{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:24:15Z","timestamp":1730219055507,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/emeit.2011.6023572","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T16:24:52Z","timestamp":1318436692000},"page":"2306-2309","source":"Crossref","is-referenced-by-count":0,"title":["Application information flow non-interference transmission model"],"prefix":"10.1109","author":[{"given":"Lei","family":"Gong","sequence":"first","affiliation":[]},{"given":"Lu","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Fulian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"VMware Products","year":"0","key":"3"},{"journal-title":"The Java Tutorial Continued The Rest of the JDK","year":"1999","author":"campione","key":"2"},{"key":"10","first-page":"232","article-title":"Research of trusted startup process based on trusted platform module","volume":"25","author":"tan","year":"2008","journal-title":"Application Research of Computers"},{"key":"1","first-page":"103","article-title":"Going beyond the sandbox: An overview of the new security architecture in the java development kit 1.2","author":"gong","year":"1997","journal-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1984.10019"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23602-0_29"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352603"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"9","first-page":"6","article-title":"Non-interference trusted model based on processes","volume":"30","author":"zhang","year":"2009","journal-title":"Journal of Communication"},{"key":"8","article-title":"Noninterference, transitivity, and channel-control security policies","author":"john","year":"2005","journal-title":"Computer Science Laboratory SRI International"},{"key":"11","first-page":"290","article-title":"Filter driver on FSD and its applications","volume":"3","author":"li","year":"2005","journal-title":"Information and Electronic Engineering"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134766"}],"event":{"name":"Mechanical Engineering and Information Technology (EMEIT)","start":{"date-parts":[[2011,8,12]]},"location":"Harbin, Heilongjiang, China","end":{"date-parts":[[2011,8,14]]}},"container-title":["Proceedings of 2011 International Conference on Electronic &amp; Mechanical Engineering and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5996364\/6023018\/06023572.pdf?arnumber=6023572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:39:03Z","timestamp":1490071143000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6023572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/emeit.2011.6023572","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}