{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:15:02Z","timestamp":1725567302985},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540288961"},{"type":"electronic","value":"9783540319900"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11553939_141","type":"book-chapter","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T04:35:23Z","timestamp":1285734923000},"page":"1005-1010","source":"Crossref","is-referenced-by-count":0,"title":["Develop Secure Database System with Security Extended ER Model"],"prefix":"10.1007","author":[{"given":"Xin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chang-xiang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"141_CR1","unstructured":"Department of Defense: Trusted Computer System Evaluation Criteria, DoD 5200.28-STD (December 1985)"},{"key":"141_CR2","unstructured":"NCSC: The Trusted Database Management System Interpretation of Trusted Computer System Evaluation Criteria, NCSC-TG-21 (April 1991)"},{"issue":"1","key":"141_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/320434.320440","volume":"1","author":"P.P. Chen","year":"1976","unstructured":"Chen, P.P.: The Entity-Relationship Model: Towards & Unified View of Data. ACM Transaction on Database Systems\u00a01(1), 9\u201336 (1976)","journal-title":"ACM Transaction on Database Systems"},{"issue":"6","key":"141_CR4","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/32.55088","volume":"16","author":"T.F. Lunt","year":"1990","unstructured":"Lunt, T.F., Denning, D.E., Schell, R.R., Heckman, M., Shockley, W.R.: The SeaView security model. IEEE Transactions on Software Engineering\u00a016(6), 593\u2013607 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"141_CR5","unstructured":"Wood, A.W., Lewis, S.R., Wiseman, S.R.: The SWORD Multilevel Secure DBMS, DRA Report No. 92005 (1992)"},{"key":"141_CR6","doi-asserted-by":"crossref","unstructured":"Lewis, S., Wiseman, S.: Database design and MLS DBMSs: an unhappy alliance? In: Proceedings Computer Security Applications Conference, 1993, Ninth Annual, December 6-10, pp. 232\u2013243 (1993)","DOI":"10.1109\/CSAC.1993.315436"},{"key":"141_CR7","unstructured":"Bell, D.E., La Padula, L.J.: Secure Computer Systems: A Refinement of the Mathematical Fundations [J], ESD-TR-73-278, vol. III, AD 780 528, Electronic Systems Division, Air Force System Command, Hanscom AFB, Bedford, Massachusetts (November 1974)"},{"key":"141_CR8","unstructured":"The PostgreSQL Global Development Group, PostgreSQL 7.3.2 Developer.s Guide [S\/OL], \n                    \n                      http:\/\/www.postgresql.org\/docs\/pdf\/7.3\/developer-7.3.2-A4.pdf_2004\/4-25"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11553939_141.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:05:25Z","timestamp":1619507125000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11553939_141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540288961","9783540319900"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11553939_141","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}