{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T21:58:11Z","timestamp":1717538291030},"reference-count":12,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1988,2,1]],"date-time":"1988-02-01T00:00:00Z","timestamp":570672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1988,2]]},"DOI":"10.1016\/0167-4048(88)90506-8","type":"journal-article","created":{"date-parts":[[2002,9,17]],"date-time":"2002-09-17T17:38:09Z","timestamp":1032284289000},"page":"73-82","source":"Crossref","is-referenced-by-count":12,"title":["Element-level classification with A1 assurance"],"prefix":"10.1016","volume":"7","author":[{"given":"Teresa F.","family":"Lunt","sequence":"first","affiliation":[]},{"given":"Dorothy E.","family":"Denning","sequence":"additional","affiliation":[]},{"given":"Roger R.","family":"Schell","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Heckman","sequence":"additional","affiliation":[]},{"given":"William R.","family":"Shockley","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(88)90506-8_BIB1","year":"1985"},{"issue":"No. 2","key":"10.1016\/0167-4048(88)90506-8_BIB2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TSE.1987.232889","article-title":"Views for Multilevel Database Security","volume":"Volume 13","author":"Denning","year":"1987","journal-title":"IEEE Trans. on Software Eng."},{"key":"10.1016\/0167-4048(88)90506-8_BIB3","series-title":"Security Policy and Interpretation for a Class A1 Multilevel Secure Relational Database, System","author":"Denning","year":"1986"},{"key":"10.1016\/0167-4048(88)90506-8_BIB4","series-title":"Proc. 8th National Computer Security Conf.","first-page":"108","article-title":"Designing the GEMSOS Security Kernel for Security and Performance","author":"Schell","year":"1985"},{"key":"10.1016\/0167-4048(88)90506-8_BIB5","volume":"Volume I","author":"Date","year":"1986"},{"key":"10.1016\/0167-4048(88)90506-8_BIB6","article-title":"Secure Data Management System","author":"Hinke","year":"1975"},{"key":"10.1016\/0167-4048(88)90506-8_BIB7","article-title":"A Model of a Protected Data Management System","author":"Grohn","year":"1976"},{"key":"10.1016\/0167-4048(88)90506-8_BIB8","article-title":"Multilevel Data Store Design (MLDS)","author":"Garvey","year":"1986"},{"key":"10.1016\/0167-4048(88)90506-8_BIB9","series-title":"Proc. 1982 Symp. on Security and Privacy","first-page":"21","article-title":"A Preliminary Naval Surveillance DBMS Security Model","author":"Graubert","year":"1982"},{"key":"10.1016\/0167-4048(88)90506-8_BIB10","series-title":"Proceedings of the 1987 IEEE Symposium on Security and Privacy","article-title":"A Multilevel Relational Data Model","author":"Denning","year":"1987"},{"key":"10.1016\/0167-4048(88)90506-8_BIB11","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","article-title":"Secure Computer Systems: Unified Exposition and Multics Interpretation","author":"Bell","year":"1976"},{"issue":"No. 8","key":"10.1016\/0167-4048(88)90506-8_BIB12","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","article-title":"Protection in Operating Systems","volume":"Volume 19","author":"Harrison","year":"1976","journal-title":"Comm. ACM"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404888905068?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404888905068?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T14:58:14Z","timestamp":1554821894000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404888905068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,2]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1988,2]]}},"alternative-id":["0167404888905068"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(88)90506-8","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1988,2]]}}}