{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:43Z","timestamp":1750308943588,"version":"3.41.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[1985,8,1]],"date-time":"1985-08-01T00:00:00Z","timestamp":491702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[1985,8]]},"DOI":"10.1145\/1012497.1012548","type":"journal-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:09Z","timestamp":1097170749000},"page":"119-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["The extended access matrix model of computer security"],"prefix":"10.1145","volume":"10","author":[{"given":"W. E.","family":"Boebert","sequence":"first","affiliation":[{"name":"Honeywell Systems and Research Center, Minneapolis, Minnesota"}]},{"given":"R. Y.","family":"Kain","sequence":"additional","affiliation":[{"name":"Honeywell Systems and Research Center, Minneapolis, Minnesota"}]}],"member":"320","published-online":{"date-parts":[[1985,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Computer System: Unified Exposition and Multies Interpretation\". Tech. Rept. MTR-2997","author":"Bell D.E.","year":"1975","unstructured":"Bell , D.E. , L.J. LaPadula . \"Secure Computer System: Unified Exposition and Multies Interpretation\". Tech. Rept. MTR-2997 , MITRE Corp., Bedford, Mass. , July 1975 . Bell, D.E., L.J. LaPadula. \"Secure Computer System: Unified Exposition and Multies Interpretation\". Tech. Rept. MTR-2997, MITRE Corp., Bedford, Mass., July 1975."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/361284.361287"},{"key":"e_1_2_1_3_1","volume-title":"Trusted Computer Systems Evaluation Criteria. CSC-STD-001-83","author":"Department of Defense.","year":"1983","unstructured":"Department of Defense. Trusted Computer Systems Evaluation Criteria. CSC-STD-001-83 August 15, 1983 . Department of Defense. Trusted Computer Systems Evaluation Criteria. CSC-STD-001-83 August 15, 1983."},{"key":"e_1_2_1_4_1","volume-title":"Institute for Computing Science","author":"Good D.I.","year":"1978","unstructured":"Good , D.I. , R.M. Cohen , C.G. Hoch , L.W. Hunter , D.F. Hare . \"Report on the Language Gypsy, Version 2.0\". Tech.Rept. ICSCA-CMP-1 0 , Institute for Computing Science , University of Texas at Austin , Austin, Texas , September , 1978 . Good, D.I., R.M. Cohen, C.G. Hoch, L.W. Hunter, D.F. Hare. \"Report on the Language Gypsy, Version 2.0\". Tech.Rept. ICSCA-CMP-10, Institute for Computing Science, University of Texas at Austin, Austin, Texas, September, 1978."},{"key":"e_1_2_1_5_1","first-page":"417","volume-title":"Proceedings Spring Joint Computer Conference, Montvale, N.J.","author":"Graham G.S.","year":"1972","unstructured":"Graham , G.S. , and P.J. Denning . Protection-Principles and Practice . Proceedings Spring Joint Computer Conference, Montvale, N.J. , 1972 , pp. 417 - 429 . Graham, G.S., and P.J. Denning. Protection-Principles and Practice. Proceedings Spring Joint Computer Conference, Montvale, N.J., 1972, pp. 417-429."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings 5th Princeton Symposium on Info. Sci. and Syst.","author":"Lampson B.W.","year":"1971","unstructured":"Lampson , B.W. Protection. Proceedings 5th Princeton Symposium on Info. Sci. and Syst. , Princeton University , March 1971 . Lampson, B.W. Protection. Proceedings 5th Princeton Symposium on Info. Sci. and Syst., Princeton University, March 1971."},{"key":"e_1_2_1_8_1","first-page":"245","volume-title":"USE Inc. Spring Conference","author":"Schell R.R.","year":"1979","unstructured":"Schell , R.R. Security Kernels : A Methodical Design of System Security. Technical Papers , USE Inc. Spring Conference , March 5-9, 1979 , pp. 245 - 250 . Schell, R.R. Security Kernels: A Methodical Design of System Security. Technical Papers, USE Inc. Spring Conference, March 5-9, 1979, pp. 245-250."},{"key":"e_1_2_1_9_1","volume-title":"An Example Using Bell and LaPadula\". Tech. Rept. 122","author":"Smith K.","year":"1983","unstructured":"Smith , Michael K. \"Model and Design Proofs in Gypsy : An Example Using Bell and LaPadula\". Tech. Rept. 122 , Institute for Computing Science , University of Texas at Austin, Austin, Texas, November , 1983 . Smith, Michael K. \"Model and Design Proofs in Gypsy: An Example Using Bell and LaPadula\". Tech. Rept. 122, Institute for Computing Science, University of Texas at Austin, Austin, Texas, November, 1983."}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1012497.1012548","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1012497.1012548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:37:08Z","timestamp":1750282628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1012497.1012548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,8]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1985,8]]}},"alternative-id":["10.1145\/1012497.1012548"],"URL":"https:\/\/doi.org\/10.1145\/1012497.1012548","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[1985,8]]},"assertion":[{"value":"1985-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}