<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A model of a centralized security system, as an information technology for the synthesis of an OS architecture protected against the leakage of confidential information ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yuriy</forename><surname>Stetsyuk</surname></persName>
							<email>yuriy.stetsuk@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<addrLine>Khmelnitsky, Instytutska street 11</addrLine>
									<postCode>29016</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Stetsyuk</surname></persName>
							<email>mykola.stetsiuk@khmnu.edu.ua</email>
						</author>
						<author>
							<persName><forename type="first">Kyrylo</forename><surname>Voznyi</surname></persName>
							<email>k.vozniy@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<addrLine>Khmelnitsky, Instytutska street 11</addrLine>
									<postCode>29016</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vadym</forename><surname>Paiuk</surname></persName>
							<email>vadympaiuk@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<addrLine>Khmelnitsky, Instytutska street 11</addrLine>
									<postCode>29016</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Miroslav</forename><surname>Kvassay</surname></persName>
							<email>miroslav.kvassay@fri.uniza.sk</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<addrLine>Khmelnitsky, Instytutska street 11</addrLine>
									<postCode>29016</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Zilina University</orgName>
								<address>
									<addrLine>Univerzitná 8215</addrLine>
									<postCode>010 26</postCode>
									<settlement>Žilina</settlement>
									<country key="SK">Slovakia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Workshop on Advanced Applied Information Technologies</orgName>
								<address>
									<addrLine>December 5</addrLine>
									<postCode>2024</postCode>
									<settlement>KhmelnytskyiZilina</settlement>
									<country>Ukraine -, Slovakia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A model of a centralized security system, as an information technology for the synthesis of an OS architecture protected against the leakage of confidential information ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">DF9D86394AD5A4D52E9E142E890BA777</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>operating system, information protection, centralized system, security mechanisms1 (M. Kvassay) 0000-0003-0312-2276 (Y. Stetsyuk)</term>
					<term>0000-0003-3875-0416 (M. Stetsyuk)</term>
					<term>0009-0007-2545-565 (K. Voznyi)</term>
					<term>0000-0002-9969-8239 (V. Paiuk)</term>
					<term>0000-0002-6450-5417 (M. Kvassay)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The construction of subsystem models of a decentralized and centralized OS security system designed to work as part of a protected system for processing confidential information in a multi-machine network computer system is considered. An analysis of publications related to the construction of OSs resistant to the leakage of confidential information and, in general, the protection of the information processed in them, was performed. Their protection mechanisms and methods of improving the efficiency of their work within the framework of OS security systems are considered. The principles of building decentralized and centralized OS security systems and the principles of organizing the operation of their security mechanisms are considered. A comparative analysis of the effectiveness of centralized and decentralized security systems was performed. A graphical model of a centralized security system for construction is presented.</p><p>The key aspect, according to the adopted approach, is to find a balanced OS security subsystem architecture that can effectively ensure the OS's resilience to information leakage and its information protection in general.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The development of information technologies has led to the fact that almost all aspects of human activity have become critically dependent on various achievements in computers, computing systems and their mathematical support. The successful operation of computer systems, in turn, is a hostage to their qualities, such as reliability, fault tolerance and, most importantly, information security.</p><p>Their work is based on operating systems of different types and purposes. The fundamental nature of the OS is to abstract the hardware from the user of the information system, allowing the user not to experience all the complexity of the multifaceted hardware platform of a modern computer system, allowing him to focus on solving his application task. OS, managing the work of the computer system, solves very important system-wide tasks related to the distribution of hardware resources, multitasking, productivity and, most importantly, ensuring information security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Analysis of known solutions</head><p>It immediately became clear that only the anticipatory development of OS protective mechanisms will allow them to provide their functionality without significant information losses. The search for models of OS architectures resistant to various types of destruction has become a constant process. An important stage in the formation of the OS was the presentation of several abstract models of protection systems, which became their fundamental bases. One of the first was the 1977 Biba model <ref type="bibr" target="#b0">[1]</ref>. According to it, all subjects and objects of some system are previously divided into several levels of access, with the imposition of restrictions on their interaction <ref type="bibr" target="#b1">[2]</ref>.</p><p>The next step in the development of abstract models of OS security systems was the 1982 Goguen-Meseguer model, based on the theory of automata <ref type="bibr" target="#b2">[3]</ref>. In 1986, the Sutherland model of protection was presented, which emphasizes the interaction of subjects and information flows. According to it, as in the previous model, the system can only be in predefined states <ref type="bibr" target="#b3">[4]</ref>. An important role in the theory of information protection is played by the Clark-Wilson (Clark-Wilson) protection model of 1987 <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>, which is based on the use of transactions and on the balanced granting of access rights of subjects to objects.</p><p>In addition to purely abstract models of building OS protection systems, there are many practical developments <ref type="bibr" target="#b13">[14]</ref> embodied in physical OSes. The process of development of operating systems, as a class of software, began with universal OSes and led to the separation of subclasses in them based on the principle of increasing the importance of some operational parameters. Thus, the advantage of security parameters led to the emergence of a subclass of protected OSes, which must meet certain standards and use specialized mechanisms to counter threats <ref type="bibr" target="#b8">[9]</ref>. Today, this is not only a purely scientific or technical concept, but also a legal one. Requirements for such systems are defined in national standards <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Thus, the US standard developed by the National Institute of Standards and Technologies (NIST) defines a protected OS in the context of requirements for information systems at the federal level <ref type="bibr" target="#b9">[10]</ref>.</p><p>Protected OS, unlike universal ones, includes more effective, mandatory protection mechanisms against various threats and a wider range of them. The main ones are: mandatory access control (MAC), minimization of privileges, auditing and security monitoring, OS kernel security, process isolation, memory protection, encryption, backup, network control, and data integrity and authenticity control. Many scientific works have been devoted to the development of methods for increasing their efficiency and removing various kinds of vulnerabilities <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref>.</p><p>Minimizing privileges allows you to significantly reduce the number of potentially vulnerable system components <ref type="bibr" target="#b14">[15]</ref>. New methods of authentication can use, in addition to a password, an electronic key, a smart card, and biometric data <ref type="bibr" target="#b16">[17]</ref>.</p><p>Auditing plays a critical role in ensuring data security and system integrity. Its improvement in terms of registration and analysis of actions of users who have access to system resources is considered in <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref>. New mechanisms of combating ZPP are proposed <ref type="bibr" target="#b23">[24]</ref>.</p><p>As you know, the kernel is the central part of the OS and serves as an interface between the OS hardware resources and applications. Improvement of the application switching mechanism, loading/unloading of their contexts is considered in <ref type="bibr" target="#b17">[18]</ref>. The organization of input-output processes, file system operation, processing of processor interruptions, process dispatching is given in <ref type="bibr" target="#b18">[19]</ref>.</p><p>In <ref type="bibr" target="#b19">[20]</ref>, a process isolation method is proposed, which is a fundamental approach to ensuring the safety, stability, and efficiency of protected OSes, which is based on the protection of the OS against malicious or incorrect actions of user programs.</p><p>In <ref type="bibr" target="#b20">[21]</ref>, issues of centralization of encryption and the use of new cryptography tools for memory protection are considered. In protected OS, the presence of a backup mechanism is mandatory, as it significantly increases the OS's resistance to all types of failures. Implementation methods are given in <ref type="bibr" target="#b21">[22]</ref>.</p><p>The mechanism of control of incoming and outgoing traffic according to the specified rules is presented in <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b24">25]</ref>. This is quite an important point in view of the significant increase in the number of services that actively use networks. Mechanisms for combating BOTNET are proposed <ref type="bibr" target="#b25">[26,</ref><ref type="bibr" target="#b26">27,</ref><ref type="bibr" target="#b27">28]</ref>.</p><p>The analysis of the state of use of the mechanisms for ensuring the stability of the OS against the leakage of confidential information and the protection of information in the OS in general covered almost all levels of system construction -from their hardware platform to the OS core. He showed that despite the presentation of a large number of fairly effective methods of ensuring OS resistance to the leakage of confidential information and, in general, information protection, their application is restrained by the ever-increasing complexity of implementation and the limitation of the comprehensive application of protective mechanisms at all levels of the OS architecture.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Formulation of the problem</head><p>The continuous development of computer information technologies has led to the need for widespread use of protected OSes designed for processing confidential data, which requires a new approach in building their security subsystems. They must provide their functionality with simultaneously high levels of fault tolerance, survivability and protection of the information processed in them.</p><p>The task is to find such a model of the architecture of the OS protection subsystem, which would integrate the most effective mechanisms for ensuring its resistance to leaks of confidential information, information protection in general. In this way, the scientific problem solved can be characterized as relevant and as one that has a fairly wide practical application.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">The main part 4.1. Architecture model of the decentralized OS protection subsystem</head><p>The model of a decentralized OS security system is based on the principle of distributing security functions between different components or segments of the system. In such an architecture, each component independently manages its own security policies, protection mechanisms, monitoring, and privilege management. Decentralized OS security systems are characterized by the presence of local access control systems, where each system component (database server, application, or process) has its own access policies implemented through local access control lists (ACLs).</p><p>Provision of access rights is carried out on the basis of roles or attributes using local authentication mechanisms. An example can be various types of servers operating under OS management and file systems of the same OS that use their own access policies for each user (Figure <ref type="figure" target="#fig_0">1</ref>).</p><p>The main feature of the decentralized model is the absence of a single security management center. The situation when each component is responsible for its own protection leads to an increase in its vulnerabilities: security management is complicated, the probability of configuration errors is increased, and coordination between protection mechanisms is limited.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Architecture model of the centralized OS protection subsystem</head><p>To overcome the above problems, we will introduce the central security management module CSMM (central security management module) into the OS architecture, where we will concentrate OS security management. Its functions include defining security policies, monitoring events in the system, responding to incidents, and auditing. The model of such organization of the architecture of the OS security system is presented in Figure <ref type="figure" target="#fig_1">2</ref>. In order for the central CSMM security module to receive information about the state of security from all important nodes of the OS, we will introduce into their architecture the peripheral security modules PSM1 -PSMn, which are installed on each node of the OS. In the given centralized OS security model presented in the form of a graph, the vertices correspond to the modules of the centralized OS security subsystem, and the directed edges of the graph indicate the corresponding interaction between the modules, determining the algorithm of its operation. Main interactions:</p><p>• CSMM sends security policies to peripheral security modules PSM1 -PSMn;</p><p>• PSM1 -PSMn modules send monitoring data and reports to the CSMM central control module.</p><p>The model can be extended by including other security mechanisms as needed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Analysis of the effectiveness of architectures with regard to their resistance to leakage of confidential information</head><p>A single center for managing access and security policies allows you to ensure consistency of all access rules to confidential information. Policies can be easily applied to all users and resources, reducing the chance of configuration errors that could lead to information leakage. Centralized privilege management allows you to restrict access to confidential data based on roles, which minimizes the risks of unauthorized access. Architectures based on the use of centralized OS security systems show high efficiency of all security mechanisms. Centralized management allows you to monitor all events in the system, which facilitates the detection of potential information leaks. A monitoring system (for example, MaxPatrol SIEM in Windows Server 2019) allows you to detect abnormal activity in real time and quickly respond to threats. Centralized event and audit logging provides a more complete picture of access to sensitive data. A single encryption standard allows you to ensure data protection at all levels of the system.</p><p>The redundancy mechanism within the framework of the centralized security system allows to ensure the protection of confidential data in case of failures or attacks of malicious software more fully than in the decentralized system.</p><p>A centralized OS security system allows for a more prompt response to malware attacks and lower administration costs.</p><p>The centralized OS security system allows for a more prompt response to malware attacks and lower administration costs. However, centralized systems are vulnerable to their central node. and centralized OS security systems, but it is always easier to protect a central node than several in decentralized systems.</p><p>Therefore, regardless of the mentioned vulnerability, the centralized security systems of the OS provide more effective protection of information in general and against leakage of confidential information in particular.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Experiments</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Access control testing</head><p>The purpose of the experiment: to test how effectively a centralized security system restricts access to resources based on policies set by administrators.</p><p>As a laboratory installation, we will use a virtual machine with a centralized security system. Setting up the OS for conducting the experiment consists in creating users test_user1 and test_user2 with different levels of access to resources in the OS, which will work from a computer with the domain name winserver.test.ua.</p><p>We set centralized access policies through Active Directory of the resource with confidential data 1111.txt.</p><p>During the experiment, users try to access the file with confidential data 1111.txt, to check the operation of the centralized security system. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Data encryption testing</head><p>The purpose of the experiment: to check the reliability of the centralized encryption system, namely during transmission over the network.</p><p>1 st stage. Let's try to intercept data by physically accessing network traffic. To do this, using the Wireshark network analyzer, with the encryption system turned off, we will view the content of the network data packet taken from the machine with IP 172.20.110.114. The result is shown in figure <ref type="figure" target="#fig_3">4</ref>. As you can see, in such a situation, the data are available, which means that their protection is absent.</p><p>2 nd stage. Enable the data encryption system in the OS using BitLocker and configure encryption policies for network connections (SSL/TLS). We will intercept the network packet from the same IP address.</p><p>The result is shown in figure <ref type="figure" target="#fig_4">5</ref>. As can be seen from it, analysis of the packet data is impossible due to their encryption protection, which confirms the effectiveness of the centralized encryption system.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3.">Audit testing and logging</head><p>The purpose of the experiment. It is tested how effectively the central module stores and processes event logs, according to the given security policies, and whether these logs can be used to detect information leaks or suspicious activity. The result of the experiment. As can be seen from the audit log, all events, in accordance with established security policies, are recorded in the system (Figure <ref type="figure">6, 7</ref>). Each event can be detailed, providing information about the event that includes all the main parameters. Such a high degree of detailing of events allows detection of attempts of unauthorized access to resources, suspicious activity of individual users, which increases the ability of the central module to prevent information leakage.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>A centralized OS security system is not an absolute solution, but when the operating system is focused on preventing the leakage of sensitive information and generally protecting the information processed by its applications, it is, as experiments have shown, a better solution. Its key role in countering the leakage of confidential information is the use of integrated protection mechanisms and centralized management of all aspects of security. This guarantees the coordination of security measures, comprehensive, unlike decentralized systems, activity monitoring, access management and control over user and process actions, which significantly reduces the risk of unauthorized access to resources or data leakage.</p><p>The results of information technology research on the construction of a centralized OS security system confirm the improved level of resistance to the leakage of confidential information, the simplification of the management of mechanisms for assigning access rights to resources.</p><p>As an alternative approach for future research, developing a centralized OS security system can be used, considering the analysis of its components' importance <ref type="bibr" target="#b28">[29]</ref>. In reliability engineering, this approach is known as importance analysis <ref type="bibr" target="#b29">[30]</ref>. Machine learning based on the importance analysis of systems can be effective for security systems too <ref type="bibr" target="#b30">[31]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Model of the decentralized OS security system.</figDesc><graphic coords="3,114.93,478.98,370.73,247.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Graph model of the centralized security system of the abstract OS.</figDesc><graphic coords="4,150.93,386.28,298.79,277.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3:The reaction of the OS security system to an attempt to access a file system object without the appropriate rights.</figDesc><graphic coords="6,150.32,204.90,299.77,183.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Network packet with the centralized encryption system disabled.</figDesc><graphic coords="7,98.48,62.35,403.64,131.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Network package with the centralized encryption system enabled.</figDesc><graphic coords="7,97.83,230.40,404.35,131.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :Figure 7 :</head><label>67</label><figDesc>Figure 6:. Security system audit log.</figDesc><graphic coords="7,169.08,472.88,262.25,97.99" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work was partially supported by the Slovak Research and Development Agency under the grant ''Development of a new approach for reliability analysis and risk assessment based on artificial intelligence'' (reg.no. APVV-23-0033).</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>During the preparation of this work, the authors used Grammarly in order to: grammar and spelling check; DeepL Translate in order to: some phrases translation into English. After using these tools/services, the authors reviewed and edited the content as needed and take full responsibility for the publication's content.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Comparative studies of access delineation technologies for data protection in a computer system</title>
		<author>
			<persName><forename type="first">S</forename><surname>Semenov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zmiivska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Golubenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information processing systems</title>
		<imprint>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="99" to="102" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://www.vpnunlimited.com/ua/help/cybersecurity/biba-model" />
		<title level="m">VPN Unlimited part of MonoDefence</title>
				<imprint/>
	</monogr>
	<note>Biba Model</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Unwinding and Inference Control</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Goguen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Meseguer</surname></persName>
		</author>
		<idno type="DOI">10.1109/SP.1984.10019</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Symposium on Security and Privacy</title>
				<meeting><address><addrLine>Oakland, CA, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1984">1984. 1984</date>
			<biblScope unit="page" from="75" to="75" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The Evans &amp; Sutherland view of tomorrow&apos;s supercomputing</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Hahn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Oestreicher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Stevenson</surname></persName>
		</author>
		<idno type="DOI">10.1109/CMPCON.1989.301945</idno>
	</analytic>
	<monogr>
		<title level="m">Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage</title>
				<meeting><address><addrLine>San Francisco, CA, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1989">1989</date>
			<biblScope unit="page" from="300" to="303" />
		</imprint>
	</monogr>
	<note>Digest of Papers. COMPCON Spring 89</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Formal Modelling and Implementation of Clark-Wilson Security Policy with FoCaLiZe</title>
		<author>
			<persName><forename type="first">H</forename><surname>Fatima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Messaoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rachid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">M</forename><surname>Mounir</surname></persName>
		</author>
		<idno type="DOI">10.1109/PAIS62114.2024.10541223</idno>
	</analytic>
	<monogr>
		<title level="m">6th International Conference on Pattern Analysis and Intelligent Systems (PAIS)</title>
				<meeting><address><addrLine>EL OUED, Algeria</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024">2024. 2024</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Enhancing User Privacy Protection by Enforcing Clark-Wilson Security Model on Facebook</title>
		<author>
			<persName><forename type="first">F</forename><surname>Avorgbedor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1109/EIT48999.2020.9208279</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Electro Information Technology (EIT)</title>
				<meeting><address><addrLine>Chicago, IL, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="155" to="161" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">Law of Ukraine: On the Protection of Information in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">80</biblScope>
			<biblScope unit="issue">31</biblScope>
			<biblScope unit="page">7</biblScope>
			<date type="published" when="1994">1994. 1994</date>
		</imprint>
	</monogr>
	<note>as amended and supplemented</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<idno>DSTU EN ISO/IEC 15408-1:2022</idno>
		<title level="m">Method of protection. Evaluation criteria. Part 1: Introduction and general model</title>
				<imprint/>
	</monogr>
	<note>Information technology</note>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Security Engineering: A Guide to Building Dependable Distributed Systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Anderson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Wiley</publisher>
			<biblScope unit="page">1232</biblScope>
		</imprint>
	</monogr>
	<note>3rd edition</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<idno>200</idno>
		<title level="m">Minimum Security Requirements for Federal Information and Information Systems/Federal Information Processing Standards</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>FIPS PUB ; National Institute of Standarts and Technology USA</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Mandatory Access Control Method for Windows Embedded OS Security</title>
		<author>
			<persName><forename type="first">C</forename><surname>Cho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Seong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Won</surname></persName>
		</author>
		<idno type="DOI">10.3390/electronics10202478</idno>
		<ptr target="https://doi.org/10.3390/electronics10202478" />
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">12</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Access Control Models. Bulgarian academy of sciences</title>
		<author>
			<persName><forename type="first">М</forename><surname>Penelova</surname></persName>
		</author>
		<idno type="DOI">10.2478/cait-2021-0044</idno>
		<ptr target="http://dx.doi.org/10.2478/cait-2021-0044" />
	</analytic>
	<monogr>
		<title level="j">Cybernetics and information technologies</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="77" to="104" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Implementing the principle of least administrative privilege on operating systems: challenges and perspectives</title>
		<author>
			<persName><forename type="first">E</forename><surname>Billoir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Laborde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Wazan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Benzekri</surname></persName>
		</author>
		<idno type="DOI">10.1007/s12243-024-01033-5</idno>
		<ptr target="https://doi.org/10.1007/s12243-024-01033-5" />
	</analytic>
	<monogr>
		<title level="j">Ann. Telecommun</title>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">N</forename><surname>Devyanin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Khoroshilov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Kuliamin</surname></persName>
		</author>
		<idno type="DOI">10.1134/S0361768820070026</idno>
		<ptr target="https://doi.org/10.1134/S0361768820070026" />
	</analytic>
	<monogr>
		<title level="j">Program Comput Soft</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="443" to="453" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Mastering Linux Administration -Second Edition: Take your sysadmin skills to the next level by configuring and maintaining Linux systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Calcatinge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Balog</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2024">2024</date>
			<publisher>Packt Publishing</publisher>
			<biblScope unit="page">764</biblScope>
		</imprint>
	</monogr>
	<note>2nd ed. Edition</note>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks*</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Tevault</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2023">2023</date>
			<publisher>Packt Publishing</publisher>
			<biblScope unit="page">618</biblScope>
		</imprint>
	</monogr>
	<note>3rd Edition</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems</title>
		<author>
			<persName><forename type="first">N</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Du</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-65175-5_15</idno>
		<ptr target="https://doi.org/10.1007/978-3-031-65175-5_15" />
	</analytic>
	<monogr>
		<title level="m">ICT Systems Security and Privacy Protection*, SEC 2024, IFIP Advances in Information and Communication Technology</title>
				<editor>
			<persName><forename type="first">N</forename><surname>Pitropakis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Katsikas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Furnell</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Markantonakis</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024-07">July 2024</date>
			<biblScope unit="volume">710</biblScope>
			<biblScope unit="page" from="206" to="220" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Shared-Memory Synchronization</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Scott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Brown</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-38684-8</idno>
		<ptr target="https://doi.org/10.1007/978-3-031-38684-8" />
		<imprint>
			<date type="published" when="2024">2024</date>
			<publisher>Springer</publisher>
			<biblScope unit="page">243</biblScope>
			<pubPlace>Cham</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Kuo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mohan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Xu</surname></persName>
		</author>
		<idno type="DOI">10.1145/3524301</idno>
		<ptr target="http://dx.doi.org/10.1145/3524301" />
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM*</title>
		<imprint>
			<biblScope unit="volume">65</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="101" to="109" />
			<date type="published" when="2022-05">May 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Fast and Flexible System-Call Aggregation</title>
		<author>
			<persName><forename type="first">L</forename><surname>Gerhorst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Herzog</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Reif</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Schröder-Preikschat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Höni</surname></persName>
		</author>
		<idno type="DOI">10.1145/3477113</idno>
		<ptr target="https://doi.org/10.1145/3477113" />
	</analytic>
	<monogr>
		<title level="m">11th Workshop on Programming Languages and Operating Systems (PLOS &apos;21)</title>
				<meeting><address><addrLine>Virtual Event, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021-10-25">October 25, 2021. 2021</date>
			<biblScope unit="volume">3487267</biblScope>
			<biblScope unit="page">6</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Trusted Client-Side Encryption for Cloud Storage</title>
		<author>
			<persName><forename type="first">M</forename><surname>Da Rocha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">C G</forename><surname>Valadares</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Perkusich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">C</forename><surname>Gorgonio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Pagno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">C</forename><surname>Will</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-72369-9_1</idno>
		<ptr target="https://doi.org/10.1007/978-3-030-72369-9_1" />
	</analytic>
	<monogr>
		<title level="m">Cloud Computing and Services Science. CLOSER 2020</title>
		<title level="s">Communications in Computer and Information Science</title>
		<editor>
			<persName><forename type="first">D</forename><surname>Ferguson</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Pahl</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Helfert</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021-03">March 2021</date>
			<biblScope unit="volume">1399</biblScope>
			<biblScope unit="page" from="1" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Breaking KASLR on mobile devices without any use of cache memory (extended version)</title>
		<author>
			<persName><forename type="first">M</forename><surname>Seddigh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Esfahani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bhattacharya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Aref</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Soleimany</surname></persName>
		</author>
		<idno type="DOI">10.1007/s13389-023-00344-y</idno>
		<ptr target="https://doi.org/10.1007/s13389-023-00344-y" />
	</analytic>
	<monogr>
		<title level="j">Journal of Cryptographic Engineering*</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="281" to="294" />
			<date type="published" when="2024-01">January 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Operating System Noise in the Linux Kernel</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">B</forename><surname>De Oliveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Casini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Cucinotta</surname></persName>
		</author>
		<idno type="DOI">10.1109/tc.2022.3187351</idno>
		<ptr target="https://doi.org/10.1109/tc.2022.3187351" />
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Computers</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="196" to="207" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">DNS-based Anti-evasion Technique for Botnets Detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Bobrovnikova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>Warsaw (Poland); Warsaw</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">September 24-26, 2015. 2015</date>
			<biblScope unit="page" from="453" to="458" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Botnet detection approach based on the distributed systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">N</forename><surname>Markowsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Vasylkiv</surname></persName>
		</author>
		<idno type="DOI">10.47839/ijc.19.2.1761</idno>
		<ptr target="https://doi.org/10.47839/ijc.19.2.1761" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Computing</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="190" to="198" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<title level="m">Proceedings of the 7-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>the 7-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>Berlin (Germany; Berlin</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">September 12-14, 2013. 2013</date>
			<biblScope unit="page" from="363" to="368" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">A Technique for detection of bots which are using polymorphic code</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<idno type="ISSN">1865-0929</idno>
		<imprint>
			<biblScope unit="volume">431</biblScope>
			<biblScope unit="page" from="265" to="276" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<idno type="ISSN">1865-0929</idno>
		<imprint>
			<biblScope unit="volume">370</biblScope>
			<biblScope unit="page" from="243" to="254" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Investigation multi-state system reliability by structure function</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Levashenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/DEPCOS-RELCOMEX.2007.28</idno>
		<ptr target="https://doi.org/10.1109/DEPCOS-RELCOMEX.2007.28" />
	</analytic>
	<monogr>
		<title level="m">Proc. of Int. Conf. on Dependability of Computer Systems</title>
				<meeting>of Int. Conf. on Dependability of Computer Systems<address><addrLine>DepCoS -RELCOMEX, Poland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="81" to="90" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Importance analysis by logical differential calculus</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Levashenko</surname></persName>
		</author>
		<idno type="DOI">10.1134/S000511791302001X</idno>
	</analytic>
	<monogr>
		<title level="j">Automation and Remote Control</title>
		<imprint>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="page" from="171" to="182" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">A new method for analysis of Multi-State systems based on Multi-valued decision diagram under epistemic uncertainty</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Levashenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rabcan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering and System Safety</title>
		<imprint>
			<biblScope unit="volume">229</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
	<note>article number 108868</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
