{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:27:23Z","timestamp":1725460043347},"publisher-location":"Boston, MA","reference-count":27,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402080692"},{"type":"electronic","value":"9781402080708"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8070-0_21","type":"book-chapter","created":{"date-parts":[[2006,3,2]],"date-time":"2006-03-02T03:21:25Z","timestamp":1141269685000},"page":"288-301","source":"Crossref","is-referenced-by-count":1,"title":["RBAC Policy Implementation for SQL Databases"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]},{"given":"Paul","family":"Douglas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Barker, S., Data Protection by Logic Programming, 1st International Conference on Computational Logic, LNAI 1861, 1300\u20131313, Springer, 2000.","DOI":"10.1007\/3-540-44957-4_87"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Barker, S., TRBAC N: A Temporal Authorization Model, Proc. MMMANCS International Workshop on Network Security, in V. Gorodetski, V. Skormin, and L. Popyak (Eds.), Lecture Notes in Computer Science 2052, Springer, 178\u2013188, 2001.","DOI":"10.1007\/3-540-45116-1_19"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Barker, S., Protecting Deductive Databases from Unauthorized Retrieval and Update Requests, Journal of Data and Knowledge Engineering, Elsevier, 293\u2013315, 2002.","DOI":"10.1016\/S0169-023X(02)00126-X"},{"key":"21_CR4","unstructured":"Barker, S., and Rosenthal, A., Flexible Security Policies in SQL, DBSec 2001, 187\u2013199, 2001."},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Barker, S., Douglas, P. and Fanning, T., Implementing RBAC Policies in PL\/SQL, DBSec 2002.","DOI":"10.1007\/978-0-387-35697-6_3"},{"issue":"4","key":"21_CR6","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1145\/950191.950194","volume":"6","author":"S. Barker","year":"2003","unstructured":"Barker, S., and Stuckey, P., Flexible Access Control Policy Specification with Constraint Logic Programming, ACM Trans. on Information and System Security, 6,4, 501\u2013548, 2003.","journal-title":"ACM Trans. on Information and System Security"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Ferrari, E., and Perlasca, P., A System to Specify and Manage Multipolicy Access Control Models, Proc. IEEE 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 116\u2013127, 2002.","DOI":"10.1109\/POLICY.2002.1011299"},{"key":"21_CR8","unstructured":"Castano, S., Fugini, M., Martella, G., and Samarati, P., Database Security, Addison-Wesley, 1995."},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/0743-1066(93)90034-E","volume":"17","author":"W. Chen","year":"1993","unstructured":"Chen, W., and Warren, D., A Goal-Oriented Approach to Computing the Well-Founded Semantics, J. Logic Programming, 17, 279\u2013300, 1993.","journal-title":"J. Logic Programming"},{"key":"21_CR10","first-page":"293","volume-title":"Logic and Databases","author":"K. Clark","year":"1978","unstructured":"Clark, K., Negation as Failure, in H. Gallaire and J. Minker (Eds), Logic and Databases, Plenum, NY, 293\u2013322, 1978."},{"key":"21_CR11","unstructured":"Date, C., An Introduction to Database Systems (7th Edition), Addison-Wesley, 2000."},{"key":"21_CR12","unstructured":"Donahoo, M. and Calvert, K, The Pocket Guide to TCP\/IP Sockets, Morgan Kaufmann, 2001."},{"key":"21_CR13","unstructured":"Ferraiolo, D., Gilbert, D., and Lynch, N., An Examination of Federal and Commercial Access Control Policy Needs, Proc. 16th NIST-NSA National Computer Security Conference, 107\u2013116, 1993."},{"issue":"2","key":"21_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., and Subrahmaninan, V., Flexible Support for Multiple Access Control Policies, ACM TODS, 26,2, 214\u2013260, 2001.","journal-title":"ACM TODS"},{"key":"21_CR15","unstructured":"Java Native Interface, Sun Microsystems. java.sun.com\/products\/"},{"key":"21_CR16","unstructured":"Java Servlet Technology: Implementations and Specifications, Sun Microsystems. java.sun.com\/products\/jdk\/1.2\/docs\/guide\/jni"},{"key":"21_CR17","unstructured":"The JDBC API, Sun Microsystems. java.sun.com\/products\/jdbc"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Libkin, L, The Expressive Power of SQL, Proc. ICDT, 1\u201321, 2001.","DOI":"10.1007\/3-540-44503-X_1"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"LLoyd, J., Foundations of Logic Programming, Springer, 1987.","DOI":"10.1007\/978-3-642-83189-8"},{"key":"21_CR20","unstructured":"Przymusinski, T., Perfect Model Semantics, Proc. 5th ICLP, MIT Press, 1081\u20131096, 1988."},{"key":"21_CR21","unstructured":"Ramaswarmy, C., and Sandhu, R., Role-Based Access Control Features in Commercial Database Management Systems, Proc. 21st National Information Systems Security Conference, 503\u2013511, 1998."},{"key":"21_CR22","unstructured":"Sagonas, K., Swift, T., Warren, D., Freire, J., Rao, P., The XSB System, Version 2.0, Programmer\u2019s Manual, 1999."},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Sagonas, K., Swift, T. and Warren, D., XSB as an Efficient Deductive Database Engine, ACM SIGMOD Proceedings, p512, 1994.","DOI":"10.1145\/191839.191927"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., and Kuhn, R., The NIST Model for Role-Based Access Control: Towards a Unified Standard, Proc. 4th ACM Workshop on Role-Based Access Control, 47\u201361, 2000.","DOI":"10.1145\/344287.344301"},{"key":"21_CR25","unstructured":"Ullman, J., Principles of Database and Knowledge-Base Systems: Volume 1, Computer Science Press, 1990."},{"issue":"3","key":"21_CR26","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1145\/116825.116838","volume":"38","author":"A. Gelder Van","year":"1991","unstructured":"Van Gelder, A., Ross, K., and Schlipf, J., The Well-Founded Semantics for General Logic Programs, J. ACM, 38(3), 620\u2013650, 1991.","journal-title":"J. ACM"},{"key":"21_CR27","unstructured":"Decker, S., YAJXB, www-db.stanford.edu\/~stefan\/rdf\/yajxb"}],"container-title":["IFIP International Federation for Information Processing","Data and Applications Security XVII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8070-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T00:31:35Z","timestamp":1555461095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8070-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402080692","9781402080708"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8070-0_21","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}