{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:45:19Z","timestamp":1764841519104,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icsmc.2004.1400987","type":"proceedings-article","created":{"date-parts":[[2005,3,31]],"date-time":"2005-03-31T13:26:51Z","timestamp":1112275611000},"page":"5013-5018","source":"Crossref","is-referenced-by-count":12,"title":["Security analysis of mandatory access control model"],"prefix":"10.1109","volume":"6","author":[{"family":"Yixin Jiang","sequence":"first","affiliation":[]},{"family":"Chuang Lin","sequence":"additional","affiliation":[]},{"family":"Han Yin","sequence":"additional","affiliation":[]},{"family":"Zhangxi Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2002.1047718"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1993.246636"},{"key":"10","volume":"1","author":"jensen","year":"1997","journal-title":"Colored Petri Nets Basic Concepts Analysis Methods and Practical Use"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1990.128185"},{"journal-title":"Security in Petri Net Workflows","year":"2001","author":"knorr","key":"7"},{"key":"6","first-page":"73","article-title":"Security requirements of electronic business processes","author":"knorr","year":"2001","journal-title":"Proc of the First IFIP Conference on E-commerce E-business and E-government (I3E)"},{"key":"5","first-page":"9","article-title":"Multilevel security and information flow in petri net workflows","author":"knorr","year":"2001","journal-title":"Proc of the 9th International Conference on Telecommunication Systems - Modeling and Analysis"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898869"},{"key":"9","first-page":"239","article-title":"The Bell-LaPadula model","volume":"4","author":"bell","year":"1996","journal-title":"Journal of Computer Security"},{"journal-title":"Trusted Computer System Evaluation Criteria","year":"1985","key":"8"},{"journal-title":"Petri Nets for System Engineering A Guide to Modeling Verification and Application","year":"2003","author":"girault","key":"11"},{"key":"12","first-page":"35","author":"clarke","year":"2001","journal-title":"Model checking"}],"event":{"name":"2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)","acronym":"ICSMC-04","location":"The Hague, Netherlands"},"container-title":["2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9622\/30425\/01400987.pdf?arnumber=1400987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T23:29:00Z","timestamp":1489534140000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1400987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2004.1400987","relation":{},"subject":[]}}