{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:59:33Z","timestamp":1725573573326},"publisher-location":"New York, New York, USA","reference-count":0,"publisher":"ACM Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1978]]},"DOI":"10.1145\/800127.804146","type":"proceedings-article","created":{"date-parts":[[2003,11,13]],"date-time":"2003-11-13T15:18:27Z","timestamp":1068736707000},"page":"453-459","source":"Crossref","is-referenced-by-count":2,"title":["The Lattice Security Model In A Public Computing Network"],"prefix":"10.1145","author":[{"given":"Paul A.","family":"Karger","sequence":"first","affiliation":[]}],"member":"320","event":{"name":"the 1978 annual conference","start":{"date-parts":[[1978,12,4]]},"sponsor":["ACM, Association for Computing Machinery"],"location":"Washington, D.C., United States","end":{"date-parts":[[1978,12,6]]},"acronym":"ACM 78"},"container-title":["Proceedings of the 1978 annual conference on - ACM 78"],"original-title":[],"link":[{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=804146&ftid=59953&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,16]],"date-time":"2016-12-16T00:02:13Z","timestamp":1481846533000},"score":1,"resource":{"primary":{"URL":"http:\/\/portal.acm.org\/citation.cfm?doid=800127.804146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1978]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1145\/800127.804146","relation":{},"subject":[],"published":{"date-parts":[[1978]]}}}