{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:06:57Z","timestamp":1729609617733,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/acsac.2000.898862","type":"proceedings-article","created":{"date-parts":[[2002,11,11]],"date-time":"2002-11-11T09:58:51Z","timestamp":1037008731000},"page":"90-99","source":"Crossref","is-referenced-by-count":4,"title":["Implementing security policies using the Safe Areas of Computation approach"],"prefix":"10.1109","author":[{"given":"A.L.M.","family":"dos Santos","sequence":"first","affiliation":[]},{"given":"R.A.","family":"Kemmerer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49653-X_5"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/CSAC.1999.816011","article-title":"Safe Areas of Computation for Secure Computing with Insecure Applications","author":"dos santos","year":"1999","journal-title":"Proceedings of the Fifteenth Annual Computer Security Applications Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/989.991"},{"key":"ref5","article-title":"Java Security Bug (Applets Can Load Native Methods)","volume":"17","author":"hopwood","year":"1996","journal-title":"Risks Forum"},{"journal-title":"Data Encryption Standard (DES)","year":"1999","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502681"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/3-540-68671-1_13","article-title":"Web Browsers and Security","volume":"1419","author":"de paoli","year":"1998","journal-title":"Mobile Agents and Security"}],"event":{"name":"Annual Computer Security Applications Conference","acronym":"CSAC-00","location":"New Orleans, LA, USA"},"container-title":["Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7224\/19469\/00898862.pdf?arnumber=898862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T21:46:09Z","timestamp":1583876769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/898862\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/acsac.2000.898862","relation":{},"subject":[]}}