{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T20:25:22Z","timestamp":1714940722087},"reference-count":8,"publisher":"CRC Press","isbn-type":[{"value":"9781420066203","type":"print"},{"value":"9781420066227","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12,21]]},"DOI":"10.1081\/e-eia-120046735","type":"book-chapter","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T11:20:59Z","timestamp":1469704859000},"page":"2866-2876","source":"Crossref","is-referenced-by-count":0,"title":["Systems Development: Object-Oriented Security Model"],"prefix":"10.1081","author":[{"given":"Sureerut","family":"Inmor","sequence":"first","affiliation":[]},{"given":"Vatcharaporn","family":"Esichaikul","sequence":"additional","affiliation":[]},{"given":"Dencho N.","family":"Batanov","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2010,12,20]]},"reference":[{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1145\/274444.274446"},{"key":"CIT0004","first-page":"263","volume-title":"Conference Proceedings of Object-Oriented Programming Systems, Language and Applications","author":"Richardson J."},{"key":"CIT0005","first-page":"119","volume-title":"Proceedings of Technology of Object-Oriented Languages and Systems","author":"Overbeck J."},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/162124.162127"},{"key":"CIT0007","volume-title":"Building Application Frameworks: Object-Oriented Foundations of Framework Design","author":"Fayad M.","year":"1999"},{"key":"CIT0008","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma E.","year":"1995"},{"key":"CIT0009","volume-title":"UML Toolkit","author":"Eriksson H.","year":"1996"},{"key":"CIT0010","volume-title":"Prototyping with Objects","author":"Krief P.","year":"1996"}],"container-title":["Encyclopedia of Information Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.crcnetbase.com\/doi\/pdf\/10.1081\/E-EIA-120046735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,10]],"date-time":"2016-09-10T06:31:43Z","timestamp":1473489103000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1081\/E-EIA-120046735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,20]]},"ISBN":["9781420066203","9781420066227"],"references-count":8,"alternative-id":["10.1081\/E-EIA-120046735","10.1081\/E-EIA"],"URL":"https:\/\/doi.org\/10.1081\/e-eia-120046735","relation":{},"subject":[],"published":{"date-parts":[[2010,12,20]]}}}