{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:39:30Z","timestamp":1729629570296,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/isncc.2017.8071977","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T15:19:48Z","timestamp":1508944788000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["An improved blp model with response blind area eliminated"],"prefix":"10.1109","author":[{"given":"Gang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guofang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Runnan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shaomin","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.1002\/sec.1201","article-title":"Improved Biba model based on trusted computing","volume":"8","author":"gang","year":"2015","journal-title":"Security and Communication Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2543719"},{"key":"ref12","first-page":"111","article-title":"The secondary and approximate authorization model and its application to Bell-LaPadula policies","author":"jason leung","year":"2006","journal-title":"J SACMAT '06 Proceedings of the eleventh ACM symposium on Access control models and technologies"},{"key":"ref13","first-page":"1","article-title":"Model-Based Verification of Security and Non-Functional Behavior using AADL","author":"hansson","year":"2015","journal-title":"IEEE Security and Privacy Magazine"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18267\/j.aip.74"},{"key":"ref15","first-page":"108","article-title":"Obligation Based Access Control","author":"laurent","year":"2014","journal-title":"Proc Move to Meaningful Internet Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2004.1431473"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1997.579214"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/283751.283789"},{"key":"ref3","first-page":"148","article-title":"Replay Attack of Dy-namic Rights within an Authorised Domain","volume":"54","author":"abbadi","year":"2009","journal-title":"Proc International Conference on Emerging Security Information Systems and Tech-nologies"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/800214.806547"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/RISP.1990.63839","article-title":"Specification and verification of the ASOS kernel","author":"vito","year":"1990","journal-title":"Proc IEEE Computer Society Symposium on Research in Security and Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIICT.2015.7396064"},{"key":"ref7","first-page":"619","article-title":"A Planar Attributes Model Based on Multi Level Security Poli-cy","volume":"27","author":"yi","year":"2004","journal-title":"J Chinese Journal of Computers"},{"key":"ref2","first-page":"9","author":"stallings","year":"2004","journal-title":"Cryptography and Network Security Principles and Practices"},{"key":"ref1","first-page":"161","article-title":"Secure Computer System: Unified Exposition and Multics Inter-pretation","author":"elliott","year":"1976","journal-title":"Secure Computer System Unified Exposition and Multics Interpretation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ANTHOLOGY.2013.6784892"}],"event":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2017,5,16]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2017,5,18]]}},"container-title":["2017 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8054594\/8071973\/08071977.pdf?arnumber=8071977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T00:36:19Z","timestamp":1570235779000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8071977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isncc.2017.8071977","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}