{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T03:04:56Z","timestamp":1692327896144},"reference-count":30,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2000,3]]},"DOI":"10.1016\/s0167-4048(00)88615-0","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T13:56:12Z","timestamp":1027605372000},"page":"267-281","source":"Crossref","is-referenced-by-count":15,"title":["Achieving Interoperability in a Multiple-Security- Policies Environment"],"prefix":"10.1016","volume":"19","author":[{"given":"S.A.","family":"Kokolakis","sequence":"first","affiliation":[]},{"given":"E.A.","family":"Kiountouzis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(00)88615-0_BIB1","doi-asserted-by":"crossref","unstructured":"R. Frank, Security issues in the Virtual Corporation, Computers and Security, 15(6), (1996), 471-476.","DOI":"10.1016\/S0167-4048(97)83120-3"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB2","unstructured":"W. Davidoff and M. Malone, The Virtual Corporation, Edward Burlingame Books\/Harper Business, New York, 1993."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB3","unstructured":"J. Martin, Cybercorp: The New Business Revolution, Amacom, NY, 1996."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB4","unstructured":"M. Best, The new competition: institutions of industrial restructuring, Polity Press, 1990."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB5","doi-asserted-by":"crossref","unstructured":"A. Mowshowitz, Virtual Organisation, Communications of the ACM, 40(9), (1997), 30-37.","DOI":"10.1145\/260750.260759"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB6","unstructured":"B. Schwarzer, S. Zerbe and H.Krcmar, New organisational forms and IT, in G. Doukidis et al. (eds), Proc. of the 3rd ECIS \u201995, Athens, Greece, 1995."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB7","doi-asserted-by":"crossref","unstructured":"K. Lindup, The Role of Information Security in Corporate Governance, Computers and Security, 15(6), (1996), 477-485.","DOI":"10.1016\/S0167-4048(97)83121-5"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB8","doi-asserted-by":"crossref","unstructured":"J. Backhouse and G. Dhillon, Structures of responsibility and security of information systems, European Journal of Information Systems, 5(1), (1996), 2-9.","DOI":"10.1057\/ejis.1996.7"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB9","unstructured":"S. Kowalski, Creating confidence through consensus: Using the security by consensus model as a framework for security in open information systems, in D.T. Lindsay and W.L. Price, (eds), Information Security, IFIP\/SEC \u201891, pp. 259-269, Elsevier Science Publ., 1991."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB10","doi-asserted-by":"crossref","unstructured":"H. Hosmer, The multipolicy paradigm for trusted systems, in Proc. of the 1992 New Security Paradigms Workshop, Sept. 1992, Rhode Island, U.S.A., IEEE Press.","DOI":"10.1145\/283751.283768"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB11","doi-asserted-by":"crossref","unstructured":"K. Lindup, A new model for information security policies, Computers and Security, 14(6), (1995), 691-695.","DOI":"10.1016\/0167-4048(96)81709-3"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB12","doi-asserted-by":"crossref","unstructured":"C. Cresson Wood, Writing InfoSec Policies, Computers and Security, 14(6), (1995), 667-674.","DOI":"10.1016\/0167-4048(96)81706-8"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB13","unstructured":"C. Cresson Wood, Security policies made easy, Baseline Software, USA, 1991."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB14","unstructured":"CCTA, The CCTA Risk Analysis and Management Methodology (CRAMM) User Guide, version 3.0, HMSO, U.K., 1996."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB15","doi-asserted-by":"crossref","unstructured":"D. Brewer and M. Nash, The Chinese Wall Security Policy, in Proc. of the 1989 IEEE Symposium on Security and Privacy, 1989.","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB16","unstructured":"H. Hosmer, Metapolicies II, in Proc. of the 15th National Computer Security Conference, Baltimore, MD, 1992."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB17","doi-asserted-by":"crossref","unstructured":"E. Kiountouzis and S. Kokolakis, An analyst\u2019s view of IS security, in S.K. Katsikas and D. Gritzalis (eds), Information Systems Security: Facing the Information Society of the 21st Century, Chapman & Hall, 1996.","DOI":"10.1007\/978-1-5041-2919-0_3"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB18","doi-asserted-by":"crossref","unstructured":"P. Checkland, Information systems thinking: time to unite?, International Journal of Information Management, 8, (1988), 239-248.","DOI":"10.1016\/0268-4012(88)90031-X"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB19","doi-asserted-by":"crossref","unstructured":"D. Gangopadhyay and T. Barsalou, On the semantic equivalence of heterogeneous populations in multimodel, multidatabase systems, SIGMOD Record 20(4), 1991.","DOI":"10.1145\/141356.141370"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB20","doi-asserted-by":"crossref","unstructured":"G. Spanoudakis and P. Constantopoulos, Integrating specifications: a similarity reasoning approach, Automated Software Engineering Journal, 2(4), (1995), 311-342.","DOI":"10.1007\/BF00871803"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB21","doi-asserted-by":"crossref","unstructured":"A. Sheth and J. Larson, Federated database systems for managing distributed, heterogeneous and autonomous databases, ACM Computing Surveys, 22(3), 1990.","DOI":"10.1145\/96602.96604"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB22","doi-asserted-by":"crossref","unstructured":"C. Goh, S. Madnick and M. Siegel, Context interchange: overcoming the challenges of large-scale interoperable database systems in a dynamic environment, in Proc. of the 3rd International Conference on Information and Knowledge Management, Gaithersurg, Maryland, 1994.","DOI":"10.1145\/191246.191306"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB23","doi-asserted-by":"crossref","unstructured":"M. Bright, A. Hurson and S. Pakzard, Automated resolution of semantic heterogeneity in multidatabases, ACM Transactions on Database Systems, 19(2), (1994), 212-253.","DOI":"10.1145\/176567.176569"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB24","unstructured":"Commission of European Communities, Glossary of Information Systems Security, Commission of EU, DGXIII, contract S2001, Brussels, Luxembourg, 1993."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB25","unstructured":"F. Stowell and D. West, Client-led design: a systemic approach to information systems definition, McGraw-Hill, London, 1994."},{"key":"10.1016\/S0167-4048(00)88615-0_BIB26","doi-asserted-by":"crossref","unstructured":"A. Hartmann, Comprehensive information technology security: a new approach to respond ethical and social issues surrounding information security in the 21st century, in J. Ellof and S. vonSolms (eds), Information Security-the Next Decade, IFIP\/SEC \u201995, pp. 590-602, Chapman & Hall, London, 1995.","DOI":"10.1007\/978-0-387-34873-5_43"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB27","doi-asserted-by":"crossref","unstructured":"J. Mylopoulos, A. Borgida, J. Matthias and M. Koubarakis, Telos: representing knowledge about information systems. ACM Transactions on Information Systems, 8(4), (1990), 325-362.","DOI":"10.1145\/102675.102676"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB28","doi-asserted-by":"crossref","unstructured":"S. Hinde, Recent security surveys, Computers and Security, 17, (1998), 207-210.","DOI":"10.1016\/S0167-4048(98)80311-8"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB29","doi-asserted-by":"crossref","unstructured":"S. Gritzalis, J. Iliadis and S. Oikonomopoulos, Distributed component software security issues on deploying a secure electronic marketplace, Information Management and Computer Security Journal, 8(1), (2000), 5-13.","DOI":"10.1108\/09685220010312290"},{"key":"10.1016\/S0167-4048(00)88615-0_BIB30","unstructured":"P. Trommler, The application of profile security model for downloaded executable content, in G. Papp and R. Posch (eds), Global IT security: proceedings of the IFIP\/SEC \u201998, Austrian Computer Society, Vienna, 1998."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404800886150?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404800886150?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T21:11:39Z","timestamp":1578517899000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404800886150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2000,3]]}},"alternative-id":["S0167404800886150"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(00)88615-0","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2000,3]]}}}