{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:55Z","timestamp":1750306555022,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T00:00:00Z","timestamp":1415318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,7]]},"DOI":"10.1145\/2663715.2669612","type":"proceedings-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T14:41:51Z","timestamp":1415025711000},"page":"19-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["SAFE"],"prefix":"10.1145","author":[{"given":"Avinash","family":"Srinivasan","sequence":"first","affiliation":[{"name":"Temple University, Philadelphia, PA, USA"}]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, PA, USA"}]},{"given":"Wen","family":"Zhu","sequence":"additional","affiliation":[{"name":"Alion Science and Technology, Vienna, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Guard (Information Security): http:\/\/en.wikipedia.org\/wiki\/Guard (information security).  Guard (Information Security): http:\/\/en.wikipedia.org\/wiki\/Guard (information security)."},{"key":"e_1_3_2_1_2_1","unstructured":"N. Swamy and M. Hicks. \"Verified Enforcement of Security Policies for Cross-Domain Information Flows\" http:\/\/www.cs.umd.edu\/mwh\/papers\/selinks-cpa.pdf.  N. Swamy and M. Hicks. \"Verified Enforcement of Security Policies for Cross-Domain Information Flows\" http:\/\/www.cs.umd.edu\/mwh\/papers\/selinks-cpa.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655108.1655115"},{"key":"e_1_3_2_1_4_1","unstructured":"M. Atighetchi et. al \"XDDS: A Salable Guard-Agnostic Cross Domain Discovery Service\" http:\/\/www.dtic.mil\/cgi-bin\/GetTRDoc?AD=ADA532504  M. Atighetchi et. al \"XDDS: A Salable Guard-Agnostic Cross Domain Discovery Service\" http:\/\/www.dtic.mil\/cgi-bin\/GetTRDoc?AD=ADA532504"},{"key":"e_1_3_2_1_5_1","unstructured":"M. Shader. \"Cross-Domain Application Architecture: The Need for an End-to-End Approach\". 2012.  M. Shader. \"Cross-Domain Application Architecture: The Need for an End-to-End Approach\". 2012."},{"key":"e_1_3_2_1_6_1","unstructured":"W3C \"XSL Transformations (XSLT)Version 1.0\" 3C Recommendation 16 November 1999.  W3C \"XSL Transformations (XSLT)Version 1.0\" 3C Recommendation 16 November 1999."},{"key":"e_1_3_2_1_7_1","unstructured":"W3C \"Web Services Addressing 1.0 { Core\" W3C Recommendation 9 May 2006.  W3C \"Web Services Addressing 1.0 { Core\" W3C Recommendation 9 May 2006."},{"volume-title":"Irvine","year":"2000","author":"Fielding R.","key":"e_1_3_2_1_8_1"},{"volume-title":"Retrieved","year":"2011","author":"C Semantic Web","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0501-34"},{"key":"e_1_3_2_1_12_1","unstructured":"http:\/\/www.daml.org\/services\/owl-s\/security.html  http:\/\/www.daml.org\/services\/owl-s\/security.html"},{"key":"e_1_3_2_1_13_1","unstructured":"http:\/\/www.ida.liu.se\/ iislab\/projects\/secont\/  http:\/\/www.ida.liu.se\/ iislab\/projects\/secont\/"},{"key":"e_1_3_2_1_14_1","unstructured":"http:\/\/securityontology.sba-research.org  http:\/\/securityontology.sba-research.org"},{"volume-title":"the Proceedings of 17th National Computer Security Conference, NCSC","year":"1994","author":"Smith R. E.","key":"e_1_3_2_1_15_1"},{"volume-title":"SANS InfoSec Reading Room","year":"2004","author":"Maney C.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"D. Harrington R. Presuhn B. Wijnen. \"An Architecture for Describing SNMP Management Frameworks\" IETF RFC Dec. 2002.   D. Harrington R. Presuhn B. Wijnen. \"An Architecture for Describing SNMP Management Frameworks\" IETF RFC Dec. 2002."},{"key":"e_1_3_2_1_18_1","unstructured":"W3C \"Web Services Addressing 1.0 - Core\". W3C Recommendation 9 May 2006.  W3C \"Web Services Addressing 1.0 - Core\". W3C Recommendation 9 May 2006."},{"key":"e_1_3_2_1_19_1","unstructured":"J. Farrell (IBM) and Holger Lausen (DERI Innsbruck) - ed. \"Semantic Annotations for WSDL and XML Schema\" W3C Recommendation 28 Aug. 2007.  J. Farrell (IBM) and Holger Lausen (DERI Innsbruck) - ed. \"Semantic Annotations for WSDL and XML Schema\" W3C Recommendation 28 Aug. 2007."},{"key":"e_1_3_2_1_20_1","unstructured":"W. Zhu L. Vizenor and A. Srinivasan. \"Towards a Service-Oriented Cross Domain Security Infrastructure\". To appear in The 7th International Conference on Internet and Distributed Computing Systems (IDCS 2014) (short paper) Sep. 22--24 2014 Calabria Italy.  W. Zhu L. Vizenor and A. Srinivasan. \"Towards a Service-Oriented Cross Domain Security Infrastructure\". To appear in The 7th International Conference on Internet and Distributed Computing Systems (IDCS 2014) (short paper) Sep. 22--24 2014 Calabria Italy."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2012.27"},{"key":"e_1_3_2_1_22_1","unstructured":"D. A. Mundie and D. M. McIntire. \"The MAL: A Malware Analysis Lexicon \" CERT Program { Carnegie Mellon University Technical 2013.  D. A. Mundie and D. M. McIntire. \"The MAL: A Malware Analysis Lexicon \" CERT Program { Carnegie Mellon University Technical 2013."},{"key":"e_1_3_2_1_23_1","unstructured":"The MITRE Corporation \"Science of Cyber-Security \" The MITRE Corporation Technical 2010.  The MITRE Corporation \"Science of Cyber-Security \" The MITRE Corporation Technical 2010."},{"key":"e_1_3_2_1_24_1","unstructured":"R. Metcalfe. \"Metcalfe's law\". http:\/\/en.wikipedia.org\/  R. Metcalfe. \"Metcalfe's law\". http:\/\/en.wikipedia.org\/"},{"key":"e_1_3_2_1_25_1","first-page":"1436","volume-title":"MILCOM 2013","author":"Nguyen T. D.","year":"2013"},{"key":"e_1_3_2_1_27_1","unstructured":"T. D. Nguyen C. E. Irvine and J. Khosalim. \"A Multilevel Secure MapReduce Framework for Cross-Domain Information Sharing in the Cloud.\" In Ground System Architectures Workshop March 18--21 2013.  T. D. Nguyen C. E. Irvine and J. Khosalim. \"A Multilevel Secure MapReduce Framework for Cross-Domain Information Sharing in the Cloud.\" In Ground System Architectures Workshop March 18--21 2013."},{"volume-title":"Santa Clara","year":"2014","author":"Russell D.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"\"Universal Description Discovery and Integration v3.0.2\" OASIS Standard Feb 2005.  \"Universal Description Discovery and Integration v3.0.2\" OASIS Standard Feb 2005."},{"volume-title":"OASIS Standard Specification","year":"2006","author":"Security Web Services","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"Object Management Group (OMG) \"Business Process Model and Notation (BPMN) Version 2.0\" OMG Standard January 2011.  Object Management Group (OMG) \"Business Process Model and Notation (BPMN) Version 2.0\" OMG Standard January 2011."},{"key":"e_1_3_2_1_32_1","unstructured":"\"Web Services Business Process Execution Language Version 2.0\" OASIS Standard 11 April 2007.  \"Web Services Business Process Execution Language Version 2.0\" OASIS Standard 11 April 2007."},{"key":"e_1_3_2_1_33_1","unstructured":"Object Management Group (OMG) \"Model Driven Architecture\" http:\/\/www.omg.org\/mda\/  Object Management Group (OMG) \"Model Driven Architecture\" http:\/\/www.omg.org\/mda\/"},{"key":"e_1_3_2_1_34_1","unstructured":"Intelligence Community and Department of Defense Content Discovery and Retrieval Integrated Project Team. \"IC\/DoD Content Discovery and Retrieval Reference Architecture\" February 2011.  Intelligence Community and Department of Defense Content Discovery and Retrieval Integrated Project Team. \"IC\/DoD Content Discovery and Retrieval Reference Architecture\" February 2011."},{"key":"e_1_3_2_1_35_1","unstructured":"Raytheon \"Trusted Gateway Systems.\" https:\/\/www.trustedcs.com\/products\/  Raytheon \"Trusted Gateway Systems.\" https:\/\/www.trustedcs.com\/products\/"}],"event":{"name":"CIKM '14: 2014 ACM Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Shanghai China","acronym":"CIKM '14"},"container-title":["Proceedings of the First International Workshop on Privacy and Secuirty of Big Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663715.2669612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663715.2669612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:48Z","timestamp":1750227168000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663715.2669612"}},"subtitle":["Secure and Big Data-Adaptive Framework for Efficient Cross-Domain Communication"],"short-title":[],"issued":{"date-parts":[[2014,11,7]]},"references-count":33,"alternative-id":["10.1145\/2663715.2669612","10.1145\/2663715"],"URL":"https:\/\/doi.org\/10.1145\/2663715.2669612","relation":{},"subject":[],"published":{"date-parts":[[2014,11,7]]},"assertion":[{"value":"2014-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}