{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T05:48:08Z","timestamp":1745300888091,"version":"3.37.3"},"reference-count":39,"publisher":"Wiley","issue":"12","license":[{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1002\/int.23037","type":"journal-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T08:24:48Z","timestamp":1661502288000},"page":"11167-11187","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8776-530X","authenticated-orcid":false,"given":"Jingci","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China"}]},{"given":"Jun","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China"}]},{"given":"Zheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Beijing Institute of Technology Beijing China"}]},{"given":"Tian","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China"}]},{"given":"Kefan","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China"}]},{"given":"Quanxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Beijing Institute of Technology Beijing China"}]},{"given":"Yuanzhang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Beijing Institute of Technology Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2022,8,26]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102496"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04201-9"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586178"},{"key":"e_1_2_10_6_1","doi-asserted-by":"crossref","unstructured":"MoK TangW LiJ YuanX.Attacking deep reinforcement learning with decoupled adversarial policy.IEEE Trans Dependable Secure Comput.2022:1\u20101.doi:10.1109\/TDSC.2022.3143566","DOI":"10.1109\/TDSC.2022.3143566"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.023"},{"key":"e_1_2_10_8_1","doi-asserted-by":"crossref","unstructured":"LiJ YeH LiT et al.Efficient and secure outsourcing of differentially private data publishing with multiple evaluators.IEEE Trans Dependable Secure Comput.2020;19(1):67\u201076.doi:10.1109\/TDSC.2020.3015886","DOI":"10.1109\/TDSC.2020.3015886"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22644"},{"key":"e_1_2_10_10_1","first-page":"1","volume-title":"Build Security into Your Network's DNA: the Zero Trust Network Architecture","author":"Kindervag J","year":"2010"},{"key":"e_1_2_10_11_1","unstructured":"RoseSW BorchertO MitchellS ConnellyS.Zero Trust Architecture. National Institute of Standards and Technology;2020."},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI48352.2020.9104214"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.046"},{"key":"e_1_2_10_14_1","first-page":"65","article-title":"Qubes OS architecture","volume":"54","author":"Rutkowska J","year":"2010","journal-title":"Invisible Things Lab Tech Rep"},{"key":"e_1_2_10_15_1","doi-asserted-by":"crossref","unstructured":"JiangN JieW LiJ LiuX JinD.GATrust: A multi\u2010aspect graph attention network model for trust assessment in OSNs.IEEE Trans Knowl Data Eng.2022:1\u20101.doi:10.1109\/TKDE.2022.3174044","DOI":"10.1109\/TKDE.2022.3174044"},{"volume-title":"Understanding Container Isolation Mechanisms for Building Security\u2010Sensitive Private Cloud","year":"2017","author":"Babar MA","key":"e_1_2_10_16_1"},{"key":"e_1_2_10_17_1","unstructured":"BuiT.Analysis of docker security.arXiv preprint arXiv:1501.02967.2015."},{"key":"e_1_2_10_18_1","doi-asserted-by":"crossref","unstructured":"ReshetovaE KarhunenJ NymanT AsokanN.Security of OS\u2010level virtualization technologies. In:\u00a0Nordic Conference on Secure IT Systems.Springer;2014:77\u201093.doi:10.1007\/978-3-319-11599-3_5","DOI":"10.1007\/978-3-319-11599-3_5"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.2991\/icmmcce-17.2017.238"},{"key":"e_1_2_10_20_1","unstructured":"Van't HofA NiehJ.{BlackBox}$\\{\\ \\text{BlackBox}\\ \\}$: a container security monitor for protecting containers on untrusted operating systems. In:\u00a016th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22);2022:683\u2010700."},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.03.011"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1871\/1\/012016"},{"volume-title":"Docker Security: Using Containers Safely in Production","year":"2015","author":"Mouat A","key":"e_1_2_10_23_1"},{"key":"e_1_2_10_24_1","doi-asserted-by":"crossref","unstructured":"JianZ ChenL.A defense method against docker escape attack. In:\u00a0Proceedings of the 2017 International Conference on Cryptography Security and Privacy;2017:142\u2010146.doi:10.1145\/3058060.3058085","DOI":"10.1145\/3058060.3058085"},{"key":"e_1_2_10_25_1","doi-asserted-by":"crossref","unstructured":"Es\u2010SalhiK EspesD CuppensN.DTE access control model for integrated ICS systems. In:\u00a0Proceedings of the 14th International Conference on Availability Reliability and Security;2019:1\u20109.doi:10.1145\/3339252.3340498","DOI":"10.1145\/3339252.3340498"},{"key":"e_1_2_10_26_1","first-page":"137","volume-title":"International School on Foundations of Security Analysis and Design","author":"Samarati P","year":"2000"},{"volume-title":"Role\u2010Based Access Control","year":"2003","author":"Ferraiolo D","key":"e_1_2_10_27_1"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.5220\/0010150402730282"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS-SWS.2012.6377645"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"e_1_2_10_31_1","doi-asserted-by":"crossref","unstructured":"BellDE La PadulaLJ.Secure Computer System: Unified Exposition and Multics Interpretation. Tech. Rep. MITRE Corp.;\u00a01976.","DOI":"10.21236\/ADA023588"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90065-1"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1201"},{"key":"e_1_2_10_34_1","unstructured":"BibaKJ.Integrity Considerations for Secure Computer Systems. Tech. Rep. MITRE Corp.;\u00a01977."},{"issue":"11","key":"e_1_2_10_35_1","first-page":"1","article-title":"A9 implementing the Clark\/Wilson integrity policy using current technology","volume":"1","author":"Shockley WR","year":"1989","journal-title":"Comput Sci Technol"},{"key":"e_1_2_10_36_1","doi-asserted-by":"crossref","unstructured":"XuQ LiuG.Configuring Clark\u2013Wilson integrity model to enforce flexible protection. In:\u00a02009 International Conference on Computational Intelligence and Security.IEEE;2009:15\u201020.doi:10.1109\/CIS.2009.249","DOI":"10.1109\/CIS.2009.249"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462425"},{"key":"e_1_2_10_38_1","first-page":"282","volume-title":"1989 Fifth Annual Computer Security Applications Conference","author":"Lin TY","year":"1989"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354878"},{"key":"e_1_2_10_40_1","doi-asserted-by":"crossref","unstructured":"SandhuR MunawerQ.How to do discretionary access control using roles. In:\u00a0Proceedings of the third ACM workshop on Role\u2010based access control;1998:47\u201054.doi:10.1145\/286884.286893","DOI":"10.1145\/286884.286893"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.23037","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.23037","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.23037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:33:14Z","timestamp":1675956794000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.23037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,26]]},"references-count":39,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10.1002\/int.23037"],"URL":"https:\/\/doi.org\/10.1002\/int.23037","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"type":"print","value":"0884-8173"},{"type":"electronic","value":"1098-111X"}],"subject":[],"published":{"date-parts":[[2022,8,26]]},"assertion":[{"value":"2022-07-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}