{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T19:11:03Z","timestamp":1648581063631},"reference-count":31,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1993,5,1]],"date-time":"1993-05-01T00:00:00Z","timestamp":736214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1993,5]]},"DOI":"10.1016\/0167-4048(93)90118-o","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:52:25Z","timestamp":1034344345000},"page":"285-303","source":"Crossref","is-referenced-by-count":0,"title":["A distributed capability-based architecture for the transform model"],"prefix":"10.1016","volume":"12","author":[{"given":"Ravi S.","family":"Sandhu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gurpreet S.","family":"Suri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/0167-4048(93)90118-O_BIB1","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MC.1983.1654294","article-title":"Digital signatures: a tutorial survey","volume":"16","author":"Akl","year":"1983","journal-title":"Computer"},{"key":"10.1016\/0167-4048(93)90118-O_BIB2","first-page":"184","article-title":"A comparison of commercial and military computer security policies","author":"Clark","year":"1987","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"10.1016\/0167-4048(93)90118-O_BIB3","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/800213.806532","article-title":"Protection in the Hydra operating system","author":"Cohen","year":"1975","journal-title":"5th ACM Symposium on Operating Systems Principles"},{"key":"10.1016\/0167-4048(93)90118-O_BIB4","series-title":"Distributed Systems: An Advanced Course","first-page":"211","article-title":"Protection","author":"Davies","year":"1981"},{"issue":"3","key":"10.1016\/0167-4048(93)90118-O_BIB5","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/365230.365252","article-title":"Programming semantics for multiprogrammed computations","volume":"9","author":"Dennis","year":"1966","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(93)90118-O_BIB6","series-title":"Department of Defense Trusted Computer Systems Evaluation Criteria","year":"1985"},{"key":"10.1016\/0167-4048(93)90118-O_BIB7","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/SECPRI.1989.36277","article-title":"A secure identity-based capability system","author":"Gong","year":"1989","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"10.1016\/0167-4048(93)90118-O_BIB8","first-page":"417","article-title":"Protection: principles and practice","volume":"40","author":"Graham","year":"1972","journal-title":"AFIPS Spring Joint Computer Conference"},{"key":"10.1016\/0167-4048(93)90118-O_BIB9","first-page":"219","article-title":"Command authorization as a component of information integrity","author":"Harkness","year":"1988","journal-title":"Computer Security Foundations Workshop"},{"issue":"8","key":"10.1016\/0167-4048(93)90118-O_BIB10","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","article-title":"Protection in operating systems","volume":"19","author":"Harrison","year":"1976","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(93)90118-O_BIB11","series-title":"Foundations of Secure Computations","article-title":"Monotonic protection systems","author":"Harrison","year":"1978"},{"key":"10.1016\/0167-4048(93)90118-O_BIB12","first-page":"437","article-title":"Protection","author":"Lampson","year":"1971","journal-title":"5th Princeton Symposium on Information Science and Systems"},{"key":"10.1016\/0167-4048(93)90118-O_BIB13","series-title":"Capability-Based Computer Systems","author":"Levy","year":"1984"},{"issue":"4","key":"10.1016\/0167-4048(93)90118-O_BIB14","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1145\/356678.356682","article-title":"Operating system structures to support security and reliable software","volume":"8","author":"Linden","year":"1976","journal-title":"ACM Computing Surveys"},{"issue":"3","key":"10.1016\/0167-4048(93)90118-O_BIB15","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1145\/322017.322025","article-title":"A linear time algorithm for deciding subject security","volume":"24","author":"Lipton","year":"1977","journal-title":"J. ACM"},{"issue":"6","key":"10.1016\/0167-4048(93)90118-O_BIB16","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1109\/TSE.1982.236020","article-title":"Unidirectional transport of rights and take-grant control","volume":"SE-8","author":"Lockman","year":"1982","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0167-4048(93)90118-O_BIB17","first-page":"543","article-title":"Synergistic authorization in database systems","author":"Minsky","year":"1981","journal-title":"7th International Conference on Very Large Data Base"},{"issue":"4","key":"10.1016\/0167-4048(93)90118-O_BIB18","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1145\/1780.1786","article-title":"Selective and locally controlled transport of privileges","volume":"6","author":"Minsky","year":"1984","journal-title":"ACM Trans. Programming Languages and Systems"},{"issue":"2","key":"10.1016\/0167-4048(93)90118-O_BIB19","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/2.19","article-title":"The source of authority for commercial access control","volume":"21","author":"Moffett","year":"1988","journal-title":"IEEE Computer"},{"issue":"5","key":"10.1016\/0167-4048(93)90118-O_BIB20","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/2.53354","article-title":"Amoeba: a distributed operating system for the 1990s","volume":"23","author":"Mullender","year":"1990","journal-title":"IEEE Computer"},{"issue":"9","key":"10.1016\/0167-4048(93)90118-O_BIB21","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","article-title":"The protection of information in computer systems","volume":"63","author":"Saltzer","year":"1975","journal-title":"Proc. IEEE"},{"key":"10.1016\/0167-4048(93)90118-O_BIB22","series-title":"PhD thesis","article-title":"Design and Analysis of Protection Schemes Based on the Send-Receive Transport Mechanism","author":"Sandhu","year":"1983"},{"key":"10.1016\/0167-4048(93)90118-O_BIB23","first-page":"61","article-title":"Some owner based schemes with dynamic groups in the schematic protection model","author":"Sandhu","year":"1986","journal-title":"IEEE Symposium on Security and Privacy"},{"issue":"2","key":"10.1016\/0167-4048(93)90118-O_BIB24","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1145\/42282.42286","article-title":"The schematic protection model: its definition and analysis for acyclic attenuating schemes","volume":"35","author":"Sandhu","year":"1988","journal-title":"J. ACM"},{"key":"10.1016\/0167-4048(93)90118-O_BIB25","first-page":"188","article-title":"Expressive power of the schematic protection model","author":"Sandhu","year":"1988","journal-title":"Computer Security Foundations Workshop"},{"key":"10.1016\/0167-4048(93)90118-O_BIB26","first-page":"282","article-title":"Transaction control expressions for separation of duties","author":"Sandhu","year":"1988","journal-title":"4th Aerospace Computer Security Applications Conference"},{"key":"10.1016\/0167-4048(93)90118-O_BIB27","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1109\/SECPRI.1989.36300","article-title":"Transformation of access rights","author":"Sandhu","year":"1989","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"10.1016\/0167-4048(93)90118-O_BIB28","series-title":"Database Security IV: Status and Prospects","first-page":"179","article-title":"Separation of duties in computerized information systems","author":"Sandhu","year":"1991"},{"key":"10.1016\/0167-4048(93)90118-O_BIB29","series-title":"Operating System Concepts","author":"Silberschatz","year":"1991"},{"key":"10.1016\/0167-4048(93)90118-O_BIB30","series-title":"Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS)","year":"1987"},{"issue":"6","key":"10.1016\/0167-4048(93)90118-O_BIB31","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1145\/355616.364017","article-title":"Hydra: the kernel of a multiprocessor operating system","volume":"17","author":"Wulf","year":"1974","journal-title":"Commun. ACM"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489390118O?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489390118O?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:57:36Z","timestamp":1554955056000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489390118O"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,5]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,5]]}},"alternative-id":["016740489390118O"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(93)90118-o","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1993,5]]}}}