{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:09:39Z","timestamp":1730250579693,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icmlc.2010.5580588","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T19:57:54Z","timestamp":1285185474000},"page":"839-842","source":"Crossref","is-referenced-by-count":2,"title":["A discuss of computer security strategy models"],"prefix":"10.1109","author":[{"given":"Ming-Xin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Li-Na","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Zhi-Xia","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Computer Security Art and Science","year":"2005","author":"bishop","key":"ref4"},{"key":"ref3","first-page":"257","article-title":"Simultaneous-enforcement of the Bell-LaPadula and the Biba security policy models in an OSI-distributed system","author":"verschuren","year":"2002","journal-title":"Singapore ICCS\/ISITA'92 &#x201C;Communication on the Move"},{"key":"ref6","first-page":"4","article-title":"Chinese wall security policy an aggressive model","author":"lin","year":"1989","journal-title":"Computer Security Applications Conference 1989 Fifth Annual"},{"key":"ref5","first-page":"15","article-title":"Configuring Clark WilsonI ntegrity Model to Enforce Flexible Protection","volume":"2","author":"xu","year":"2009","journal-title":"Co mputational Intelligence and Security CIS'09 Inter national Conference"},{"key":"ref7","first-page":"122","article-title":"Chinese Wall security model and conflict analysis","author":"lin","year":"2000","journal-title":"Computer Software and Applications Conference the 24th Annual International"},{"key":"ref2","article-title":"On the Modelingof Bell-LaPadula Security Policies Using RBAC","author":"zhao","year":"2008","journal-title":"Infr astructure for collaborative Enterprise WETICE&#x2019;"},{"article-title":"Cryptography and Data Security","year":"1982","author":"denning","key":"ref1"}],"event":{"name":"2010 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2010,7,11]]},"location":"Qingdao, China","end":{"date-parts":[[2010,7,14]]}},"container-title":["2010 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5570011\/5580476\/05580588.pdf?arnumber=5580588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T00:34:19Z","timestamp":1489883659000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5580588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2010.5580588","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}