{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:20Z","timestamp":1725551600242},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_13","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"177-190","source":"Crossref","is-referenced-by-count":1,"title":["Event Detection in Multilevel Secure Active Databases"],"prefix":"10.1007","author":[{"given":"Indrakshi","family":"Ray","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, R., Gehani, N.: Ode (Object database and environment): The language and the data model. In: Proceedings of the ACM-SIGMOD International Conference on Management of Data, Portland, OR, pp. 36\u201345 (May 1989)","DOI":"10.1145\/67544.66930"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Berson, T.A., Lunt, T.F.: Multilevel Security for Knowledge-Based Systems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 235\u2013242 (April 1987)","DOI":"10.1109\/SP.1987.10024"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Boulahia-Cuppens, N., Cuppens, F., Gabillon, A., Yazdanian, K.: Virtual View Model to Design a Secure Object-Oriented Database. In: Proceedings of the National Computer Security Conference, Baltimore, MD, pp. 66\u201376 (October 1994)","DOI":"10.1007\/978-1-4471-3858-7_6"},{"key":"13_CR4","unstructured":"Buchman, A.P., Branding, H., Kundrass, T., Zimmermann, J.: REACH: A REal-time ACtive and Heterogeneous Mediator System. Bulletin of the IEEE Technical Committee on Data Engineering\u00a015(4) (December 1992)"},{"key":"13_CR5","unstructured":"Ceri, S., Manthey, R.: Consolidated specification of Chimera, the conceptual interface of idea. Technical Report IDEA.DD.2P.004, Politecnico di Milano, Milan, Italy (June 1993)"},{"issue":"4","key":"13_CR6","first-page":"35","volume":"15","author":"S. Chakravarthy","year":"1992","unstructured":"Chakravarthy, S., Hanson, E., Su, S.Y.W.: Active data\/knowledge base research at the University of Florida. Bulletin of the IEEE Technical Committee on Data Engineering\u00a015(4), 35\u201339 (1992)","journal-title":"Bulletin of the IEEE Technical Committee on Data Engineering"},{"key":"13_CR7","unstructured":"Collet, C., Coupaye, T., Svensen, T.: NAOS\u2013 efficient and modular reactive capabilities in an object-oriented database system. In: Proceedings of the Twentieth International Conference on Very Large Databases, Santiago, Chile, pp. 132\u2013143 (1994)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Denning, D., Lunt, T.F.: A multilevel relational data model. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 220\u2013234 (May 1987)","DOI":"10.1109\/SP.1987.10023"},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/0167-4048(87)90105-2","volume":"6","author":"P.A. Dwyer","year":"1987","unstructured":"Dwyer, P.A., Gelatis, G.D., Thuraisingham, M.B.: Multilevel security in database management systems. Computers and Security\u00a06(3), 252\u2013260 (1987)","journal-title":"Computers and Security"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Garvey, T.D., Lunt, T.F.: Multilevel Security for Knowledge-Based Systems. In: Proceedings of the Sixth Computer Security Applications Conference, Tucson, AZ, pp. 148\u2013159 (December 1990)","DOI":"10.1109\/CSAC.1990.143763"},{"key":"13_CR11","unstructured":"Gatziu, S., Geppert, A., Dittrich, K.R.: Integrating active concepts into an object-oriented database system. In: Proceedings of the Third International Workshop on Database Programming Languages, Nafplion, Greece (August 1991)"},{"key":"13_CR12","unstructured":"Haigh, J.T., O\u2019Brien, R.C., Thomsen, D.J.: The LDV Secure Relational DBMS Model. In: Jajodia, S., Landwehr, C.E. (eds.) Database Security IV: Status and Prospects, pp. 265\u2013279. Elsevier Science Publishers B.V., North-Holland (1991)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Hanson, E.: Rule condition testing and action execution in Ariel. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, San Diego, CA, pp. 49\u201358 (June 1992)","DOI":"10.1145\/130283.130295"},{"key":"13_CR14","unstructured":"Hsiao, D.K., Kohler, M.J., Stround, S.W.: Query Modifications as Means of Controlling Access to Multilevel Secure Databases. In: Jajodia, S., Landwehr, C.E. (eds.) Database Security IV: Status and Prospects, pp. 221\u2013240, Elsevier Science Publishers B.V. North-Holland (1991)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Sandhu, R.: Toward a Multilevel Relational Data Model. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Denver, CO, pp. 50\u201359 (1991)","DOI":"10.1145\/115790.115796"},{"key":"13_CR16","unstructured":"Keefe, T.F., Tsai, W.T., Thuraisingham, M.B.: A Multilevel Security Model for Object-Oriented Systems. In: Proceedings of the National Computer Security Conference, Baltimore, MD, pp. 1\u20139 (October 1988)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"McCarthy, D.R., Dayal, U.: The architecture of an active database management system. In: Proceedings of the ACM-SIGMOD International Conference on Management of Data, Portland, OR, pp. 215\u2013224 (May 1989)","DOI":"10.1145\/67544.66946"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Millen, J.K., Lunt, T.F.: Security for Object-Oriented Database Systems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 260\u2013272 (May 1992)","DOI":"10.1109\/RISP.1992.213255"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Morgenstern, M.: Security and Inference in Multilevel Database and Knowledge-Base Systems. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, San Francisco, CA, pp. 357\u2013373 (May 1987)","DOI":"10.1145\/38713.38752"},{"key":"13_CR20","unstructured":"Ray, I.: Multi-level secure active database rules and its impact on the design of active databases. In: Proceedings of the Twentieth British National Conference On Databases, Coventry, U.K. (July 2003)"},{"key":"13_CR21","unstructured":"Rosenthal, A., Chakravarthy, S., Blaustein, B., Blakeley, J.: Situation monitoring for active databases. In: Proceedings of the Fifteenth International Conference On Very Large Databases, Amsterdam, The Netherlands, pp. 455\u2013464 (August 1989)"},{"key":"13_CR22","unstructured":"Sandhu, R., Jajodia, S.: Referential Integrity in Multilevel Secure Databases. In: Proceedings of the National Computer Security Conference, Baltimore, MD, pp. 39\u201352 (September 1993)"},{"key":"13_CR23","unstructured":"Schlipper, L.M., Filsinger, J., Doshi, V.M.: A Multilevel Secure Database Management System Benchmark. In: Proceedings of the National Computer Security Conference, Baltimore, MD, pp. 399\u2013408 (October 1992)"},{"key":"13_CR24","unstructured":"Smith, K., Winslett, M.: Multilevel secure rules: Integrating the multilevel and the active data model. Technical Report UIUCDCS-R-92-1732, University of Illinois, Urbana-Champaign, IL (March 1992)"},{"issue":"3","key":"13_CR25","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/69.54719","volume":"2","author":"P.D. Stachour","year":"1990","unstructured":"Stachour, P.D., Thuraisingham, M.B.: Design of LDV: A Multilevel Secure Relational Database Management System. IEEE Transactions on Knowledge and Data Engineering\u00a02(3), 190\u2013209 (1990)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"10","key":"13_CR26","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/125223.125262","volume":"34","author":"M. Stonebraker","year":"1991","unstructured":"Stonebraker, M., Kemnitz, G.: The POSTGRES Next-Generation Database Management System. Communications of the ACM\u00a034(10), 78\u201392 (1991)","journal-title":"Communications of the ACM"},{"issue":"4","key":"13_CR27","first-page":"15","volume":"15","author":"J. Widom","year":"1992","unstructured":"Widom, J.: The Starburst Rule System: Language Design, Implementation and Application. Bulletin of the IEEE Technical Committee on Data Engineering\u00a015(4), 15\u201318 (1992)","journal-title":"Bulletin of the IEEE Technical Committee on Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:54Z","timestamp":1605643374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11593980_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}