{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:30:18Z","timestamp":1725492618824},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405368"},{"type":"electronic","value":"9783540450733"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45073-4_18","type":"book-chapter","created":{"date-parts":[[2007,10,9]],"date-time":"2007-10-09T13:30:06Z","timestamp":1191936606000},"page":"226-244","source":"Crossref","is-referenced-by-count":1,"title":["Multilevel Secure Rules and Its Impact on the Design of Active Database Systems"],"prefix":"10.1007","author":[{"given":"Indrakshi","family":"Ray","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"R. Agarwal and N. Gehani. Ode (Object database and environment): The language and the data model. In Proceedings of the ACM-SIGMOD International Conference on Management of Data, pages 36\u201345, Portland, OR, May 1989.","DOI":"10.1145\/67544.66930"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"V. Atluri, S. Jajodia, T.F. Keefe, C. McCollum, and R. Mukkamala. Multilevel Secure Transaction Processing: Status and Prospects. In P. Samarati and R.S. Sandhu, editors, Database Security X: Status and Prospects, chapter 6, pages 79\u201398. Chapman & Hall, 1997.","DOI":"10.1007\/978-0-387-35167-4_6"},{"key":"18_CR3","series-title":"Technical Report","volume-title":"Secure computer system: Unified exposition and multics interpretation","author":"D. E. Bell","year":"1975","unstructured":"D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, MITRE Corporation, Bedford, MA, July 1975."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"T. A. Berson and T. F. Lunt. Multilevel Security for Knowledge-Based Systems. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 235\u2013242, Oakland, CA, April 1987.","DOI":"10.1109\/SP.1987.10024"},{"key":"18_CR5","series-title":"Lect Notes Comput Sci","first-page":"416","volume-title":"Proceedings of the Third International Conference on Deductive and Object-Oriented Databases","author":"E. Bertino","year":"1993","unstructured":"E. Bertino and S. Jajodia. Modeling Multilevel Entities using Single Level Objects. In Proceedings of the Third International Conference on Deductive and Object-Oriented Databases, volume 760 of Lecture Notes in Computer Science, pages 416\u2013428, Phoenix, AZ, December 1993. Springer-Verlag."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"N. Boulahia-Cuppens, F. Cuppens, A. Gabillon, and K. Yazdanian. Virtual View Model to Design a Secure Object-Oriented Database. In Proceedings of the National Computer Security Conference, pages 66\u201376, Baltimore, MD, October 1994.","DOI":"10.1007\/978-1-4471-3858-7_6"},{"key":"18_CR7","unstructured":"A.P. Buchman, H. Branding, T. Kundrass, and J. Zimmermann. REACH: A REal-time ACtive and Heterogeneous Mediator System. Bulletin of the IEEE Technical Committee on Data Engineering, 15(4), December 1992."},{"key":"18_CR8","series-title":"Technical Report","volume-title":"Consolidated specification of Chimera, the conceptual interface of idea","author":"S. Ceri","year":"1993","unstructured":"S. Ceri and R. Manthey. Consolidated specification of Chimera, the conceptual interface of idea. Technical Report IDEA.DD.2P.004, Politecnico di Milano, Milan, Italy, June 1993."},{"issue":"4","key":"18_CR9","first-page":"35","volume":"15","author":"S. Chakravarthy","year":"1992","unstructured":"S. Chakravarthy, E. Hanson, and S.Y.W. Su. Active data\/knowledge base research at the University of Florida. Bulletin of the IEEE Technical Committee on Data Engineering, 15(4):35\u201339, December 1992.","journal-title":"Bulletin of the IEEE Technical Committee on Data Engineering"},{"key":"18_CR10","unstructured":"C. Collet, T. Coupaye, and T. Svensen. NAOS\u2014efficient and modular reactive capabilities in an object-oriented database system. In Proceedings of the Twentieth International Conference on Very Large Databases, pages 132\u2013143, Santiago, Chile, 1994."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"O. Costich and J. McDermott. Amultilevel transaction problem for multilevel secure database system and its solution for the replicated architecture. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 192\u2013203, Oakland, CA, May 1992.","DOI":"10.21236\/ADA462530"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"D. Denning and T. F. Lunt. A multilevel relational data model. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 220\u2013234, Oakland, CA, May 1987.","DOI":"10.1109\/SP.1987.10023"},{"issue":"3","key":"18_CR13","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/0167-4048(87)90105-2","volume":"6","author":"P. A. Dwyer","year":"1987","unstructured":"P. A. Dwyer, G. D. Gelatis, and M. B. Thuraisingham. Multilevel security in database management systems. Computers and Security, 6(3):252\u2013260, June 1987.","journal-title":"Computers and Security"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"T. D. Garvey and T. F. Lunt. Multilevel Security for Knowledge-Based Systems. In Proceedings of the Sixth Computer Security Applications Conference, pages 148\u2013159, Tucson, AZ, December 1990.","DOI":"10.1109\/CSAC.1990.143763"},{"key":"18_CR15","unstructured":"S. Gatziu, A. Geppert, and K. R. Dittrich. Integrating active concepts into an object-oriented database system. In Proceedings of the Third International Workshop on Database Programming Languages, Nafplion, Greece, August 1991."},{"key":"18_CR16","first-page":"265","volume-title":"Database Security IV: Status and Prospects","author":"J. T. Haigh","year":"1991","unstructured":"J. T. Haigh, R. C. O\u2019Brien, and D. J. Thomsen. The LDV Secure Relational DBMS Model. In S. Jajodia and C.E. Landwehr, editors, Database Security IV: Status and Prospects, pages 265\u2013279. Elsevier Science Publishers B.V. (North-Holland), 1991."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"E. Hanson. Rule condition testing and action execution in Ariel. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 49\u201358, San Diego, CA, June 1992.","DOI":"10.1145\/130283.130295"},{"key":"18_CR18","first-page":"221","volume-title":"Database Security IV: Status and Prospects","author":"D. K. Hsiao","year":"1991","unstructured":"D. K. Hsiao, M. J. Kohler, and S.W. Stround. Query Modifications as Means of Controlling Access to Multilevel Secure Databases. In S. Jajodia and C.E. Landwehr, editors, Database Security IV: Status and Prospects, pages 221\u2013240. Elsevier Science Publishers B.V. (North-Holland), 1991."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"S. Jajodia and B. Kogan. Transaction Processing in Multilevel Secure Databases using Replicated Architecture. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 360\u2013368, Oakland, CA, May 1990.","DOI":"10.1109\/RISP.1990.63864"},{"key":"18_CR20","first-page":"297","volume-title":"Database Security IV: Status and Prospects","author":"S. Jajodia","year":"1991","unstructured":"S. Jajodia and R. Sandhu. Polyinstantiation Integrity in Multilevel elations Revisited. In S. Jajodia and C.E. Landwehr, editors, Database Security IV: Status and Prospects, pages 297\u2013307. Elsevier Science Publishers B.V. (North-Holland), 1991."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"S. Jajodia and R. Sandhu. Toward a Multilevel Relational Data Model. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 50\u201359, Denver, CO, 1991.","DOI":"10.1145\/115790.115796"},{"key":"18_CR22","unstructured":"T. F. Keefe, W. T. Tsai, and M. B. Thuraisingham. A Multilevel Security Model for Object-Oriented Systems. In Proceedings of the National Computer Security Conference, pages 1\u20139, Baltimore, MD, October 1988."},{"issue":"4","key":"18_CR23","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/122058.122069","volume":"19","author":"T. F. Lunt","year":"1990","unstructured":"T. F. Lunt and E. B. Fernandez. Database Security. SIGMOD Record, 19(4):90\u201397, December 1990.","journal-title":"SIGMOD Record"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"D.R. McCarthy and U. Dayal. The architecture of an active database management system. In Proceedings of the ACM-SIGMOD International Conference on Management of Data, pages 215\u2013224, Portland, OR, May 1989.","DOI":"10.1145\/67544.66946"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"J. K. Millen and T.F. Lunt. Security for Object-Oriented Database Systems. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 260\u2013272, Oakland, CA, May 1992.","DOI":"10.1109\/RISP.1992.213255"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"M. Morgenstern. Security and Inference in Multilevel Database and Knowledge-Base Systems. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 357\u2013373, San Francisco, CA, May 1987.","DOI":"10.1145\/38713.38752"},{"key":"18_CR27","first-page":"53","volume-title":"Database Security IV: Status and Prospects","author":"M. Morgenstern","year":"1991","unstructured":"M. Morgenstern. A Security Moddel for Multilevel Object with Bidirectional Relationship. In S. Jajodia and C.E. Landwehr, editors, Database Security IV: Status and Prospects, pages 53\u201371. Elsevier Science Publishers B.V. (North-Holland), 1991."},{"issue":"1","key":"18_CR28","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/174638.174640","volume":"19","author":"M.S. Olivier","year":"1993","unstructured":"M.S. Olivier and S. H. Von Solms. A Taxonomy for Secure Object-Oriented Databases. ACM Transactions on Database Systems, 19(1):3\u201346, March 1993.","journal-title":"ACM Transactions on Database Systems"},{"issue":"1","key":"18_CR29","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/311531.311623","volume":"31","author":"N.W. Paton","year":"1999","unstructured":"N.W. Paton and O. Diaz. Active Database Systems. ACM Computing Surveys, 31(1):63\u2013103, 1999.","journal-title":"ACM Computing Surveys"},{"key":"18_CR30","unstructured":"A. Rosenthal, S. Chakravarthy, B. Blaustein, and J. Blakeley. Situation monitoring for active databases. In Proceedings of the Fifteenth International Conference On Very Large Databases, pages 455\u2013464, Amsterdam, The Netherlands, August 1989."},{"key":"18_CR31","unstructured":"R. Sandhu and S. Jajodia. Referential Integrity in Multilevel Secure Databases. In Proceedings of the National Computer Security Conference, pages 39\u201352, Baltimore, MD, September 1993."},{"key":"18_CR32","unstructured":"L. M. Schlipper, J. Filsinger, and V. M. Doshi. A Multilevel Secure Database Management System Benchmark. In Proceedings of the National Computer Security Conference, pages 399\u2013408, Baltimore, MD, October 1992."},{"key":"18_CR33","series-title":"Technical Report","volume-title":"Multilevel secure rules: Integrating the multilevel and the active data model","author":"K. Smith","year":"1992","unstructured":"K. Smith and M. Winslett. Multilevel secure rules: Integrating the multilevel and the active data model. Technical Report UIUCDCS-R-92-1732, University of Illinois, Urbana-Champaign, IL, March 1992."},{"issue":"3","key":"18_CR34","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/69.54719","volume":"2","author":"P. D. Stachour","year":"1990","unstructured":"P. D. Stachour and M. B. Thuraisingham. Design of LDV: A Multilevel Secure Relational Database Management System. IEEE Transactions on Knowledge and Data Engineering, 2(3):190\u2013209, June 1990.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"10","key":"18_CR35","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/125223.125262","volume":"34","author":"M. Stonebraker","year":"1991","unstructured":"M. Stonebraker and G. Kemnitz. The POSTGRES Next-Generation Database Management System. Communications of the ACM, 34(10):78\u201392, October 1991.","journal-title":"Communications of the ACM"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"M. B. Thuraisingham. Mandatory Security in Object-Oriented Database Systems. In Proceedings of the International Conference on Object-Oriented Programming Systems, Languages and Applications, pages 203\u2013210, New Orleans, LA, October 1989.","DOI":"10.1145\/74877.74899"},{"issue":"4","key":"18_CR37","first-page":"15","volume":"15","author":"J. Widom","year":"1992","unstructured":"J. Widom. The Starburst Rule System: Language Design, Implementation and Application. Bulletin of the IEEE Technical Committee on Data Engineering, 15(4):15\u201318, December 1992.","journal-title":"Bulletin of the IEEE Technical Committee on Data Engineering"},{"key":"18_CR38","volume-title":"Active Database Systems Triggers and Rules For Advanced Database Processing","author":"J. Widom","year":"1996","unstructured":"J. Widom and S. Ceri. Active Database Systems Triggers and Rules For Advanced Database Processing. Morgan Kaufmann, San Francisco, CA, 1996."}],"container-title":["Lecture Notes in Computer Science","New Horizons in Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45073-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T10:43:37Z","timestamp":1684061017000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45073-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405368","9783540450733"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/3-540-45073-4_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}