{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T15:31:16Z","timestamp":1694619076405},"reference-count":8,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,12,1]]},"abstract":"The paper discusses a set of models which can assist in developing security profiles of objects and subjects operating within industrial or commercial organisations\u2019 databases. In these databases the information objects are often related to each other, having a hierarchical or even a network structure. A set of objects may be allowed to calculate other objects of a database. Security clearance must incorporate such possibilities.<\/jats:p>","DOI":"10.1108\/09685229810240112","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T06:08:10Z","timestamp":1027750090000},"page":"205-211","source":"Crossref","is-referenced-by-count":2,"title":["Industrial information\u2010weight security models"],"prefix":"10.1108","volume":"6","author":[{"given":"V.","family":"Portougal","sequence":"first","affiliation":[]},{"given":"Lech J.","family":"Janczewski","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022032119445509600_b1","unstructured":"Amoroso, E.G. (1994), Fundamentals of Computer Security Technology, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022032119445509600_b2","unstructured":"CCITSE (1996), \u201cCommon criteria for information technology security evaluation\u201d, Common Criteria Implementation Board, CCIB\u201096\/011, version 1.9, 31 January."},{"key":"key2022032119445509600_b3","doi-asserted-by":"crossref","unstructured":"Clark, D. and Wilson, D. (1987), A Comparison of Commercial and Military Computer Security Policies, IEEE Publication No. CH2416\u20106\/87\/0000\/0184SO1.00, 1987","DOI":"10.1109\/SP.1987.10001"},{"key":"key2022032119445509600_b4","unstructured":"Hair, J., Anderson, R. and Tatham, R. (1987), Multivariant Data Analysis, Macmillan, New York, NY."},{"key":"key2022032119445509600_b5","unstructured":"Karger, P. (1988), Implementing Commercial Data Integrity with Secure Capabilities, Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"key2022032119445509600_b6","doi-asserted-by":"crossref","unstructured":"McLean, J. (1985), \u201cA comment on the Basic Security Theorem of Bell and LaPadula\u201d, Information Processing Letters, Vol. 20.","DOI":"10.21236\/ADA462369"},{"key":"key2022032119445509600_b7","unstructured":"Saati, T. and Alexander, J.M. (1981), Thinking with Models: Mathematical Models in the Physical, Biological, and Social Sciences, Pergamon Press, Oxford."},{"key":"key2022032119445509600_b8","unstructured":"TCSEC (1983), \u201cDepartment of Defense trusted computer security evaluation criteria\u201d, US National Computer Security Center, Publication No. CSC\u2010STD\u2010001\u201083."}],"container-title":["Information Management & Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810240112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810240112\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810240112\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T19:48:34Z","timestamp":1647892114000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810240112\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,12,1]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1998,12,1]]}},"alternative-id":["10.1108\/09685229810240112"],"URL":"https:\/\/doi.org\/10.1108\/09685229810240112","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[1998,12,1]]}}}