{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:58:26Z","timestamp":1725987506099},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981765"},{"type":"electronic","value":"9783319981772"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-45140-4_16","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T23:17:09Z","timestamp":1185923829000},"page":"232-246","source":"Crossref","is-referenced-by-count":7,"title":["CHAOS: An Active Security Mediation System"],"prefix":"10.1007","author":[{"given":"David","family":"Liu","sequence":"first","affiliation":[]},{"given":"Kincho","family":"Law","sequence":"additional","affiliation":[]},{"given":"Gio","family":"Wiederhold","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,20]]},"reference":[{"key":"16_CR1","unstructured":"Steven M. Bellovin. Security and Software Engineering. In B. Krishnamurthy, editor: Practical Reusable UNIX Software. John Wiley & Sons, 1995."},{"key":"16_CR2","unstructured":"S. Castano, M.G. Fugini, G. Martella and P. Samarati. Database Security. Addison-Wesley, 1995."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"U. Dayal. Active Database Management Systems. In Proceedings of the Third International Conference on Data and Knowledge Bases, 1988.","DOI":"10.1016\/B978-1-4832-1313-2.50019-6"},{"key":"16_CR4","volume-title":"Cryptography and Data Security","author":"D. E. R. Denning","year":"1983","unstructured":"Dorothy E. R. Denning. Cryptography and Data Security. Addison-Wesley, Reading, MA, 1983."},{"key":"16_CR5","unstructured":"Simson Garfinkel and Gene Spafford. Practical Unix Security. O\u2019Reilly and Associates, Inc., 1991."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"L. Gong and X. Qian: Computational Issues in Secure Interoperation. IEEE Transactions on Software Engineering, IEEE, January 1996.","DOI":"10.1109\/32.481533"},{"issue":"3","key":"16_CR7","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/320473.320482","volume":"1","author":"P. P. Griffiths","year":"1976","unstructured":"P. P. Griffiths and B. W. Wade. An Authorization Mechanism for a Relational Database System. ACM Transactions on Database Systems, 1(3):243\u2013255, Sept. 1976.","journal-title":"ACM Transactions on Database Systems"},{"key":"16_CR8","unstructured":"Roy Goldman and Jennifer Widom. Dataguides: Enabling Query Formulation and Optimization in Semistructured Databases. VLDB Conference, 1997."},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/230798.230803","volume":"39","author":"M. Hardwick","year":"1996","unstructured":"Martin Hardwick, David L. Spooner, Tom Rando, and K.C. Morris. Sharing Manufacturing Information in Virtual Enterprises. Comm. ACM, 39(2):46\u201354, Feb. 1996.","journal-title":"Comm. ACM"},{"key":"16_CR10","unstructured":"D. Jonscher and K.R. Dittrich. An Approach for Building Secure Database Federations. In Proc. of the 20th VLDB Conference, 1994."},{"key":"16_CR11","unstructured":"Sushil Jajodia and Carl E. Landwehr: Database Security IV: Status and Prospects. North-Holland, 1990."},{"key":"16_CR12","unstructured":"D. Randolph Johnson, Fay F. Sayjdari, and John P. Van Tassell. Missi Security Policy: A Formal Approach. Technical Report R2SPO-TR001-95, National Security Agency Central Service, July 1995."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Luniewski, A. et al. Information Organization Using Rufus. ACM SIGMOD, Washington DC, May 1993. pp. 560\u2013561.","DOI":"10.1145\/170036.171565"},{"issue":"3","key":"16_CR14","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/262762.262770","volume":"26","author":"J. McHugh","year":"1997","unstructured":"J. McHugh, S. Abiteboul, R. Goldman, D. Quass, and J. Widom. Lore: A Database Management System for Semistructured Data. SIGMOD Record, 26(3):54\u201366, Sept. 1997.","journal-title":"SIGMOD Record"},{"key":"16_CR15","unstructured":"YongChul Oh and Shamkant Navathe. Seer: Security Enhanced Entity-Relationship Model for Secure Relational Databases. In Papazoglou (ed.): OOER\u201995, Springer LCNS 1021, 1995, pp.170\u2013180."},{"key":"16_CR16","unstructured":"Y. Papakonstantinou, S. Abiteboul, and H. Garcia-Molina. Object Fusion in Mediator Systems. VLDB Conference, 1996."},{"issue":"127","key":"16_CR17","doi-asserted-by":"crossref","first-page":"138","DOI":"10.7326\/0003-4819-127-2-199707150-00008","volume":"15","author":"D. M. Rind","year":"1997","unstructured":"David M. Rind et al.: Maintaining the Confidentiality of Medical Records Shared over the Internet and the World Wide Web. Annals of Internal Medicine, Vol.15 No.127, July 1997, pp.138\u2013141.","journal-title":"Annals of Internal Medicine"},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1016\/0167-4048(92)90146-I","volume":"11","author":"B. Thuraisingham","year":"1992","unstructured":"B. Thuraisingham and H.H. Rubinovitz. Multilevel Security Issues in Distributed DBMS III. Computer & Security, 11:661\u2013674, 1992.","journal-title":"Computer & Security"},{"key":"16_CR19","unstructured":"Gio Wiederhold, Michel Bilello, Vatsala Sarathy, and XiaoLei Qian. Protecting Collaboration. In Proceedings of the NISSC\u201996 National Information Systems Security Conference, pages 561\u2013569, Oct. 1996."},{"key":"16_CR20","unstructured":"Gio Wiederhold, Michel Bilello, Vatsala Sarathy, and XiaoLei Qian. A Security Mediator for Healthcare Information. In Proceedings of the 1996 AMIA Conference, pages 120\u2013124, Oct. 1996."},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Gio Wiederhold and Michael Genesereth. The Conceptual Basis for Mediation Services. IEEE Expert, Intelligent Systems and their Applications, 12(5), Oct. 1997.","DOI":"10.1109\/64.621227"},{"issue":"2","key":"16_CR22","doi-asserted-by":"crossref","first-page":"155","DOI":"10.3233\/JCS-1997-5205","volume":"5","author":"S. Capitani di Vimercati De","year":"1997","unstructured":"S. De Capitani di Vimercati and P. Samarati. Authorization Specification and Enforcement in Federated Database Systems. Journal of Computer Security, 5(2):155\u2013188, 1997.","journal-title":"Journal of Computer Security"}],"container-title":["Notes on Numerical Fluid Mechanics and Multidisciplinary Design","Active Flow and Combustion Control 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45140-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T16:21:03Z","timestamp":1556727663000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45140-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783319981765","9783319981772"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45140-4_16","relation":{},"ISSN":["1612-2909","1860-0824"],"issn-type":[{"type":"print","value":"1612-2909"},{"type":"electronic","value":"1860-0824"}],"subject":[],"published":{"date-parts":[[2000]]}}}