{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:35:37Z","timestamp":1729622137322,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/bigdata.2015.7363927","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:36:21Z","timestamp":1451338581000},"page":"1603-1607","source":"Crossref","is-referenced-by-count":1,"title":["Chinese wall security policies information flows in business cloud"],"prefix":"10.1109","author":[{"given":"Tsau-Young T. Y.","family":"Lin","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"132","article-title":"Neighborhood Systems-A Qualitative Theory for Fuzzy and Rough Sets","volume":"iv","author":"lin","year":"1997"},{"key":"ref11","first-page":"275","article-title":"Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses","author":"lin","year":"2003","journal-title":"DBSec"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4414179"},{"first-page":"2965","article-title":"Granular Computing and Flow Analysis on Discretionary Access Control: Solving the Propagation Problem","year":"2009","key":"ref13"},{"journal-title":"Discrete Mathematics in Computer Science","year":"1977","author":"stanat","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.3138\/9781487584894","author":"sierpenski","year":"1952","journal-title":"General Topology(Mathematical Exposition No 7)"},{"key":"ref4","first-page":"75","article-title":"Neighborhood Systems and Approximation in Database and Knowledge Base Systems","author":"lin","year":"1989","journal-title":"Proceedings of the Fourth International Symposium on Methodologies of Intelligent Systems"},{"key":"ref3","first-page":"85","article-title":"A Generalized Information Flow Model and Role of System Security Officer","author":"landwehr","year":"1989","journal-title":"IFIP Database Security III Status and Prospects"},{"key":"ref6","first-page":"107","article-title":"Granular Computing on binary relations I: data mining and neighborhood systems","author":"lin","year":"1998","journal-title":"Rough Sets in Knowledge Discovery"},{"key":"ref5","first-page":"286","article-title":"Chinese Wall Security Policy-An Aggressive Model","author":"lin","year":"1989","journal-title":"Proceedings of the Fifth Aerospace Computer Security Application Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-1873-4_9"},{"key":"ref7","first-page":"121","article-title":"Granular Computing on Binary Relations II: Rough set representations and belief functions","author":"lin","year":"1998","journal-title":"Rough Sets in Knowledge Discovery"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/322609.323183"},{"key":"ref1","first-page":"206","article-title":"The Chinese Wall Security Policy","author":"brewer","year":"1988","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref9","first-page":"472","article-title":"Attribute Based Data Model and Polyinstantiation","author":"aiken","year":"1992","journal-title":"Education and Society IFIP-Transaction"}],"event":{"name":"2015 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2015,10,29]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2015,11,1]]}},"container-title":["2015 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347101\/7363706\/07363927.pdf?arnumber=7363927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T08:26:04Z","timestamp":1599985564000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7363927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2015.7363927","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}