{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:45:44Z","timestamp":1725792344083},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/iscc.2007.4381574","type":"proceedings-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T21:55:20Z","timestamp":1194990920000},"page":"865-870","source":"Crossref","is-referenced-by-count":1,"title":["Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux"],"prefix":"10.1109","author":[{"given":"Gail-Joon","family":"Ahn","sequence":"first","affiliation":[]},{"given":"Dhruv","family":"Gami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"18","article-title":"A Practical Alternative to Hierarchical Integrity Policies","author":"boebert","year":"1985","journal-title":"Proceedings of the 8th National Computer Security Conference"},{"article-title":"SELinux","year":"2004","author":"mccarty","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930135"},{"key":"ref6","article-title":"Linux Security Modules: General Security Support for the Linux Kernel","author":"wright","year":"2002","journal-title":"Proc 11th USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898870"},{"key":"ref5","first-page":"123","article-title":"The Flask Security Architecture: System Support for Diverse Security Policies","author":"spencer","year":"1999","journal-title":"Proceedings of the Eighth USENIX Security Symposium"},{"key":"ref8","first-page":"4128","article-title":"Authorization Management for Role-based Collaboration","author":"ahn","year":"2003","journal-title":"IEEE International Conference on System Man and Cybernetics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref2","article-title":"Integrating flexible support for securitypolicies into the Linux operating system","author":"10scocco","year":"2001","journal-title":"Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937530"},{"key":"ref1","article-title":"Meeting critical security objectives with security-enhanced Linux","author":"10scocco","year":"2001","journal-title":"Proceedings of the 2001 Ottawa Linux Symposium"}],"event":{"name":"2008 International Conference on Consumer Electronics (ICCE '08)","start":{"date-parts":[[2007,7,1]]},"location":"Las Vegas, NV","end":{"date-parts":[[2007,7,4]]}},"container-title":["2007 12th IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4381469\/4381470\/04381574.pdf?arnumber=4381574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T02:54:13Z","timestamp":1581389653000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4381574\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iscc.2007.4381574","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}