{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:03:22Z","timestamp":1725667402493},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2003.1254305","type":"proceedings-article","created":{"date-parts":[[2004,7,8]],"date-time":"2004-07-08T16:05:44Z","timestamp":1089302744000},"page":"2-12","source":"Crossref","is-referenced-by-count":6,"title":["MLS-PCA: a high assurance security architecture for future avionics"],"prefix":"10.1109","author":[{"given":"C.","family":"Weissman","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"DOD Instruction 8500 2","article-title":"Information Assurance (IA) Implementation","year":"2003","key":"ref10"},{"journal-title":"DOD 5220 22-M","article-title":"National Industrial Security Program Operating Manual, NISPOM","year":"1993","key":"ref11"},{"journal-title":"Director of Central Intelligence Directive 6\/3","article-title":"Protecting Sensitive Compartmented Information within Information Systems","year":"1999","key":"ref12"},{"journal-title":"DOD 5200 40","article-title":"DOD Information Technology Security Certification and Accreditation Process, DITSCAP","year":"1997","key":"ref13"},{"journal-title":"NIST","article-title":"National Information Assurance Partnership, NIAP","year":"1997","key":"ref14"},{"year":"2002","key":"ref15","article-title":"National Security Telecommunications and Information Systems Security Committee, NSTISSC, Policy #11"},{"journal-title":"NSA C12","article-title":"Partitioning Kernel Protection Profile, Preliminary Draft V0.3","year":"2002","key":"ref16"},{"key":"ref17","first-page":"294","article-title":"A Trusted Computing Base for Embedded Systems","author":"rushby","year":"1984","journal-title":"Proceedings of the 7th Department of Defense\/NBS Computer Security Conference"},{"year":"0","key":"ref18","article-title":"Definition"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213253"},{"journal-title":"Grid computer center","year":"0","key":"ref28"},{"journal-title":"ISO\/IEC 15408 Version 2 1 CCIMB-99–031","article-title":"Common Criteria for Information Technology Security Evaluation","year":"1999","key":"ref4"},{"key":"ref27","article-title":"Micromodels of Software: Modeling & Analysis with Alloy","author":"jackson","year":"2001","journal-title":"MIT Lab for Computer Science"},{"journal-title":"DoD 5200 28-STD","article-title":"Department of Defense Trusted Computer System Evaluation Criteria (TCSEC)","year":"1985","key":"ref3"},{"year":"0","key":"ref6","article-title":"Polymorphic Computing Architecture Mission"},{"year":"0","key":"ref29","article-title":"Intelligent Software Agents Lab"},{"journal-title":"Rainbow Series of books on evaluating Trusted Computer Systems according to National Security Agency (NSA) expounding on the Orange Book (TCSEC)","year":"0","key":"ref5"},{"journal-title":"CSC-STD-004-85","article-title":"Technical Rationale Behind CSC-STD-003–85: Computer Security Requirements","year":"1985","key":"ref8"},{"journal-title":"CSC-STD-002–85","article-title":"Computer Security Requirements - Guidance for Applying the DOD TCSEC in Specific Environments","year":"1985","key":"ref7"},{"key":"ref2","article-title":"Computer Security Technology Planning Study","author":"anderson","year":"1972","journal-title":"ESD-TR-73–51"},{"journal-title":"DOD Directive 8500 1","article-title":"Information Assurance","year":"2002","key":"ref9"},{"journal-title":"JCS J5","article-title":"Joint Vision 2020","year":"2000","key":"ref1"},{"key":"ref20","article-title":"Secure Computer Systems: Unified Exposition and Multics Interpretation","author":"bell","year":"1975","journal-title":"Technical Report ESD-TR-75-306"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2000.854387"},{"key":"ref21","article-title":"The Raw Prototype Design Document V4.11","author":"taylor","year":"2002","journal-title":"Department of Electrical Engineering MIT"},{"article-title":"Formal Specification Languages and Theorem Provers","year":"2001","author":"hashii","key":"ref24"},{"year":"2002","key":"ref23","article-title":"Trusted Computing Platform Alliance Main Specification Vl.l b"},{"article-title":"Using Alloy to Formally Specify MLS-PCA Trusted Security Architecture","year":"2003","author":"hashii","key":"ref26"},{"key":"ref25","first-page":"21","article-title":"Lightweight Formal Methods","author":"jackson","year":"1996","journal-title":"IEEE Computer"}],"event":{"name":"19th Annual Computer Security Applications Conference, 2003.","location":"Las Vegas, Nevada, USA"},"container-title":["19th Annual Computer Security Applications Conference, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8882\/28060\/01254305.pdf?arnumber=1254305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T23:49:16Z","timestamp":1489448956000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1254305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/csac.2003.1254305","relation":{},"subject":[]}}