{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:15Z","timestamp":1725551595809},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_9","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"120-133","source":"Crossref","is-referenced-by-count":0,"title":["EPAL Based Privacy Enforcement Using ECA Rules"],"prefix":"10.1007","author":[{"given":"Jaijit","family":"Bhattacharya","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. K.","family":"Gupta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/44203.44208","volume":"17","author":"U. Dayal","year":"1988","unstructured":"Dayal, U., et al.: The HiPAC Project: Combining Active Databases and Timing Constraints. ACM Sigmod Record\u00a017, 1 (1988)","journal-title":"ACM Sigmod Record"},{"key":"9_CR2","unstructured":"Chakravarthy, S. (ed.): Active Databases, Special Issue of the Bulletin of the IEEE TC on Data Engineering,\u00a015, 1\u20134 (1992)"},{"key":"9_CR3","unstructured":"Chakravarthy, S., Widom, J.: Proc. of the 4th Intl. Workshop on Research Issues in Data Engineering: Active Database Systems, Houston (February 1994)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Gatziu, S., Dittrich, K.R.: SAMOS. Active Rules in Database Systems, 233\u2013247 (1999)","DOI":"10.1007\/978-1-4419-8656-6_12"},{"key":"9_CR5","unstructured":"Coupaye, T., Collet, C.: Semantics Based Implementation of Flexible Execution Models for Active Database Systems. In: Proc. 14\u00e8me Journ\u00e9es Bases de Donn\u00e9es Avanc\u00e9es, BDA (1998)"},{"key":"9_CR6","unstructured":"Gatziu, S., Geppert, A., Dittrich, K.R.: Integrating active concepts into an object-oriented database system. In: 3rd Int\u2019l.Workshop on Database Programming Languages, Naflion (August 1991)"},{"key":"9_CR7","unstructured":"Chakravarthy, S., Anwar, E., Maugis, L.: Design and implementation of active capability for an object-oriented database, Technical Report UF-CIS-TR-93-001, University of Florida (January 1993)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Chakravarthy, S., Le, R., Desai, R.: ECA Rule processing in Distributed and Heterogeneous Environments. In: Proceedings of the International Symposium on Distributed Objects and Applications","DOI":"10.1109\/DOA.1999.794056"},{"key":"9_CR9","unstructured":"Chakravarthy, S., Krishnaprasad, V., Tamizuddin, Z., Badani, R.H.: ECA Rule Integration into an OODBMS: Architecture and Implementation. In: Proc. Of the 11th Intl. Conf. On Data Engineering. Taipei, Taiwan (March 1995)"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0169-023X(94)90006-X","volume":"14","author":"S. Chakravarthy","year":"1994","unstructured":"Chakravarthy, S., Mishra, D.: Snoop: An expressive event specification language for active databases. Knowledge and Data Engineering Journal\u00a014, 1\u201326 (1994)","journal-title":"Knowledge and Data Engineering Journal"},{"key":"9_CR11","unstructured":"Bertino, E., Guerrini, G., Merlo, I.: Triggers in Java-based Databases. L\u2019OBJET\u00a06(3) (2000)"},{"issue":"4","key":"9_CR12","first-page":"588","volume":"12","author":"E. Bertino","year":"2000","unstructured":"Bertino, E., Guerrini, G., Merlo, I.: Trigger Inheritance and Overriding in an Active Object Database System. TKDE\u00a012(4), 588\u2013608 (2000)","journal-title":"TKDE"},{"issue":"6","key":"9_CR13","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"E. Lupu","year":"1999","unstructured":"Lupu, E., Sloman, M.: Conflicts in Policy-Based Distributed Systems Management. IEEE Transactions on Software Engineering (TSE)\u00a025(6), 852\u2013869 (1999)","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"key":"9_CR14","unstructured":"Bhattacharya, J., Gupta, S.K.: Privacy Broker for Enforcing Privacy Policies in Databases. In: KBCS-2004. Fifth international conference on knowledge based computer systems, Hyderabad, India (December 19-22 2004)"},{"key":"9_CR15","unstructured":"Schunter, M., et al.: Enterprise Privacy Authorization Language (EPAL 1.1), IBM Research Report, http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Batra, V., et al.: Policy Driven Data Administration. In: POLICY 2002, IEEE 3rd International Workshop on Policies for Distributed Systems and Networks (2002)","DOI":"10.1109\/POLICY.2002.1011312"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xiu, Y.: Hippocratic Databases (Vision Paper). IBM Almaden Research Center (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"issue":"4","key":"9_CR18","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wortman, J.C.: Security-control methods for statistical databases. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"key":"9_CR19","volume-title":"Database Security","author":"S. Castano","year":"1995","unstructured":"Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison Wesley, Reading (1995)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:03:00Z","timestamp":1605643380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11593980_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}