{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:48Z","timestamp":1750220928473,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,29]]},"DOI":"10.1145\/3290688.3290695","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Information Associations for Multi-Domain Applications"],"prefix":"10.1145","author":[{"given":"John","family":"Shield","sequence":"first","affiliation":[{"name":"Defence Science and Techology Group, Edinburgh, South Australia"}]},{"given":"Samuel","family":"Chenoweth","sequence":"additional","affiliation":[{"name":"Defence Science and Techology Group, Edinburgh, South Australia"}]},{"given":"Patrick","family":"Prendergast","sequence":"additional","affiliation":[{"name":"Defence Science and Techology Group, Edinburgh, South Australia"}]},{"given":"Mark","family":"Beaumont","sequence":"additional","affiliation":[{"name":"Defence Science and Techology Group, Edinburgh, South Australia"}]},{"given":"Chris","family":"North","sequence":"additional","affiliation":[{"name":"Defence Science and Techology Group, Edinburgh, South Australia"}]},{"given":"Bradley","family":"Hopkins","sequence":"additional","affiliation":[{"name":"Defence Science and Techology Group, Edinburgh, South Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE Military Communications Conference, 2003. MILCOM 2003.","volume":"2","author":"Alkassar A.","unstructured":"A. Alkassar and C. Stuble . 2003. Security framework for integrated networks . In IEEE Military Communications Conference, 2003. MILCOM 2003. , Vol. 2 . 802--807 Vol.2. A. Alkassar and C. Stuble. 2003. Security framework for integrated networks. In IEEE Military Communications Conference, 2003. MILCOM 2003., Vol. 2. 802--807 Vol.2."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991087"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Avocent Corporation","year":"2018","unstructured":"Avocent Corporation . 2018 . Avocent SwitchView SC KVM Switches . Retrieved March 15, 2018 from http:\/\/www.avocent.com\/Resources\/Documents\/Data_Sheets\/SwitchView_Secure_KVM_Switches.aspx Avocent Corporation. 2018. Avocent SwitchView SC KVM Switches. Retrieved March 15, 2018 from http:\/\/www.avocent.com\/Resources\/Documents\/Data_Sheets\/SwitchView_Secure_KVM_Switches.aspx"},{"volume-title":"MILCOM 2015 - 2015 IEEE Military Communications Conference. 465--470","author":"Domingo A.","key":"e_1_3_2_1_6_1","unstructured":"A. Domingo and H. Wietgrefe . 2015. An applied model for secure information release between federated military and non-military networks . In MILCOM 2015 - 2015 IEEE Military Communications Conference. 465--470 . A. Domingo and H. Wietgrefe. 2015. An applied model for secure information release between federated military and non-military networks. In MILCOM 2015 - 2015 IEEE Military Communications Conference. 465--470."},{"volume-title":"Proceedings Seventh Annual Computer Security Applications Conference. 44--55","author":"Epstein J.","key":"e_1_3_2_1_7_1","unstructured":"J. Epstein , J. McHugh , R. Pascale , H. Orman , G. Benson , C. Martin , A. Marmor-Squires , B. Danner , and M. Branstad . 1991. A prototype B3 trusted X Window System . In Proceedings Seventh Annual Computer Security Applications Conference. 44--55 . J. Epstein, J. McHugh, R. Pascale, H. Orman, G. Benson, C. Martin, A. Marmor-Squires, B. Danner, and M. Branstad. 1991. A prototype B3 trusted X Window System. In Proceedings Seventh Annual Computer Security Applications Conference. 44--55."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.7"},{"volume-title":"BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. 15th Annual Network and Distributed System Security Symposium.","author":"Gu G.","key":"e_1_3_2_1_9_1","unstructured":"G. Gu , J. Zhang , and W. Lee . 2008 . BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. 15th Annual Network and Distributed System Security Symposium. G. Gu, J. Zhang, and W. Lee. 2008. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. 15th Annual Network and Distributed System Security Symposium."},{"volume-title":"MILCOM 2015 - 2015 IEEE Military Communications Conference. 1224--1229","author":"Heckman M. R.","key":"e_1_3_2_1_10_1","unstructured":"M. R. Heckman , R. R. Schell , and E. E. Reed . 2015. A multi-level secure file sharing server and its application to a multi-level secure cloud . In MILCOM 2015 - 2015 IEEE Military Communications Conference. 1224--1229 . M. R. Heckman, R. R. Schell, and E. E. Reed. 2015. A multi-level secure file sharing server and its application to a multi-level secure cloud. In MILCOM 2015 - 2015 IEEE Military Communications Conference. 1224--1229."},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Assured Information Security Inc.","year":"2016","unstructured":"Assured Information Security Inc. 2016 . SecureView . Retrieved March 15, 2018 from https:\/\/www.ainfosec.com\/innovative-products\/secureview\/ Assured Information Security Inc. 2016. SecureView. Retrieved March 15, 2018 from https:\/\/www.ainfosec.com\/innovative-products\/secureview\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. CoRR abs\/1801.01203","author":"Kocher P.","year":"2018","unstructured":"P. Kocher , D. Genkin , D. Gruss , W. Haas , M. Hamburg , M. Lipp , S. Mangard , T. Prescher , M. Schwarz , and Y. Yarom . 2018 . Spectre Attacks: Exploiting Speculative Execution. CoRR abs\/1801.01203 (2018). P. Kocher, D. Genkin, D.Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. CoRR abs\/1801.01203 (2018)."},{"key":"e_1_3_2_1_13_1","volume-title":"The Benefits of Multi-Level Security. Raytheon Techonology Today Issue 2","author":"Kung Kenneth","year":"2007","unstructured":"Kenneth Kung . 2007. The Benefits of Multi-Level Security. Raytheon Techonology Today Issue 2 ( 2007 ). https:\/\/www.raytheon.com\/news\/rtnwcm\/groups\/public\/documents\/content\/rtn08_tech_infoops_pdf4.pdf Kenneth Kung. 2007. The Benefits of Multi-Level Security. Raytheon Techonology Today Issue 2 (2007). https:\/\/www.raytheon.com\/news\/rtnwcm\/groups\/public\/documents\/content\/rtn08_tech_infoops_pdf4.pdf"},{"key":"e_1_3_2_1_14_1","volume-title":"CoRR abs\/1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018. Meltdown. CoRR abs\/1801.01207 ( 2018 ). arXiv:1801.01207 Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. CoRR abs\/1801.01207 (2018). arXiv:1801.01207"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Marston J.","year":"2011","unstructured":"J. Marston . 2011 . Multi-Level Security Applications . Retrieved March 15, 2018 from https:\/\/pdfs.semanticscholar.org\/1122\/a2e9af5ad0841fd8ff853f4fca863746883e.pdf J. Marston. 2011. Multi-Level Security Applications. Retrieved March 15, 2018 from https:\/\/pdfs.semanticscholar.org\/1122\/a2e9af5ad0841fd8ff853f4fca863746883e.pdf"},{"volume-title":"Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on. 2--15","author":"Ogurtsov N.","key":"e_1_3_2_1_16_1","unstructured":"N. Ogurtsov , H. Orman , R. Schroeppel , S. O'Malley , and O. Spatscheck . 1997. Experimental results of covert channel limitation in one-way communication systems . In Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on. 2--15 . N. Ogurtsov, H. Orman, R. Schroeppel, S. O'Malley, and O. Spatscheck. 1997. Experimental results of covert channel limitation in one-way communication systems. In Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on. 2--15."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.15"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067627.806586"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.78"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE INFOCOM","author":"Sellke S. H.","year":"2009","unstructured":"S. H. Sellke , C. C. Wang , S. Bagchi , and N. Shroff . 2009. TCP\/IP Timing Channels: Theory to Implementation . In IEEE INFOCOM 2009 . 2204--2212. S. H. Sellke, C. C. Wang, S. Bagchi, and N. Shroff. 2009. TCP\/IP Timing Channels: Theory to Implementation. In IEEE INFOCOM 2009. 2204--2212."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Shapiro Jonathan","year":"2004","unstructured":"Jonathan S. Shapiro , John Vanderburgh , Eric Northup , and David Chizmadia . 2004 . Design of the EROS Trusted Window System . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, USA, 12--12. Jonathan S.Shapiro, John Vanderburgh, Eric Northup, and David Chizmadia. 2004. Design of the EROS Trusted Window System. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, USA, 12--12."},{"volume-title":"MILCOM 2015-2015 IEEE Military Communications Conference. 1230--1235","author":"Wrona K.","key":"e_1_3_2_1_22_1","unstructured":"K. Wrona and S. Oudkerk . 2015. Integrated content-based information security for future military systems . In MILCOM 2015-2015 IEEE Military Communications Conference. 1230--1235 . K. Wrona and S. Oudkerk. 2015. Integrated content-based information security for future military systems. In MILCOM 2015-2015 IEEE Military Communications Conference. 1230--1235."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"}],"event":{"name":"ACSW 2019: Australasian Computer Science Week 2019","sponsor":["CORE - Computing Research and Education","Macquarie University-Sydney"],"location":"Sydney NSW Australia","acronym":"ACSW 2019"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290695","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290688.3290695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:17Z","timestamp":1750204397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290695"}},"subtitle":["Addressing Data Utility in Segregated Networks"],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":21,"alternative-id":["10.1145\/3290688.3290695","10.1145\/3290688"],"URL":"https:\/\/doi.org\/10.1145\/3290688.3290695","relation":{},"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"2019-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}