{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:57:57Z","timestamp":1725497877545},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ipdps.2006.1639685","type":"proceedings-article","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T19:59:56Z","timestamp":1152561596000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":0,"title":["Base line performance measurements of access controls for libraries and modules"],"prefix":"10.1109","author":[{"given":"J.W.","family":"Kim","sequence":"first","affiliation":[]},{"given":"V.","family":"Prevelakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/SECPRI.2001.924296"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/586110.586145"},{"key":"11","first-page":"257","article-title":"Improving Host Security with System Call Policies","author":"provos","year":"2003","journal-title":"12th USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.17487\/rfc1831"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.17487\/rfc2704"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/365181.365241"},{"year":"2001","journal-title":"The Intel IA-32 Software Architecture Manual","key":"1"},{"year":"1988","author":"kernighan","journal-title":"The C Programming Language","key":"10"},{"year":"2002","author":"daemen","journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","key":"7"},{"year":"1998","author":"cranor","journal-title":"DESIGN AND IMPLEMENTATION OF THE UVM VIRTUAL MEMORY SYSTEM","key":"6"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.17487\/rfc1813"},{"year":"1999","author":"blaze","journal-title":"The Role of Trust Management in Distributed System Security chapter Secure Internet Programming Security Issues for Mobile and Distributed Objects","key":"4"},{"year":"1984","author":"kernighan","journal-title":"The Unix Programming Environment","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/5.4442"}],"event":{"name":"Proceedings 20th IEEE International Parallel & Distributed Processing Symposium","start":{"date-parts":[[2006,4,25]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2006,4,29]]}},"container-title":["Proceedings 20th IEEE International Parallel &amp; Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10917\/34366\/01639685.pdf?arnumber=1639685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T23:14:34Z","timestamp":1489533274000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1639685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2006.1639685","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}