{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:08Z","timestamp":1763468048839,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["F9550-06-0019"],"award-info":[{"award-number":["F9550-06-0019"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["04301610964409CNS-1111698CCF-0424422 (TRUST)"],"award-info":[{"award-number":["04301610964409CNS-1111698CCF-0424422 (TRUST)"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-09-1-0652"],"award-info":[{"award-number":["N00014-09-1-0652"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["04301610964409CNS-1111698CCF-0424422 (TRUST)"],"award-info":[{"award-number":["04301610964409CNS-1111698CCF-0424422 (TRUST)"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["04301610964409CNS-1111698CCF-0424422 (TRUST)"],"award-info":[{"award-number":["04301610964409CNS-1111698CCF-0424422 (TRUST)"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043580","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"249-264","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Logical attestation"],"prefix":"10.1145","author":[{"given":"Emin G\u00fcn","family":"Sirer","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Willem","family":"de Bruijn","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Patrick","family":"Reynolds","sequence":"additional","affiliation":[{"name":"BlueStripe Software"}]},{"given":"Alan","family":"Shieh","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Kevin","family":"Walsh","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Dan","family":"Williams","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Fred B.","family":"Schneider","sequence":"additional","affiliation":[{"name":"Cornell University"}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70525-3_9"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319718"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884371"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the USENIX Security Symposium","author":"Berger Stefan","year":"2006","unstructured":"Stefan Berger , Ram\u00f3n C\u00e1ceres , Kenneth A. Goldman , Ronald Perez , Reiner Sailer , and Leendert van Doorn . vTPM : Virtualizing the Trusted Platform Module . In Proc. of the USENIX Security Symposium , Vancouver, Canada , August 2006 . Stefan Berger, Ram\u00f3n C\u00e1ceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn. vTPM: Virtualizing the Trusted Platform Module. In Proc. of the USENIX Security Symposium, Vancouver, Canada, August 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the Symposium on Networked System Design and Implementation","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau , Petr Marchenko , Mark Handley , and Brad Karp . Wedge : Splitting Applications into Reduced-privilege Compartments . In Proc. of the Symposium on Networked System Design and Implementation , San Francisco, CA , April 2008 . Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. Wedge: Splitting Applications into Reduced-privilege Compartments. In Proc. of the Symposium on Networked System Design and Implementation, San Francisco, CA, April 2008."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365252"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1212691"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_9"},{"key":"e_1_3_2_1_11_1","volume-title":"Erlingsson and Fred B. Schneider. IRM Enforcement of Java Stack Inspection. In Proc. of the IEEE Symposium on Security and Privacy","author":"\u00d9lfar","year":"2000","unstructured":"\u00d9lfar Erlingsson and Fred B. Schneider. IRM Enforcement of Java Stack Inspection. In Proc. of the IEEE Symposium on Security and Privacy , Oakland, CA , May 2000 . \u00d9lfar Erlingsson and Fred B. Schneider. IRM Enforcement of Java Stack Inspection. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2000."},{"key":"e_1_3_2_1_12_1","unstructured":"Electronic Frontier Foundation. Facebook's New Privacy Changes: The Good The Bad and The Ugly. http:\/\/www.eff.org\/deeplinks\/2009\/12\/facebooks-new-privacy-changes-good-bad-and-ugly.  Electronic Frontier Foundation. Facebook's New Privacy Changes: The Good The Bad and The Ugly. http:\/\/www.eff.org\/deeplinks\/2009\/12\/facebooks-new-privacy-changes-good-bad-and-ugly."},{"key":"e_1_3_2_1_13_1","volume-title":"David Mazi\u00e8res. Fast and Secure Distributed Read-Only File System. In Proc. of the Symposium on Operating Systems Design and Implementation","author":"Fu Kevin","year":"2000","unstructured":"Kevin Fu , M. Frans Kaashoek , and David Mazi\u00e8res. Fast and Secure Distributed Read-Only File System. In Proc. of the Symposium on Operating Systems Design and Implementation , San Diego, CA , October 2000 . Kevin Fu, M. Frans Kaashoek, and David Mazi\u00e8res. Fast and Secure Distributed Read-Only File System. In Proc. of the Symposium on Operating Systems Design and Implementation, San Diego, CA, October 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_15_1","volume-title":"Butler Lampson. The Digital Distributed System Security Architecture. In Proc. of the National Computer Security Conference","author":"Gasser Morrie","year":"1989","unstructured":"Morrie Gasser , Andy Goldstein , Charlie Kaufman , and Butler Lampson. The Digital Distributed System Security Architecture. In Proc. of the National Computer Security Conference , Baltimore, MD , October 1989 . Morrie Gasser, Andy Goldstein, Charlie Kaufman, and Butler Lampson. The Digital Distributed System Security Architecture. In Proc. of the National Computer Security Conference, Baltimore, MD, October 1989."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.591650"},{"key":"e_1_3_2_1_17_1","volume-title":"Sylvia Ratnasamy. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. In Proc. of the Symposium on Networked System Design and Implementation","author":"Gummadi Ramakrishna","year":"2009","unstructured":"Ramakrishna Gummadi , Hari Balakrishnan , Petros Maniatis , and Sylvia Ratnasamy. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. In Proc. of the Symposium on Networked System Design and Implementation , Boston, MA , April 2009 . Ramakrishna Gummadi, Hari Balakrishnan, Petros Maniatis, and Sylvia Ratnasamy. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. In Proc. of the Symposium on Networked System Design and Implementation, Boston, MA, April 2009."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the USENIX Virtual Machine Research and Technology Symposium","author":"Haldar Vivek","year":"2004","unstructured":"Vivek Haldar , Deepak Chandra , and Michael Franz . Semantic Remote attestation: A Virtual Machine Directed Approach to Trusted Computing . In Proc. of the USENIX Virtual Machine Research and Technology Symposium , San Jose, CA , May 2004 . Vivek Haldar, Deepak Chandra, and Michael Franz. Semantic Remote attestation: A Virtual Machine Directed Approach to Trusted Computing. In Proc. of the USENIX Virtual Machine Research and Technology Symposium, San Jose, CA, May 2004."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133376"},{"key":"e_1_3_2_1_20_1","volume-title":"Michael Peter. The Nizza Secure-System Architecture. In Proc. of the International Conference on Collaborative Computing","author":"H\u00e4rtig Hermann","year":"2005","unstructured":"Hermann H\u00e4rtig , Michael Hohmuth , Norman Feske , Christian Helmuth , Adam Lackorzynski , Frank Mehnert , and Michael Peter. The Nizza Secure-System Architecture. In Proc. of the International Conference on Collaborative Computing , San Jose, CA , December 2005 . Hermann H\u00e4rtig, Michael Hohmuth, Norman Feske, Christian Helmuth, Adam Lackorzynski, Frank Mehnert, and Michael Peter. The Nizza Secure-System Architecture. In Proc. of the International Conference on Collaborative Computing, San Jose, CA, December 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266660"},{"issue":"1","key":"e_1_3_2_1_22_1","first-page":"5","article-title":"The BirliX Security Architecture","volume":"2","author":"H\u00e4rtig Hermann","year":"1993","unstructured":"Hermann H\u00e4rtig and Oliver Kowalski and Winfried K\u00fchnhauser . The BirliX Security Architecture . Journal of Computer Security , 2 ( 1 ): 5 -- 21 , 1993 . Hermann H\u00e4rtig and Oliver Kowalski and Winfried K\u00fchnhauser. The BirliX Security Architecture. Journal of Computer Security, 2(1):5--21, 1993.","journal-title":"Journal of Computer Security"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30183-7_24"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315299"},{"key":"e_1_3_2_1_27_1","volume-title":"Thomas Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. In Proc. of the Symposium on Networked System Design and Implementation","author":"Levin Dave","year":"2009","unstructured":"Dave Levin , John R. Douceur , Jacob R. Lorch , and Thomas Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. In Proc. of the Symposium on Networked System Design and Implementation , Boston, MA , April 2009 . Dave Levin, John R. Douceur, Jacob R. Lorch, and Thomas Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. In Proc. of the Symposium on Networked System Design and Implementation, Boston, MA, April 2009."},{"key":"e_1_3_2_1_28_1","volume-title":"Dennis Shasha. Secure Untrusted Data Repository. In Proc. of the Symposium on Operating Systems Design and Implementation","author":"Li Jinyuan","year":"2004","unstructured":"Jinyuan Li , Maxwell Krohn , David Mazi\u00e8res , and Dennis Shasha. Secure Untrusted Data Repository. In Proc. of the Symposium on Operating Systems Design and Implementation , San Francisco, CA , December 2004 . Jinyuan Li, Maxwell Krohn, David Mazi\u00e8res, and Dennis Shasha. Secure Untrusted Data Repository. In Proc. of the Symposium on Operating Systems Design and Implementation, San Francisco, CA, December 2004."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. of the Symposium on Operating Systems Design and Implementation","author":"Maheshwari Umesh","year":"2000","unstructured":"Umesh Maheshwari , Radek Vingralek , and William Shapiro . How to Build a Trusted Database System on Untrusted Storage . In Proc. of the Symposium on Operating Systems Design and Implementation , San Diego, CA , October 2000 . Umesh Maheshwari, Radek Vingralek, and William Shapiro. How to Build a Trusted Database System on Untrusted Storage. In Proc. of the Symposium on Operating Systems Design and Implementation, San Diego, CA, October 2000."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_33_1","volume-title":"Merkle. Protocols for Public Key Cryptosystems. In Proc. of the IEEE Symposium on Security and Privacy","author":"Ralph","year":"1980","unstructured":"Ralph C. Merkle. Protocols for Public Key Cryptosystems. In Proc. of the IEEE Symposium on Security and Privacy , Oakland, CA , May 1980 . Ralph C. Merkle. Protocols for Public Key Cryptosystems. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1980."},{"key":"e_1_3_2_1_34_1","volume-title":"Merkle. A Certified Digital Signature. In Proc. of the International Cryptology Conference","author":"Ralph","year":"1989","unstructured":"Ralph C. Merkle. A Certified Digital Signature. In Proc. of the International Cryptology Conference , Santa Barbara, CA , August 1989 . Ralph C. Merkle. A Certified Digital Signature. In Proc. of the International Cryptology Conference, Santa Barbara, CA, August 1989."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.32"},{"key":"e_1_3_2_1_38_1","volume-title":"Summer","author":"Pike Rob","year":"1995","unstructured":"Rob Pike , Dave Presotto , Sean Dorward , Bob Flandrena , Ken Thompson , Howard Trickey , and Phil Winterbottom . Plan 9 from Bell Labs. Computing Systems, 8(3):221--254 , Summer 1995 . Rob Pike, Dave Presotto, Sean Dorward, Bob Flandrena, Ken Thompson, Howard Trickey, and Phil Winterbottom. Plan 9 from Bell Labs. Computing Systems, 8(3):221--254, Summer 1995."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_1"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. of the USENIX Security Symposium","author":"Sailer Reiner","year":"2004","unstructured":"Reiner Sailer , Xiaolan Zhang , Trent Jaeger , and Leendert van Doorn . Design and Implementation of a TCG-based Integrity Measurement Architecture . In Proc. of the USENIX Security Symposium , San Diego, CA , August 2004 . Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Proc. of the USENIX Security Symposium, San Diego, CA, August 2004."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179485"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952990"},{"key":"e_1_3_2_1_46_1","volume-title":"Pradeep Khosla. Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms. In Proc. of the Symposium on Operating Systems Principles","author":"Seshadri Arvind","year":"2005","unstructured":"Arvind Seshadri , Mark Luk , Elaine Shi , Adrian Perrig , Leendert van Doorn , and Pradeep Khosla. Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms. In Proc. of the Symposium on Operating Systems Principles , Brighton, UK , October 2005 . Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla. Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms. In Proc. of the Symposium on Operating Systems Principles, Brighton, UK, October 2005."},{"key":"e_1_3_2_1_47_1","volume-title":"Pradeep Khosla. SWATT: Software-based Attestation for Embedded Devices. In Proc. of the IEEE Symposium on Security and Privacy","author":"Seshadri Arvind","year":"2004","unstructured":"Arvind Seshadri , Adrian Perrig , Leendert van Doorn , and Pradeep Khosla. SWATT: Software-based Attestation for Embedded Devices. In Proc. of the IEEE Symposium on Security and Privacy , Oakland, CA , May 2004 . Arvind Seshadri, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla. SWATT: Software-based Attestation for Embedded Devices. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2004."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319165"},{"key":"e_1_3_2_1_51_1","volume-title":"Jay Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. In Proc. of the USENIX Security Symposium","author":"Spencer Ray","year":"1999","unstructured":"Ray Spencer , Stephen Smalley , Peter Loscocco , Mike Hibler , David Andersen , and Jay Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. In Proc. of the USENIX Security Symposium , Washington, DC , August 1999 . Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. In Proc. of the USENIX Security Symposium, Washington, DC, August 1999."},{"key":"e_1_3_2_1_52_1","unstructured":"Richard Stallman. Can You Trust Your Computer? Available at http:\/\/www.gnu.org\/philosophy\/can-you-trust.html.  Richard Stallman. Can You Trust Your Computer? Available at http:\/\/www.gnu.org\/philosophy\/can-you-trust.html."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314364"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352602"},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. of the Symposium on Operating System Design and Implementation","author":"Williams Dan","year":"2008","unstructured":"Dan Williams , Patrick Reynolds , Kevin Walsh , Emin G\u00fcn Sirer , and Fred B. Schneider . Device driver safety through a reference validation mechanism . In Proc. of the Symposium on Operating System Design and Implementation , San Diego, CA , December 2008 . Dan Williams, Patrick Reynolds, Kevin Walsh, Emin G\u00fcn Sirer, and Fred B. Schneider. Device driver safety through a reference validation mechanism. In Proc. of the Symposium on Operating System Design and Implementation, San Diego, CA, December 2008."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/174613.174614"},{"key":"e_1_3_2_1_58_1","volume-title":"David Mazi\u00e8res. Making Information Flow Explicit in HiStar. In Proc. of the Symposium on Operating Systems Design and Implementation","author":"Zeldovich Nickolai","year":"2006","unstructured":"Nickolai Zeldovich , Silas Boyd-Wickizer , Eddie Kohler , and David Mazi\u00e8res. Making Information Flow Explicit in HiStar. In Proc. of the Symposium on Operating Systems Design and Implementation , Seattle, WA , November 2006 . Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David Mazi\u00e8res. Making Information Flow Explicit in HiStar. In Proc. of the Symposium on Operating Systems Design and Implementation, Seattle, WA, November 2006."}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Cascais Portugal","acronym":"SOSP '11"},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043580","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043580"}},"subtitle":["an authorization architecture for trustworthy computing"],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":55,"alternative-id":["10.1145\/2043556.2043580","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043580","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}