{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T06:27:24Z","timestamp":1751869644789},"reference-count":12,"publisher":"Elsevier BV","issue":"5-6","license":[{"start":{"date-parts":[[1999,10,1]],"date-time":"1999-10-01T00:00:00Z","timestamp":938736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[1999,10]]},"DOI":"10.1016\/s0167-739x(99)00021-7","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:32:32Z","timestamp":1027650752000},"page":"713-722","source":"Crossref","is-referenced-by-count":12,"title":["A new model of security for metasystems"],"prefix":"10.1016","volume":"15","author":[{"given":"Steve J.","family":"Chapin","sequence":"first","affiliation":[]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"William A.","family":"Wulf","sequence":"additional","affiliation":[]},{"given":"Frederick","family":"Knabe","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Grimshaw","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-739X(99)00021-7_BIB1","unstructured":"B.W. Lampson, Protection, Proc. 5th Princeton Symp. on Information Sciences and Systems, March 1971, pp. 437\u2013443."},{"key":"10.1016\/S0167-739X(99)00021-7_BIB2","unstructured":"A.S. Grimshaw, W.A. Wulf, J.C. French, A.C. Weaver, P.F. Reynolds Jr., Legion: The Next Logical Step Toward a Nationwide Virtual Computer, UVA CS Technical Report CS-94-21, 8 June 1994."},{"key":"10.1016\/S0167-739X(99)00021-7_BIB3","unstructured":"W.A. Wulf, R. Levin, S.P. Harbison, HYDRA\/C.mmp: An Experimental Computer System, McGraw-Hill, New York, 1981."},{"key":"10.1016\/S0167-739X(99)00021-7_BIB4","unstructured":"B. Fairthorne, OMG White Paper on Security, Object Service Task Force Security Working Group, Technical Report 94-04-16, Object Managment Group (http:\/\/www.omg.org)."},{"key":"10.1016\/S0167-739X(99)00021-7_BIB5","unstructured":"B. Schneier, Applied Cryptography, Wiley, New York, 1994."},{"key":"10.1016\/S0167-739X(99)00021-7_BIB6","unstructured":"W.R. Cheswick, S.M. Bellovin, Firewalls and Internet Security, Addison-Wesley, Reading. MA, 1994."},{"issue":"7","key":"10.1016\/S0167-739X(99)00021-7_BIB7","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1145\/361011.361067","article-title":"Protection and the control of information sharing in Multics","volume":"17","author":"Saltzer","year":"1974","journal-title":"Commun. ACM"},{"issue":"2","key":"10.1016\/S0167-739X(99)00021-7_BIB8","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/S0167-739X(99)00021-7_BIB9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","article-title":"Kerberos: an authentication service for computer networks","volume":"32","author":"Neuman","year":"1994","journal-title":"IEEE Commun."},{"key":"10.1016\/S0167-739X(99)00021-7_BIB10","unstructured":"RSA Data Security, http:\/\/www\/rsa.com"},{"key":"10.1016\/S0167-739X(99)00021-7_BIB11","unstructured":"T. Parker, D. Pinkas, SESAME Technology Version 3, Overview, http:\/\/www.esat.kuleuven.ac.be\/cosic\/sesame\/doc-txt\/overview.txt, May 1995."},{"key":"10.1016\/S0167-739X(99)00021-7_BIB12","unstructured":"C. Wang, W.A. Wulf, A Distributed Key Generation Technique, UVA CS Technical Report, CS-96-08."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X99000217?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X99000217?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T13:52:44Z","timestamp":1555249964000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X99000217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,10]]},"references-count":12,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[1999,10]]}},"alternative-id":["S0167739X99000217"],"URL":"https:\/\/doi.org\/10.1016\/s0167-739x(99)00021-7","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[1999,10]]}}}