{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T19:12:21Z","timestamp":1694459541923},"reference-count":21,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1996,1]]},"DOI":"10.1016\/0167-4048(95)00023-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T08:08:45Z","timestamp":1027584525000},"page":"55-71","source":"Crossref","is-referenced-by-count":11,"title":["Security classification for documents"],"prefix":"10.1016","volume":"15","author":[{"given":"J.H.P.","family":"Eloff","sequence":"first","affiliation":[]},{"given":"R.","family":"Holbein","sequence":"additional","affiliation":[]},{"given":"S.","family":"Teufel","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(95)00023-2_BIB1","article-title":"EDI in logistischen Leistungsketten","volume":"3","author":"Bumba","year":"1992","journal-title":"Informationstechnik"},{"key":"10.1016\/0167-4048(95)00023-2_BIB2","series-title":"The Diffusion of Electronic Data Interchange","author":"Pfeiffer","year":"1990"},{"key":"10.1016\/0167-4048(95)00023-2_BIB3","article-title":"EDI als Wettbewerbsvorteil im detailhandel","volume":"2","author":"Anner","year":"1990","journal-title":"Thexis"},{"key":"10.1016\/0167-4048(95)00023-2_BIB4","series-title":"Proceedings of 6th International Conference and Workshop on Database and Expert Systems Applications DEXA '95","article-title":"Information security in computer supported cooperative work","author":"Teufel","year":"1995"},{"key":"10.1016\/0167-4048(95)00023-2_BIB5","series-title":"Security of Information and Data","author":"Daler","year":"1989"},{"key":"10.1016\/0167-4048(95)00023-2_BIB6","series-title":"Datenschutz und Arbeitsplatzrechner","author":"Faust","year":"1991"},{"key":"10.1016\/0167-4048(95)00023-2_BIB7","first-page":"333","article-title":"Document Security","author":"Smith","year":"1992"},{"key":"10.1016\/0167-4048(95)00023-2_BIB8","series-title":"IFIP TC11 Ninth International Conference on Information Security, IFIP\/SEC '93","first-page":"375","article-title":"Information system security and fraud prevention in office automation systems","author":"Stanley","year":"1993"},{"key":"10.1016\/0167-4048(95)00023-2_BIB9","series-title":"Effective Information Security Management","author":"Wood","year":"1991"},{"key":"10.1016\/0167-4048(95)00023-2_BIB10","series-title":"IFIP TC11 Tenth International Conference on Information Security SEC '94","article-title":"Secure information exchange in organizations","author":"Holbein","year":"1994"},{"key":"10.1016\/0167-4048(95)00023-2_BIB11","series-title":"A Formal Security Model Based on an Object-oriented Data Model, 93.41","author":"Jonscher","year":"1993"},{"issue":"11","key":"10.1016\/0167-4048(95)00023-2_BIB12","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","article-title":"Lattice-based access control models","volume":"26","author":"Sandhu","year":"1993","journal-title":"Computer (IEEE)"},{"key":"10.1016\/0167-4048(95)00023-2_BIB13","series-title":"Automatic Text Processing\u2014The Transformation, Analysis and Retrieval of Information by Computer","author":"Salton","year":"1989"},{"issue":"5","key":"10.1016\/0167-4048(95)00023-2_BIB14","first-page":"444","article-title":"Stufen der integration von daten- und dokumentenverarbeitung\u2014dargestellt am beispiel eines maschinenbau-unternehmens","volume":"36","author":"Mertens","year":"1994","journal-title":"Wirtschaftsinformatik"},{"key":"10.1016\/0167-4048(95)00023-2_BIB15","article-title":"Offene B\u00fcrokommunikation\u2014Inner- und zwischenbetrieblicher Informationsaustausch","author":"Abdallah","year":"1993"},{"key":"10.1016\/0167-4048(95)00023-2_BIB16","article-title":"Information Processing\u2014Text and Office Systems\u2014Office Document Architecture (ODA) and Interchange Formats","author":"ISO","year":"1989"},{"issue":"3","key":"10.1016\/0167-4048(95)00023-2_BIB17","article-title":"Wird ODA\/ODIF b\u00fcrosysteme ver\u00e4ndern?","volume":"32","author":"Kr\u00f6nert","year":"1990","journal-title":"Informationstechnik"},{"key":"10.1016\/0167-4048(95)00023-2_BIB18","series-title":"Dokumentenaustausch in Offenen Systemen Einf\u00fchrung in die ISO-Norm 8613: Office Document Architecture (ODA) and Interchange Format","author":"Appelt","year":"1990"},{"key":"10.1016\/0167-4048(95)00023-2_BIB19","article-title":"Information Processing\u2014Text and Office Systems\u2014Office Document Architecture (ODA) and Interchange Format\u2014Part 5: Office Document Interchange Format (ODIF)","author":"ISO","year":"1989"},{"key":"10.1016\/0167-4048(95)00023-2_BIB20","article-title":"Information Processing\u2014Text and Office Systems\u2014Office Document Architecture (ODA) and Interchange Format\u2014Addendum 4: Security","author":"ISO","year":"1990"},{"key":"10.1016\/0167-4048(95)00023-2_BIB21","article-title":"Information Processing\u2014Text and Office Systems\u2014Office Document Architecture (ODA) and Interchange Format\u2014Part 4: Document Profile","author":"ISO","year":"1989"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404895000232?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404895000232?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T20:55:17Z","timestamp":1556657717000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404895000232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1996,1]]}},"alternative-id":["0167404895000232"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(95)00023-2","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1996,1]]}}}