{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T18:54:51Z","timestamp":1773600891894,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,10]],"date-time":"2008-05-10T00:00:00Z","timestamp":1210377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,10]]},"DOI":"10.1145\/1370175.1370221","type":"proceedings-article","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T14:35:39Z","timestamp":1210862139000},"page":"995-998","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Model-driven configuration of os-level mandatory access control"],"prefix":"10.1145","author":[{"given":"Berthold","family":"Agreiter","sequence":"first","affiliation":[{"name":"University Innsbruck, Innsbruck, Austria"}]}],"member":"320","published-online":{"date-parts":[[2008,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.rsbac.org last visited: December, 10","author":"Rule Set Based Access SBAC","year":"2007","unstructured":"RSBAC - Rule Set Based Access Control. http:\/\/www.rsbac.org last visited: December, 10 2007."},{"key":"e_1_3_2_1_2_1","unstructured":"Security-Enhanced Linux (SELinux). \"www.nsa.gov\/selinux\/\"."},{"key":"e_1_3_2_1_3_1","unstructured":"Trusted Computing Group (TCG). https:\/\/www.trustedcomputinggroup.org\/specs\/."},{"key":"e_1_3_2_1_4_1","volume-title":"MOTHIS07","author":"Agreiter B.","year":"2007","unstructured":"B. Agreiter, M. Alam, M. Hafner, J.-P. Seifert, and X. Zhang. Model Driven Configuration of Secure Operating Systems for Mobile Applications in Healthcare. In MOTHIS07, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32257-3_12"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662240610710978"},{"key":"e_1_3_2_1_7_1","unstructured":"M. Jawurek. RSBAC-a framework for enhanced Linux system security."},{"key":"e_1_3_2_1_8_1","volume-title":"Department of Defense","author":"Latham D. C.","year":"1986","unstructured":"D. C. Latham. Department of Defense Trusted Computer System Evaluation Criteria. Department of Defense, 1986."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 21st National Information Systems Security Conference, 10:303--314","author":"Loscocco P.","year":"1998","unstructured":"P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, S. Turner, and J. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. Proceedings of the 21st National Information Systems Security Conference, 10:303--314, 1998."},{"key":"e_1_3_2_1_10_1","unstructured":"K. MacMillan. Madison: A new approach to automated policy generation. March 2007."},{"key":"e_1_3_2_1_11_1","volume-title":"Guided policy generation for application authors","author":"Sniffen B. T.","year":"2006","unstructured":"B. T. Sniffen, D. R. Harris, and J. D. Ramsdell. Guided policy generation for application authors. February 2006."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251432"},{"key":"e_1_3_2_1_13_1","unstructured":"Tresys Technology. Cds framework. http:\/\/oss.tresys.com\/projects\/cdsframework last visited: December 10 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264934"}],"event":{"name":"ICSE '08: International Conference on Software Engineering","location":"Leipzig Germany","acronym":"ICSE '08","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","ACM Association for Computing Machinery"]},"container-title":["Companion Proceedings of the 30th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1370175.1370221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1370175.1370221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T18:29:30Z","timestamp":1773599370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1370175.1370221"}},"subtitle":["research abstract"],"short-title":[],"issued":{"date-parts":[[2008,5,10]]},"references-count":14,"alternative-id":["10.1145\/1370175.1370221","10.1145\/1370175"],"URL":"https:\/\/doi.org\/10.1145\/1370175.1370221","relation":{},"subject":[],"published":{"date-parts":[[2008,5,10]]},"assertion":[{"value":"2008-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}