{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:16:54Z","timestamp":1771042614512,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2003.1245337","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"164-169","source":"Crossref","is-referenced-by-count":16,"title":["A security characterisation framework for trustworthy component based software systems"],"prefix":"10.1109","author":[{"given":"K.Md.","family":"Khan","sequence":"first","affiliation":[]},{"family":"Jun Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"771","article-title":"4th ICSE Workshop on CBSE: Component Certification and System Prediction","author":"crnkovic","year":"2001","journal-title":"IEEE Proc ICSE"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/52.776949"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936211"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/2.683008"},{"key":"11","author":"syrjanen","year":"2000","journal-title":"Lparse 1 0 User's Manual"},{"key":"12","article-title":"Workshop Reports","author":"thomson","year":"1998","journal-title":"Workshop Compositional Software Architectures"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/74851.74852"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/2.774917"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543357"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355119"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2001.948505"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.1998.733601"},{"key":"5","author":"englander","year":"1997","journal-title":"Developing JavaBeans"},{"key":"4","author":"das","year":"1992","journal-title":"Deductive databases and logic programming"},{"key":"9","first-page":"104","article-title":"Providing Trusted Components to the Industry","author":"meyer","year":"1999","journal-title":"IEEE Computer"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/52.976939"}],"event":{"name":"27th Annual International Computer Software and Applications Conference","location":"Dallas, TX, USA","acronym":"CMPSAC-03"},"container-title":["Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8813\/27898\/01245337.pdf?arnumber=1245337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:44:49Z","timestamp":1489430689000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1245337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2003.1245337","relation":{},"subject":[]}}