{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:06:31Z","timestamp":1758708391219,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1979,6]]},"DOI":"10.1109\/mark.1979.8817256","type":"proceedings-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T20:47:36Z","timestamp":1567111656000},"page":"329-334","source":"Crossref","is-referenced-by-count":29,"title":["The foundations of a provably secure operating system (PSOS)"],"prefix":"10.1109","author":[{"given":"RICHARD J.","family":"FEIERTAG","sequence":"first","affiliation":[]},{"given":"PETER G.","family":"NEUMANN","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1479992.1480036"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/355616.364017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1479992.1480073"},{"key":"ref13","first-page":"63","article-title":"Capability Concept Mechanism and Structure in System 250","author":"england","year":"1974","journal-title":"Proc IRIA International Workshop on Protection in Operating Systems Institut de Recherche d&#x2019;informatique et de Automatique"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817190"},{"key":"ref15","article-title":"KSOS: Development Methodology for a Secure Operating System","author":"berson","year":"1979","journal-title":"NCC &#x2019;79"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360059"},{"key":"ref17","article-title":"The Design and Specification of a Security Kernel for the PDP-11\/45","author":"schiller","year":"1975","journal-title":"ESD-TR-75-69"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359588.359597"},{"key":"ref19","first-page":"40","article-title":"Steps Toward a Provably Secure Operating System","author":"delashmutt","year":"0","journal-title":"Dig Papers Spring 79 COMPCON"},{"key":"ref4","first-page":"1087","article-title":"Computer System Security Evaluation","author":"neumann","year":"1978","journal-title":"Proc AFIPS 1978 NCC"},{"key":"ref3","article-title":"A Formal Methodology for the Design of Operating System Software","volume":"1","author":"robinson","year":"1977","journal-title":"Current Trends in Programming Methodology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/800214.806547"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/356678.356682"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360074"},{"journal-title":"SPECIAL Reference Manual","year":"1977","author":"roubine","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/359461.359483"},{"key":"ref1","article-title":"A Provably Secure Operating System: the System, its Applications, and Proofs","author":"neumann","year":"1977","journal-title":"SRI International"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1478559.1478563"}],"event":{"name":"1979 International Workshop on Managing Requirements Knowledge","start":{"date-parts":[[1979,6,4]]},"location":"New York, NY, USA","end":{"date-parts":[[1979,6,7]]}},"container-title":["1979 International Workshop on Managing Requirements Knowledge (MARK)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8804301\/8817061\/08817256.pdf?arnumber=8817256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T18:31:14Z","timestamp":1592850674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8817256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1979,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/mark.1979.8817256","relation":{},"subject":[],"published":{"date-parts":[[1979,6]]}}}