{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:35:57Z","timestamp":1730208957803,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2003.1245405","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"616-621","source":"Crossref","is-referenced-by-count":0,"title":["Information flows in e-government"],"prefix":"10.1109","author":[{"family":"Tsau Young Lin","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Military message systems: Requirements and Security Model","volume":"4925","author":"landwehr","year":"0","journal-title":"NRL Memorandum Report"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"10","article-title":"Multilevel Database Systems: Meeting Class All","author":"lunt","year":"0","journal-title":"Proceedings of the 1988 Workshop on Database Security"},{"journal-title":"Secure Computer Systems Mathematical Foundations","year":"1973","author":"bell","key":"1"},{"key":"7","first-page":"107","article-title":"Granular Computing on Binary Relations I: Data Mining and Neighborhood Systems","author":"lin","year":"1998","journal-title":"Rough Sets in Knowledge Discovery"},{"key":"6","article-title":"Concurrent Automata, Database Machine and Security","author":"lin","year":"1992","journal-title":"New Security Paradigms Workshop Sponsored by ACM SIGSAC"},{"key":"5","article-title":"Bell and LaPadula Axioms - A 'New' Paradigm for Old Model","author":"lin","year":"1992","journal-title":"New Security Paradigms Workshop Sponsored by ACM SIGSAC"},{"key":"4","first-page":"85","article-title":"A Generalized Information Flow Model and Role of System Security Officer","author":"lin","year":"1989","journal-title":"Database Security VI Status and Prospects"},{"journal-title":"Access Control Policies for Database Systems Proceedings of the 1988 Workshop on Database Security","year":"0","author":"lunt","key":"9"},{"key":"8","article-title":"Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses","author":"lin","year":"2003","journal-title":"Seventeenth Annual IFIP WG 11 3 Working Conference on Data and Applications Security Estes Park"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36284"},{"journal-title":"Comparison between the Bell and LaPadula? Model and the SRI Model Proceedings of 1984 IEEE Symposium on Security and Privacy","year":"1984","author":"taylor","key":"12"}],"event":{"name":"27th Annual International Computer Software and Applications Conference","acronym":"CMPSAC-03","location":"Dallas, TX, USA"},"container-title":["Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8813\/27898\/01245405.pdf?arnumber=1245405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T14:50:44Z","timestamp":1489416644000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1245405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2003.1245405","relation":{},"subject":[]}}