{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:32:15Z","timestamp":1761323535140,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":22,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402070679"},{"type":"electronic","value":"9780306473746"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-47374-7_7","type":"book-chapter","created":{"date-parts":[[2008,1,19]],"date-time":"2008-01-19T11:32:24Z","timestamp":1200742344000},"page":"121-136","source":"Crossref","is-referenced-by-count":11,"title":["Security and Privacy Challenges of a Digital Government"],"prefix":"10.1007","author":[{"given":"James B. D.","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Arif","family":"Ghafoor","sequence":"additional","affiliation":[]},{"given":"Walid G.","family":"Aref","sequence":"additional","affiliation":[]},{"given":"Eugene H.","family":"Spafford","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"M. S. Ackerman, L. F. Cranor, J. Reagle, \u201cPrivacy in e-commerce: examining user scenarios and privacy preferences\u201d Proceedings of the first ACM conference on Electronic commerce, 1999, Pages 1\u20138.","DOI":"10.1145\/336992.336995"},{"key":"7_CR2","volume-title":"Cyber Terrorism and Information Warfare I, Assessment of Challenges","author":"Y. Alexander","year":"1999","unstructured":"Y. Alexander, M.S. Swetnam, Cyber Terrorism and Information Warfare I, Assessment of Challenges, Oceana Publisher Inc.\/Dobbs Ferry, New York, 1999."},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"E. Bertino, E. Ferrari, V. Atluri, \u201cThe Specification and Enforcement of Authorization Constraints in Workflow Management Systems,\u201d ACM Transactions on Information and System Security, Vol. 2, No. 1, Feb. 1999, pp. 65\u2013104.","journal-title":"ACM Transactions on Information and System Security"},{"key":"7_CR4","unstructured":"A. Briney, \u201cSecurity Focussed\u201d, Information Security Magazine, September, 2000, Pages 40\u201368."},{"key":"7_CR5","unstructured":"D. Denning, \u201cActivism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy\u201d, Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop, December, 2001."},{"key":"7_CR6","volume-title":"Web Security & Commerce","author":"S. Garfinkel","year":"1997","unstructured":"S. Garfinkel, E. H. Spafford, \u201cWeb Security & Commerce,\u201d O\u2019Reilly & Associates, Inc., Sebastapol, CA, 1997."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"L. Gong and X. Qian, \u201cComputational Issues in Secure Interoperation\u201d, IEEE Transaction on Software and Engineering, Vol. 22, No. 1, January 1996.","DOI":"10.1109\/32.481533"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"J. Hale, m. Papa, S. Shenoi, \u201cProgrammable Security for Object-Oriented Systems\u201d, \u201cProceedings\u201d, Database Security XII: Status and Prospects, S. Jajodia (eds), Kluwer Academic Publishers, 1998, pp. 109\u2013123.","DOI":"10.1007\/978-0-387-35564-1_7"},{"key":"7_CR9","volume-title":"Proceedings of the Third Australian Conference","author":"Q. He","year":"1998","unstructured":"Q. He, K. Sycara, Z. Su, \u201cA Solution to Open Standard of PKI\u201d, Proceedings of the Third Australian Conference, Eds. \u2014Colin Boyd, Ed Dawson, ACISP\u201998, Brisbase, Australia, July 13\u201315, 1998."},{"key":"7_CR10","unstructured":"H. H. Hosmer, \u201cMetapolicies I\u201d, ACM SIGSAC Data Management Workshop, San Antonio, TX, December, 1991."},{"key":"7_CR11","unstructured":"\u201cDatabase Security XII Status and Prospects\u201d, Editor: Sushil Jajodia, IFIP TC1 1 WG11.3 Twelfth International Working Conference on Database Security, July 15\u201317, 1998, Chalkidiki, Greece."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"D. Jonscher, K.R. Dittrich, \u201cArgos \u2014A Configurable Access Control System for Interoperable Environments\u201d Proc. of the IFIP WG 11.3 Ninth Annual Working Conference on Database Security, Rensselaerville, NY, August 1995.","DOI":"10.1007\/978-0-387-34932-9_4"},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/359205.359224","volume":"44","author":"J. B. D. Joshi","year":"2001","unstructured":"J. B. D. Joshi, W. G. Aref, A. Ghafoor, E. H. Spafford, \u201cSecurity models for web-based applications\u201d, Communications of the ACM, 44, 2 (Feb. 2001), pages 38\u201372.","journal-title":"Communications of the ACM"},{"key":"7_CR14","unstructured":"W. E. Kuhnhauser, M. K. Ostrowski, \u201cA Formal Framework to Support Multiple Security Policies\u201d, Proceedings of the 7th Canadian Computer Security Symposium, Ottawa, Canada, May 1995."},{"key":"7_CR15","unstructured":"S. Osborn, \u201cDatabase Security Integration using Role-Based Access Control\u201d, IFIP WG11.3 Working Conference on Database Security, Aug. 2000."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"R. Power, \u201c\u201cTangled Web\u201d: Tales of Digital Crime from the Shadows of Cyberspace,\u201d Que\/Macmillan Publishing, Aug. 31, 2000.","DOI":"10.1016\/S1353-4858(00)85022-9"},{"key":"7_CR17","unstructured":"Proceedings of The Fifth ACM Workshop on Role-based Access Control, Berlin, Germany, July 26\u201327, 2000"},{"key":"7_CR18","unstructured":"E. D. Shaw, K. G. Ruby, J. M. Post, \u201cThe Insider Threat to Information Systems\u201d, Security Awareness Bulletin No. 2-98, published by Department of Defense Security Institute, September 1998."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman, \u201cRole-Based Access Control: A Multi-Dimensional View\u201d, Proceedings of the 10th Annual Computer Security Applications Conference, Orlando, FL, December, 5\u20139, 1994, pages 54\u201362.","DOI":"10.1109\/CSAC.1994.367293"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Z. Tari, G. Fernandez, \u201cSecurity Enforcement in the DOK Federated Database System\u201d, Database Security X: Status and Prospects, P. Samarati, R. Sandhu (eds), Chapman & Hall, 1997, pp. 23\u201342.","DOI":"10.1007\/978-0-387-35167-4_3"},{"key":"7_CR21","unstructured":"R. K. Thomas, R.S. Sandhu, \u201cTask-based Authorization Controls (TBAC): A family of Models for Active and Enterprise-oriented Authorization management\u201d, Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, August 11\u201313, 1997."},{"key":"7_CR22","unstructured":"\u201cTV That Watches You: The Prying Eyes of Interactive Television\u201d, A report by Center For Digital Democracy, http:\/\/www.democraticmedia.org\/privacyreport.pdf, June, 2001."}],"container-title":["Advances in Database Systems","Advances in Digital Government"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-47374-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T21:53:55Z","timestamp":1737842035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-47374-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9781402070679","9780306473746"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/0-306-47374-7_7","relation":{},"ISSN":["1386-2944"],"issn-type":[{"type":"print","value":"1386-2944"}],"subject":[],"published":{"date-parts":[[2002]]}}}