{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:10Z","timestamp":1740141310930,"version":"3.37.3"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008287","name":"Science and Technology Directorate","doi-asserted-by":"publisher","award":["Air Force Contract No. FA8702-15-D-0001"],"award-info":[{"award-number":["Air Force Contract No. FA8702-15-D-0001"]}],"id":[{"id":"10.13039\/100008287","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/msec.2021.3069995","type":"journal-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T20:20:46Z","timestamp":1620764446000},"page":"28-36","source":"Crossref","is-referenced-by-count":0,"title":["Lessons Learned From Designing a Security Architecture for Real-World Government Agencies"],"prefix":"10.1109","volume":"19","author":[{"given":"Amy","family":"Dettmer","sequence":"first","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, Massachusetts United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1450-3744","authenticated-orcid":false,"given":"Hamed","family":"Okhravi","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, Massachusetts 02420 United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kevin","family":"Perry","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, Massachusetts United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nabil","family":"Schear","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, Massachusetts United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Richard","family":"Shay","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, Massachusetts United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mary Ellen","family":"Zurko","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, Massachusetts United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paula","family":"Donovan","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, Massachusetts United States"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"An introduction to systems analysis","year":"1956","author":"hoag","key":"ref10"},{"journal-title":"Guide for Conducting Risk Assessments","year":"2012","author":"ross","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.85"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2200\/S00594ED1V01Y201408SPT011"},{"journal-title":"Binding operational directive 18-01","year":"2017","key":"ref15"},{"journal-title":"DHS Agencies reported 321 cases of potential ransomware","year":"2016","author":"sternstein","key":"ref4"},{"journal-title":"The opm data breach How the government jeopardized our national security for more than a generation","year":"2016","author":"reform","key":"ref3"},{"journal-title":"FIPS general information","year":"2010","key":"ref6"},{"journal-title":"DHS needs to enhance capabilities improve planning and support greater adoption of its national cybersecurity protection system","year":"2016","key":"ref5"},{"journal-title":"Zero Trust (ZT) concepts for federal government architectures","year":"2020","author":"uttecht","key":"ref8"},{"journal-title":"Security Technical Implementation Guides (STIGs)","year":"0","key":"ref7"},{"journal-title":"New details emerge about 2014 Russian hack of the State Department It was &#x2018;hand to hand combat","year":"2017","author":"nakashima","key":"ref2"},{"journal-title":"2018 Verizon data breach investigations report","year":"2018","author":"widup","key":"ref1"},{"key":"ref9","first-page":"28","volume":"41","author":"osborn","year":"2016","journal-title":"Beyondcorp Design to deployment at google"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8013\/9475176\/9428651-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/9475176\/09428651.pdf?arnumber=9428651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:22Z","timestamp":1652194342000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9428651\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":15,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/msec.2021.3069995","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2021,7]]}}}