{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T23:43:23Z","timestamp":1649115803270},"reference-count":11,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1983,6,1]],"date-time":"1983-06-01T00:00:00Z","timestamp":423273600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1983,6]]},"DOI":"10.1016\/0167-4048(83)90053-6","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T14:05:22Z","timestamp":1034345122000},"page":"153-162","source":"Crossref","is-referenced-by-count":0,"title":["The use of architectural principles in the design of certifiably secure systems"],"prefix":"10.1016","volume":"2","author":[{"given":"David A.","family":"Bonyun","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(83)90053-6_BIB1","doi-asserted-by":"crossref","DOI":"10.21236\/AD0772806","author":"Anderson","year":"1972","journal-title":"Computer Security Technology Planning Study"},{"key":"10.1016\/0167-4048(83)90053-6_BIB2","series-title":"Secure Computer System: Unified Exposition and Multics Interpretation","author":"Bell","year":"1976"},{"key":"10.1016\/0167-4048(83)90053-6_BIB3","first-page":"48","article-title":"Secure Computing","author":"Boebert","year":"1977","journal-title":"IEEE Symposium on Trends and Applications: Computer Security and Integrity"},{"key":"10.1016\/0167-4048(83)90053-6_BIB4","series-title":"Ottawa-Euclid Language Specification","author":"Crowe","year":"1982"},{"issue":"No. 7","key":"10.1016\/0167-4048(83)90053-6_BIB5","doi-asserted-by":"crossref","DOI":"10.1145\/953863.953866","article-title":"DOD-1: The Summing up","volume":"Vol. 13","author":"Dijkstra","year":"1978","journal-title":"SIGPLAN NOTICES"},{"issue":"No. 2","key":"10.1016\/0167-4048(83)90053-6_BIB6","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/358549.358561","article-title":"The Emperor's Old Clothes","volume":"Vol. 24","author":"Hoare","year":"1981","journal-title":"CACM"},{"issue":"No. 2","key":"10.1016\/0167-4048(83)90053-6_BIB7","doi-asserted-by":"crossref","DOI":"10.1145\/954666.971189","article-title":"Report on the Programming Language Euclid","volume":"Vol. 12","author":"Lampson","year":"1977","journal-title":"SIGPLAN NOTICES"},{"issue":"No. 3","key":"10.1016\/0167-4048(83)90053-6_BIB8","doi-asserted-by":"crossref","DOI":"10.1145\/356850.356852","article-title":"Formal Models for Computer Security","volume":"Vol. 13","author":"Landwehr","year":"1981","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0167-4048(83)90053-6_BIB9","unstructured":"C. Landwehr and C. Heitmeyer, Military Message Systems: Requirements and Security Model, NRL Memorandum Report 4925, Naval Research Laboratory, Washington D.C."},{"key":"10.1016\/0167-4048(83)90053-6_BIB10","series-title":"Toronto Euclid Specifications","author":"Pase","year":"1980"},{"key":"10.1016\/0167-4048(83)90053-6_BIB11","series-title":"Certifiably Secure Systems: Technologies, Prospects and Proposals","author":"Rushby","year":"1982"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404883900536?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404883900536?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,5,26]],"date-time":"2021-05-26T17:28:28Z","timestamp":1622050108000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404883900536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983,6]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1983,6]]}},"alternative-id":["0167404883900536"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(83)90053-6","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1983,6]]}}}