{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:24:08Z","timestamp":1759335848871},"reference-count":21,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1995,1]]},"DOI":"10.1016\/0167-4048(95)00006-t","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T23:10:20Z","timestamp":1052781020000},"page":"323-348","source":"Crossref","is-referenced-by-count":1,"title":["Redundant access rights"],"prefix":"10.1016","volume":"14","author":[{"given":"Greg","family":"O'Shea","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(95)00006-T_BIB1","series-title":"Information Technology Security Evaluation Criteria (ITSEC)","author":"Commission of the European Communities","year":"1991"},{"key":"10.1016\/0167-4048(95)00006-T_BIB2","article-title":"Report of the Individual Workshop on Data Integrity","author":"National Institute of Standards and Technology","year":"1989","journal-title":"NIST Special Publication 500-168"},{"key":"10.1016\/0167-4048(95)00006-T_BIB3","article-title":"User Requirements of IT Security Standards","author":"Department of Trade and Industry","year":"1992"},{"key":"10.1016\/0167-4048(95)00006-T_BIB4","series-title":"An Integrated Toolkit for Operating System Security","author":"Rabin","year":"1987"},{"issue":"1","key":"10.1016\/0167-4048(95)00006-T_BIB5","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/775265.775268","article-title":"Protection","volume":"8","author":"Lampson","year":"1974","journal-title":"ACM Oper. Syst. Rev."},{"issue":"5","key":"10.1016\/0167-4048(95)00006-T_BIB6","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1093\/comjnl\/37.5.437","article-title":"On the specification, validation and verification of security in access control systems","volume":"37","author":"O'Shea","year":"1994","journal-title":"Comput. J."},{"key":"10.1016\/0167-4048(95)00006-T_BIB7","article-title":"Department of Defense Trusted Computer System Evaluation Criteria","author":"Department of Defense Computer Security Centre","year":"1985","journal-title":"CSC-STD-002-85"},{"key":"10.1016\/0167-4048(95)00006-T_BIB8","article-title":"The protection of information in computer systems","volume":"63","author":"Saltzer","year":"1975"},{"key":"10.1016\/0167-4048(95)00006-T_BIB9","series-title":"Cryptography and Data Security","author":"Denning","year":"1982"},{"key":"10.1016\/0167-4048(95)00006-T_BIB10","article-title":"Secure Computer Systems: Mathematical Foundations and Model","author":"Bell","year":"1974","journal-title":"MITRE Corp., M74\u2013244"},{"key":"10.1016\/0167-4048(95)00006-T_BIB11","article-title":"Department of Defense Trusted Computer System Evaluation Criteria","author":"Department of Defense Computer Security Centre","year":"1983","journal-title":"CSC-STD-001-83"},{"key":"10.1016\/0167-4048(95)00006-T_BIB12","series-title":"SVR4.1 Enhanced Security: A Technical Overview","author":"UNIX System Laboratories","year":"1991"},{"key":"10.1016\/0167-4048(95)00006-T_BIB13","author":"Sun Microsystems, Inc","year":"1988","journal-title":"Security Features Guide"},{"key":"10.1016\/0167-4048(95)00006-T_BIB14","series-title":"HP-UX System Security","author":"Hewlett-Packard Co","year":"1989"},{"issue":"8","key":"10.1016\/0167-4048(95)00006-T_BIB15","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","article-title":"Protection in operating systems","volume":"9","author":"Harrison","year":"1976","journal-title":"Comm. ACM"},{"key":"10.1016\/0167-4048(95)00006-T_BIB16","series-title":"Proc. 17th Annual Symposium on Foundations of Computer Science","article-title":"A linear time algorithm for deciding security","author":"Jones","year":"1976"},{"key":"10.1016\/0167-4048(95)00006-T_BIB17","series-title":"Information Technology Security Evaluation Methodology (ITSEM)","author":"Commission of the European Communities","year":"1992"},{"key":"10.1016\/0167-4048(95)00006-T_BIB18","series-title":"The Design of the UNIX Operating System","author":"Bach","year":"1986"},{"key":"10.1016\/0167-4048(95)00006-T_BIB19","author":"X\/Open Co. Ltd, UK","year":"1990","journal-title":"X\/Open Guide, Security Guide"},{"key":"10.1016\/0167-4048(95)00006-T_BIB20","article-title":"Portable Operating System Interface for Computer Environments","author":"Institute of Electrical and Electronics Engineers","year":"1990","journal-title":"IEEE P1003.la (Draft)"},{"key":"10.1016\/0167-4048(95)00006-T_BIB21","series-title":"The C Programming Language","author":"Kernighan","year":"1978"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489500006T?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489500006T?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:54:22Z","timestamp":1556672062000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489500006T"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,1]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1995,1]]}},"alternative-id":["016740489500006T"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(95)00006-t","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1995,1]]}}}