{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T06:55:40Z","timestamp":1648709740155},"reference-count":19,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1989,10,1]],"date-time":"1989-10-01T00:00:00Z","timestamp":623203200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1989,10]]},"DOI":"10.1016\/0167-4048(89)90079-5","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:56:18Z","timestamp":1034344578000},"page":"495-505","source":"Crossref","is-referenced-by-count":2,"title":["An introduction to the SMITE approach to secure computing"],"prefix":"10.1016","volume":"8","author":[{"given":"C.L.","family":"Harrold","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(89)90079-5_BIB1","article-title":"Secure Computer Systems","volume":"Vol. 1\u20133","author":"Bell","year":"1973"},{"key":"10.1016\/0167-4048(89)90079-5_BIB2","article-title":"A comparison of commercial and military policies","author":"Clark","year":"1987","journal-title":"Proc. IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(89)90079-5_BIB3","article-title":"Compartmented mode workstation: results through prototyping","author":"Cummings","year":"1987","journal-title":"Proc. IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(89)90079-5_BIB4","article-title":"The algebraic specification of a targeting computer with an architecture based on procedure values","author":"Foster","year":"1982","journal-title":"Proc. Int. Workshop on High Level Language Computer Architectures"},{"key":"10.1016\/0167-4048(89)90079-5_BIB5","article-title":"Remote capabilities in computer networks","author":"Foster","year":"1986","journal-title":"RSRE Memorandum 3947"},{"key":"10.1016\/0167-4048(89)90079-5_BIB6","series-title":"High Integrity Software","article-title":"The algebraic specification of a target machine: Ten 15","author":"Foster","year":"1989"},{"key":"10.1016\/0167-4048(89)90079-5_BIB7","article-title":"Security policies and security models","author":"Goguen","year":"1982","journal-title":"Proc. IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(89)90079-5_BIB8","article-title":"Formal specification of a secure document control system for SMITE","author":"Harrold","year":"1988","journal-title":"RSRE Rep. 88002"},{"issue":"4","key":"10.1016\/0167-4048(89)90079-5_BIB9","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1093\/comjnl\/6.4.308","article-title":"The mechanical evaluation of expressions","volume":"6","author":"Landin","year":"1964","journal-title":"Comput. J."},{"key":"10.1016\/0167-4048(89)90079-5_BIB10","article-title":"Naming and protection in extendible operating systems","author":"Redell","year":"1974","journal-title":"MIT Tech. Rep. MAC-TR-140"},{"key":"10.1016\/0167-4048(89)90079-5_BIB11","series-title":"The Z Notation: A Reference Manual","author":"Spivey","year":"1988"},{"key":"10.1016\/0167-4048(89)90079-5_BIB12","article-title":"The use of values without names in a programming support environment","author":"Stanley","year":"1985","journal-title":"RSRE Memorandum 3901"},{"key":"10.1016\/0167-4048(89)90079-5_BIB13","unstructured":"P.F. Terry and S.R. Wiseman, A \u201cnew\u201d security policy model, to be presented at the 1989 IEEE Symposium on Security and Privacy."},{"key":"10.1016\/0167-4048(89)90079-5_BIB14","article-title":"Protection and security mechanisms in the SMITE capability computer","author":"Wiseman","year":"1988","journal-title":"RSRE Memorandum 4117"},{"key":"10.1016\/0167-4048(89)90079-5_BIB15","article-title":"The SMITE object oriented backing store","author":"Wiseman","year":"1988","journal-title":"RSRE Memorandum 4147"},{"key":"10.1016\/0167-4048(89)90079-5_BIB16","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/0167-4048(89)90024-2","article-title":"Preventing viruses in computer systems","volume":"8","author":"Wiseman","year":"1989","journal-title":"Comput. Secur."},{"key":"10.1016\/0167-4048(89)90079-5_BIB17","article-title":"The SMITE computer architecture","author":"Wiseman","year":"1988","journal-title":"RSRE Memorandum 4126"},{"key":"10.1016\/0167-4048(89)90079-5_BIB18","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.1988.8107","article-title":"The trusted path between SMITE and the user","author":"Wiseman","year":"1988","journal-title":"Proc. IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(89)90079-5_BIB19","article-title":"A Z specification of the MaCHO interface editor","author":"Wood","year":"1988","journal-title":"RSRE Memorandum 4247"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404889900795?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404889900795?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:53:38Z","timestamp":1554954818000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404889900795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,10]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1989,10]]}},"alternative-id":["0167404889900795"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(89)90079-5","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1989,10]]}}}