{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:23Z","timestamp":1725494423090},"reference-count":11,"publisher":"IEEE Comput. Soc. Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ftdcs.1995.525009","type":"proceedings-article","created":{"date-parts":[[2002,11,19]],"date-time":"2002-11-19T22:29:21Z","timestamp":1037744961000},"page":"395-403","source":"Crossref","is-referenced-by-count":0,"title":["Fragmentation of confidential objects for data processing security in distributed systems"],"prefix":"10.1109","author":[{"given":"J.-C.","family":"Fabre","sequence":"first","affiliation":[]},{"given":"T.","family":"Perennou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130780"},{"journal-title":"Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria","year":"1987","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"ref6","first-page":"37","article-title":"Supporting ObjectOriented Languages in a Distributed Environment: The COOL Approach","author":"lea","year":"1991","journal-title":"Proc Conf Technology of Object-Oriented Languages and Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/40.16792"},{"key":"ref5","first-page":"21","article-title":"Designing secure and reliable applications using frs: An object-oriented approach","author":"fabre","year":"1994","journal-title":"Proceedings of First European Dependable Computing Computing Conference (EDCC-1)"},{"key":"ref8","first-page":"28","article-title":"Secure Networking in the Sun Environment","author":"taylor","year":"1986","journal-title":"Proceedings of the USENIX Summer Conference"},{"key":"ref7","article-title":"Kerberos: an authentication service for open network systems","author":"steiner","year":"1988","journal-title":"Proceedings of the USENIX Winter Conference"},{"key":"ref2","first-page":"169","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/30401.30404"}],"event":{"name":"Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems","acronym":"FTDCS-95","location":"Cheju Island, South Korea"},"container-title":["Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx3\/3998\/11508\/00525009.pdf?arnumber=525009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T06:15:52Z","timestamp":1489126552000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/525009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ftdcs.1995.525009","relation":{},"subject":[]}}