{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:35:17Z","timestamp":1725550517008},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540297697"},{"type":"electronic","value":"9783540321002"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11576235_39","type":"book-chapter","created":{"date-parts":[[2005,10,18]],"date-time":"2005-10-18T15:32:46Z","timestamp":1129649566000},"page":"358-370","source":"Crossref","is-referenced-by-count":0,"title":["Secure Real-Time Transaction Processing with Timeliness Guarantees in Mobile Distributed Real-Time Database Systems"],"prefix":"10.1007","author":[{"given":"Yingyuan","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Yunsheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guoqiong","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Kayan, E., Ulusoy, \u00d6.: An Evaluation of Real-time Transaction Management Issues in Mobile Database Systems. The Computer Journal, 501\u2013510 (1999)","DOI":"10.1093\/comjnl\/42.6.501"},{"key":"39_CR2","unstructured":"LaPadula, L., Bell, D.: Secure computer systems: Unified exposition and multics interpretation. The Mitre Corp (1976)"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Lampson, W.: A note on the confinement problem. Comm. of ACM (1973)","DOI":"10.1145\/362375.362389"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Lam, K.Y., Kuo, T.W.: Concurrency control in mobile distributed real-time database systems. Information Systems, 261\u2013286 (2002)","DOI":"10.1016\/S0306-4379(00)00018-1"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Sha, L., Rajkumar, R., Son, S.H., et al.: A Real-Time locking protocol. IEEE Transactions on Computers, 793\u2013800 (1991)","DOI":"10.1109\/12.83617"},{"key":"39_CR6","unstructured":"Li, G., Liu, Y.: Concurrency control in real-time database. In: MINI-MICRO SYSTEM, pp. 1501\u20131502 (2001) (in Chinese)"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Quazi, N.A., Suan, V.V.: Maintaining security and timeliness in real-time database system. The journal of Systems and Software, 15\u201329 (2002)","DOI":"10.1016\/S0164-1212(01)00111-X"},{"key":"39_CR8","unstructured":"Kang, K.D., Son, S.H., Stankovic, J.A.: STAR: Secure real-time transaction processing with timeliness guarantees. In: Proceedings of the 23rd IEEE Real-Time Systems Symposium (2002)"},{"key":"39_CR9","unstructured":"Binto, G., Jayant, H.: Secure transaction processing in firm real-time database systems. In: SIGMOD 1997, AZ, USA (1997)"},{"key":"39_CR10","unstructured":"David, R., Son, S.H., Mukkamala, R.: Supporting security requirements in multilevel realtime databases. IEEE Transactions on Knowledge and Data Engineering, 865\u2013879 (2000)"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11576235_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:58:50Z","timestamp":1605643130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11576235_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540297697","9783540321002"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11576235_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}