{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:33:11Z","timestamp":1729636391910,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1109\/comswa.2008.4554401","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T15:19:59Z","timestamp":1215098399000},"page":"175-182","source":"Crossref","is-referenced-by-count":1,"title":["Interpretation of policy oriented common criteria components for network computing environment"],"prefix":"10.1109","author":[{"given":"Manpreet","family":"Singh","sequence":"first","affiliation":[]},{"given":"Manjeet","family":"Singh Patterh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2006","key":"ref10"},{"year":"2002","key":"ref11"},{"year":"2003","key":"ref12"},{"journal-title":"DoD 5200 28 _ STD","article-title":"Trusted Computer System Evaluation Criteria (TCSEC)","year":"1985","key":"ref13"},{"journal-title":"Department of Trade and Industry","article-title":"Information Technology Security Evaluation Criteria (ITSEC)","year":"1991","key":"ref14"},{"year":"1992","key":"ref15"},{"journal-title":"version 2 3 ISO\/IEC 15408 2005","article-title":"Common Criteria for Information Technology Security Evaluation (CC)","year":"2005","key":"ref16"},{"journal-title":"version 3 1 Revision 1","article-title":"Common Criteria for Information Technology Security Evaluation (CC)","year":"2006","key":"ref17"},{"key":"ref4","first-page":"57","author":"gasser","year":"1988","journal-title":"Building a Secure Computer System"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","article-title":"The protection of information in computer systems","volume":"63","author":"salzer","year":"1975","journal-title":"Proc IEEE"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/356850.356852"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/2.48795"},{"key":"ref2","article-title":"Integrity Considerations for Secure Computer Systems","author":"biba","year":"1977","journal-title":"Mitre TR-3153"},{"key":"ref1","article-title":"Secure Computer Systems: Mathematical Foundations","volume":"1","author":"bell","year":"1973","journal-title":"Mitre TR-2547"},{"year":"2004","key":"ref9"}],"event":{"name":"Middleware and Workshops (COMSWARE '08)","start":{"date-parts":[[2008,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2008,1,10]]}},"container-title":["2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4545865\/4554360\/04554401.pdf?arnumber=4554401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:38:29Z","timestamp":1497778709000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4554401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/comswa.2008.4554401","relation":{},"subject":[],"published":{"date-parts":[[2008,1]]}}}