{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:36:27Z","timestamp":1761932187594,"version":"build-2065373602"},"reference-count":21,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2003.1231419","type":"proceedings-article","created":{"date-parts":[[2004,1,24]],"date-time":"2004-01-24T04:33:03Z","timestamp":1074918783000},"page":"269-274","source":"Crossref","is-referenced-by-count":8,"title":["Design and implementation of virtual private services"],"prefix":"10.1109","author":[{"given":"S.","family":"Ioannidis","sequence":"first","affiliation":[]},{"given":"S.M.","family":"Bellovin","sequence":"additional","affiliation":[]},{"given":"J.","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"A.D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"given":"J.M.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Secure Environment for Untrusted Helper Applications","author":"goldberg","year":"1996","journal-title":"Proc Usenix 1996 Ann Technical Conf"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/858336.858337"},{"article-title":"An Analysis of Security on the Internet 1989-1995","year":"1997","author":"howard","key":"ref12"},{"key":"ref13","first-page":"190","article-title":"Implementing a Distributed Firewall","author":"ioannidis","year":"2000","journal-title":"Proc Computer and Communications Security (CCS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194883"},{"key":"ref15","first-page":"312","article-title":"Automatic software distribution","author":"koenig","year":"1984","journal-title":"USENIX Conference Proceedings"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/800213.806531"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-44569-2_8","article-title":"Model-Based Toll-Assistance for Packet-Filter Design","author":"lueck","year":"2001","journal-title":"proceedings of IEEE Workshop on Policies for Distributed Systems and Networks"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2002.1015610"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"ref4","article-title":"Distributed Firewalls","author":"bellovin","year":"1999","journal-title":"Login Magazine Special Issue on Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766714"},{"key":"ref6","article-title":"The KeyNote Trust Management System Version 2","author":"blaze","year":"1999","journal-title":"RFC 2704"},{"key":"ref5","article-title":"TRON: Process-Specific File Protection for the UNIX Operating System","author":"berman","year":"1995","journal-title":"Proceedings of the USENIX 1995 Technical Conference"},{"key":"ref8","article-title":"SubDo-main: Parsimonious Security for Server Appliances","author":"cowan","year":"2000","journal-title":"Proc of the 14th USENIX Conference on System Administration 2000"},{"article-title":"Firewalls and Internet Security: Repelling the Wily Hacker","year":"1994","author":"cheswick","key":"ref7"},{"article-title":"Consh: A confined execution environment for internet computations","year":"1998","author":"alexandrov","key":"ref2"},{"key":"ref1","first-page":"1","article-title":"Mapbox: using parameterized behavior classes to confine applications","author":"acharya","year":"2000","journal-title":"Proceedings of the USENIX Security Symposium"},{"article-title":"Inside Windows N T","year":"1993","author":"custer","key":"ref9"},{"key":"ref20","first-page":"123","article-title":"The flask security architecture: System support for diverse security policies","author":"spencer","year":"2000","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref21","first-page":"85","article-title":"Architecting the Lumeta Firewall Analyzer","author":"wool","year":"2001","journal-title":"Proceedings of the 10th USENIX Security Symposium"}],"event":{"name":"Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","acronym":"ENABL-03","location":"Linz, Austria"},"container-title":["WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8713\/27586\/01231419.pdf?arnumber=1231419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:18:32Z","timestamp":1497583112000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/enabl.2003.1231419","relation":{},"subject":[]}}