{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:47:29Z","timestamp":1729619249179,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/efta.2007.4416829","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T20:59:03Z","timestamp":1199480343000},"page":"638-645","source":"Crossref","is-referenced-by-count":3,"title":["An integrated security model for component-based systems"],"prefix":"10.1109","author":[{"given":"Nimal","family":"Nissanke","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACAC.2001.903351"},{"journal-title":"Computer Security","year":"2006","author":"gollmann","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/319195.319229"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176285"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/52.976939"},{"key":"ref15","article-title":"Component security","author":"kumar","year":"2002","journal-title":"an unpublished preliminary article"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"239","DOI":"10.3233\/JCS-1996-42-308","article-title":"MITRE technical report 2547","volume":"ii","author":"lapadula","year":"1996","journal-title":"Journal of Computer Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2000.830360"},{"key":"ref18","article-title":"Enforcing mandatory integrity protection in operating system","author":"liang","year":"2001","journal-title":"Int Conference on Computer Networks and Mobile Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/2.683009"},{"key":"ref28","article-title":"Verifiable computer security and hardware: issues","author":"young","year":"1991","journal-title":"Technical Report 70"},{"key":"ref4","article-title":"A further note on the confinement problem","author":"boebert","year":"1996","journal-title":"30th Annual International Carnahan Conference on Security Technology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.683006"},{"key":"ref3","article-title":"Integrity considerations for secure computer systems","author":"biba","year":"1977","journal-title":"Technical Report ESD-TR-76&#x2013;372"},{"key":"ref6","first-page":"184","author":"clark","year":"1987","journal-title":"A comparison of commercial and military computer security policies In IEEE Symposium on Security and Privacy"},{"key":"ref29","article-title":"Security control for COTS components","volume":"31","author":"zhong","year":"1998","journal-title":"IEEE Computer"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00234-8"},{"journal-title":"Technical Report DoD Standard 5200 28-STD","article-title":"Trusted computer system evaluation criteria (Orange Book)","year":"1985","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/ic:19970098"},{"journal-title":"Looking back at the Bell-LaPadula model","year":"2005","author":"bell","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/52.991368"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/32.55088"},{"key":"ref22","article-title":"LOCK: An historical perspective","author":"sayajari","year":"2002","journal-title":"18th Annual Computer Security Applications Conference (AC-SAC'02)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1992.228228"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856943"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1999.779769"},{"key":"ref26","article-title":"Simultaneous enforcement of the Bell-LaPadula and the Biba security policy models in an OSI-distributed system","volume":"1","author":"verschuren","year":"1992","journal-title":"ICCS\/ISITA'92"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.156"}],"event":{"name":"2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)","start":{"date-parts":[[2007,9,25]]},"location":"Patras, Greece","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4416742\/4416743\/04416829.pdf?arnumber=4416829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T15:00:18Z","timestamp":1557154818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4416829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/efta.2007.4416829","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}