{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T17:19:02Z","timestamp":1725383942534},"reference-count":15,"publisher":"IEEE Comput. Soc. Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.1989.81034","type":"proceedings-article","created":{"date-parts":[[2003,1,7]],"date-time":"2003-01-07T19:15:12Z","timestamp":1041966912000},"page":"95-102","source":"Crossref","is-referenced-by-count":0,"title":["The security policy of the secure distributed operating system prototype"],"prefix":"10.1109","author":[{"given":"N.","family":"Proctor","sequence":"first","affiliation":[]},{"given":"R.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.21236\/ADA200110","author":"mccullough","year":"1988","journal-title":"Foundations of Ulysses The Theory of Security"},{"key":"ref11","article-title":"Security and the Composition of Machines","author":"johnson","year":"1988","journal-title":"Proc IEEE Computer Security Foundations Workshop"},{"key":"ref12","article-title":"Quantitative Formal Security Analysis","author":"weber","year":"1988","journal-title":"Proceedings of the Computer Security Foundations Workshop"},{"key":"ref13","article-title":"TCB Subsetting for Incremental Evaluation","author":"schockley","year":"1987","journal-title":"Proceedings of the Third Aerospace Conference on Computer Security"},{"key":"ref14","article-title":"A Summary of the RADC Database Security Workshop","author":"lunt","year":"1988","journal-title":"Proceedings of the Eleventh National Computer Security Conference"},{"journal-title":"National Computer Security Center Trusted Network Interpretation","year":"1987","key":"ref15"},{"journal-title":"Cronus A Distributed Operating System Functional Definition and System Concept","year":"1988","author":"schantz","key":"ref4"},{"journal-title":"Cronus A Distributed Operating System Revised System\/Subsystem Specification","year":"1988","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8095"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.21236\/ADA204402","author":"vinter","year":"1988","journal-title":"The secure distributed operating system project"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10009"},{"key":"ref7","article-title":"The SDOS System: A Secure Distributed Operating System Prototype","author":"wong","year":"1989","journal-title":"Proceedings of the Twelfth National Computer Security Conference"},{"key":"ref2","article-title":"The Architecture of the Cronus Distributed Operating System","author":"schantz","year":"1986","journal-title":"In Proceedings of the IEEE Sixth International Conference on Distributed Computing Systems"},{"journal-title":"Department of Defense Trusted Computer System Evaluation Criteria","year":"1985","key":"ref1"},{"key":"ref9","article-title":"Covert Channels and Degrees of Insecurity","author":"mccullough","year":"1988","journal-title":"Proc IEEE Computer Security Foundations Workshop"}],"event":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","location":"Tucson, AZ, USA"},"container-title":["[1989 Proceedings] Fifth Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx2\/270\/2662\/00081034.pdf?arnumber=81034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T10:40:59Z","timestamp":1516876859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/81034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/csac.1989.81034","relation":{},"subject":[]}}