{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:09:43Z","timestamp":1725800983964},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/netsys.2019.8854491","type":"proceedings-article","created":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T00:26:41Z","timestamp":1570148801000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security"],"prefix":"10.1109","author":[{"given":"Ali","family":"Al-Haj","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Aziz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Row-level security","year":"2017","author":"macauley","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2015.2402432"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.67"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.07.004"},{"key":"ref14","first-page":"279","author":"foster","year":"2011","journal-title":"Frenetic A Network Programming Language"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461195"},{"key":"ref16","first-page":"483","author":"aschoff","year":"2017","journal-title":"A network access control solution combining orbac and sdn"},{"journal-title":"FRESCO Modular composable security services for software-defined networks","year":"2013","author":"shin","key":"ref17"},{"key":"ref18","first-page":"18","author":"batista","year":"2014","journal-title":"Ponderflow A new policy specification language to sdn openflow-based networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2517407"},{"key":"ref4","first-page":"1","author":"glaeser","year":"2016","journal-title":"Access control for a database-defined network"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890970"},{"journal-title":"Integrity Considerations for Secure Computer Systems","year":"1977","author":"biba","key":"ref6"},{"journal-title":"Secure Computer Systems Mathematical Foundations","year":"1973","author":"bell","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592785"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"journal-title":"Row security policies","year":"2017","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref20","first-page":"1","author":"bari","year":"2013","journal-title":"Policycop An autonomic qos policy enforcement framework for software defined networks"},{"journal-title":"A simple information flow security model for software-defined networks","year":"2015","author":"chalyy","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180471"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2005.04.013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1950-09392-6"},{"journal-title":"Multi-Site Connectivity (MSC) Capability Package V1 0","year":"2017","key":"ref26"},{"journal-title":"On the Derivation of Lattice Structured Information Flow Policies","year":"1976","author":"denning","key":"ref25"}],"event":{"name":"2019 International Conference on Networked Systems (NetSys)","start":{"date-parts":[[2019,3,18]]},"location":"Munich, Germany","end":{"date-parts":[[2019,3,21]]}},"container-title":["2019 International Conference on Networked Systems (NetSys)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8847242\/8854488\/08854491.pdf?arnumber=8854491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:19:59Z","timestamp":1658261999000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8854491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/netsys.2019.8854491","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}