{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:36:46Z","timestamp":1729633006351,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/sysose.2010.5544013","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T16:43:57Z","timestamp":1281458637000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["System-of-systems boundary check in a public event scenario"],"prefix":"10.1109","author":[{"given":"Bo","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Drew","sequence":"additional","affiliation":[]},{"given":"Abdullahi","family":"Arabo","sequence":"additional","affiliation":[]},{"given":"David","family":"Llewellyn-Jones","sequence":"additional","affiliation":[]},{"given":"Kashif","family":"Kifayat","sequence":"additional","affiliation":[]},{"given":"Madjid","family":"Merabti","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Rachel","family":"Craddock","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Waller","sequence":"additional","affiliation":[]},{"given":"Glyn","family":"Jones","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.481534"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2004.03.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2006.09.009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772864"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1035167.1035185"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2002.997315"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ECOWS.2006.23"},{"key":"ref19","article-title":"Data Flow Security Analysis for System-of-Systems in a Public Security Incident","author":"zhou","year":"2008","journal-title":"The 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930149"},{"article-title":"Secure Component Composition for Personal Ubiquitous Computing: Project Summary","year":"2005","author":"merabti","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"65","DOI":"10.3233\/JCS-2006-14103","article-title":"Information flow security in dynamic contexts","volume":"14","author":"focardi","year":"2006","journal-title":"Journal of Computer Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(98)10036-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45116-1_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cl.2004.02.005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296581"},{"key":"ref1","article-title":"Trustworthy software: why we need it, why we don't have it, how we can get it","author":"mclean","year":"2006","journal-title":"30th Annual International Computer Software and Applications Conference COMPSAC 2006"},{"key":"ref9","article-title":"Combining different proof techniques for verifying information flow security","author":"mantel","year":"2006","journal-title":"16th International Symposium on Logic-Based Program Synthesis and Transformation LOPSTR 2006"},{"article-title":"Practical Unix and Internet Security","year":"2003","author":"garfinkel","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2007.383867"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.01.007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2009.02.002"}],"event":{"name":"2010 5th International Conference on System of Systems Engineering (SoSE)","start":{"date-parts":[[2010,6,22]]},"location":"Loughborough, United Kingdom","end":{"date-parts":[[2010,6,24]]}},"container-title":["2010 5th International Conference on System of Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5532086\/5543954\/05544013.pdf?arnumber=5544013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:31:29Z","timestamp":1559388689000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5544013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/sysose.2010.5544013","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}