB9","year":"1988"},{"key":"10.1016\/0141-9331(93)90048-C_BIB10","series-title":"Operating Systems: An advanced course","article-title":"Notes on database operating systems","author":"Gray","year":"1978"},{"key":"10.1016\/0141-9331(93)90048-C_BIB11","series-title":"Programming in Ada","author":"Barnes","year":"1982"},{"key":"10.1016\/0141-9331(93)90048-C_BIB12","series-title":"Programmiermethodik mit Ada","author":"Goos","year":"1987"},{"key":"10.1016\/0141-9331(93)90048-C_BIB13","series-title":"Winter 1990 Usenix Technical Conference","article-title":"UNIX System V Release 4.0 Internals \u2014 Introduction","year":"1990"},{"issue":"No 7","key":"10.1016\/0141-9331(93)90048-C_BIB14","doi-asserted-by":"crossref","DOI":"10.1145\/361011.361070","article-title":"Capability based addressing","volume":"Vol 17","author":"Fabry","year":"1974","journal-title":"Comm. ACM"},{"key":"10.1016\/0141-9331(93)90048-C_BIB15","series-title":"Security and Persistence","first-page":"3","article-title":"Capabilities and security","author":"Needham","year":"1990"},{"key":"10.1016\/0141-9331(93)90048-C_BIB16","series-title":"Posix Presentation","article-title":"Kerberos Version 5","author":"Schiller","year":"1990"},{"key":"10.1016\/0141-9331(93)90048-C_BIB17","series-title":"DOD 5200.28-STD","article-title":"DoD trusted computer system evaluation criteria","year":"1985"},{"issue":"No 4","key":"10.1016\/0141-9331(93)90048-C_BIB18","doi-asserted-by":"crossref","DOI":"10.1145\/356678.356682","article-title":"Operating system structures to support security and reliable software","volume":"Vol 8","author":"Linden","year":"1976","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/0141-9331(93)90048-C_BIB19","series-title":"CCITT X.500 series: The Directory Geneva","year":"1988"},{"key":"10.1016\/0141-9331(93)90048-C_BIB20","year":"1991"},{"key":"10.1016\/0141-9331(93)90048-C_BIB21","article-title":"BiiN TM solutions to Ada development issues","author":"Czerniakiewicz","year":"1988"},{"key":"10.1016\/0141-9331(93)90048-C_BIB22","series-title":"Workshop on Operating Systems for Mission Critical Computing","article-title":"The BiiN mission critical computer architecture","author":"Pollack","year":"1989"},{"key":"10.1016\/0141-9331(93)90048-C_BIB23","first-page":"202","article-title":"An architecture supporting security and persistent object storage","author":"Reitenspiess","year":"1990"},{"key":"10.1016\/0141-9331(93)90048-C_BIB24","series-title":"Proc. of Italian UNIX Systems User Group","article-title":"SINIX Security \u2014 today and the future","author":"Reitenspiess","year":"1991"}],"container-title":["Microprocessors and Microsystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014193319390048C?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014193319390048C?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T08:28:40Z","timestamp":1553502520000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/014193319390048C"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,1]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,1]]}},"alternative-id":["014193319390048C"],"URL":"https:\/\/doi.org\/10.1016\/0141-9331(93)90048-c","relation":{},"ISSN":["0141-9331"],"issn-type":[{"value":"0141-9331","type":"print"}],"subject":[],"published":{"date-parts":[[1993,1]]}}}