{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:54:01Z","timestamp":1730271241204,"version":"3.28.0"},"reference-count":4,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/isads.2005.1452137","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T21:00:20Z","timestamp":1122498020000},"page":"566-569","source":"Crossref","is-referenced-by-count":2,"title":["Lattice model based on a new information security function"],"prefix":"10.1109","author":[{"family":"Yihe Liu","sequence":"first","affiliation":[]},{"family":"Xuwei Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"2","article-title":"Integrity considerations for secure computing systems","volume":"mtr 3153","author":"biba","year":"1975","journal-title":"Mitre report"},{"key":"1","article-title":"Comupter system mathematical","author":"bell","year":"1973","journal-title":"Report Foundation"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"}],"event":{"name":"Autonomous Decentralized Systems, 2005. ISADS 2005.","location":"Chengdu, Jiuzhaigou, China"},"container-title":["Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9846\/31027\/01452137.pdf?arnumber=1452137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T21:58:47Z","timestamp":1489528727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1452137\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":4,"URL":"https:\/\/doi.org\/10.1109\/isads.2005.1452137","relation":{},"subject":[]}}