{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:19:16Z","timestamp":1725664756778},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540614425"},{"type":"electronic","value":"9783540685890"}],"license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61442-7_6","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T16:39:50Z","timestamp":1330274390000},"page":"92-106","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding the tension between transition rules and confidentiality"],"prefix":"10.1007","author":[{"given":"X. C.","family":"Delannoy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,4]]},"reference":[{"key":"6_CR1","unstructured":"Bancilhon, F., Spyratos, N., Protection of Information in Relational Data Bases, VLDB, 1977."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bertino, E., Weigand, H., An Approach to Authorization Modeling in Object Oriented Database Systems, Data &Knowledge Engineering, volume 12, Number 1, February 1994.","DOI":"10.1016\/0169-023X(94)90020-5"},{"key":"6_CR3","unstructured":"Bussolati, U., Fugini, M.G, Martella, G., A Conceptual Framework for Security System Design, Proc. 9th IFIP World Conf., Paris, September 1983."},{"key":"6_CR4","unstructured":"Castano, S., Fugini, M., Giancarlo, M., Pierangela, S., Database Security, Addison Wesley, 1994."},{"key":"6_CR5","unstructured":"Delannoy, X., La Coh\u00e9rence dans les Bases de Donn\u00e9es, Research Report RR-936I, University of Grenoble (France), IMAG-TIMC Lab., November 1994."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Delannoy, X., The Tension Between Transition Rules and Confidentiality, Research Report, University of Grenoble (France), IMAG-TIMC Lab., January 1996.","DOI":"10.1007\/3-540-61442-7_6"},{"key":"6_CR7","unstructured":"Gardarin, G., Valduriez, P., SGBD Relationels: Analyse et Compararaison des Bases de Donn\u00e9es, Eyrolles, 1989."},{"key":"6_CR8","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0169-023X(93)90008-D","volume":"10","author":"P. Greffen","year":"1993","unstructured":"Greffen, P., Apers, P., Integrity Control in Relational Database Systems \u2014 An Overview, Data & Knowledge Engineering, 10 (1993), p187\u2013223, North Holland, 1993.","journal-title":"Data & Knowledge Engineering"},{"issue":"No.3","key":"6_CR9","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1145\/320473.320482","volume":"1","author":"P. Griffiths","year":"1976","unstructured":"Griffiths, P., Bradford, W., An Authorization Mechanism for a Relational Database System, ACM Transactions on Database Systems, Vol. 1, No. 3, page 242\u2013255, September 1976.","journal-title":"ACM Transactions on Database Systems"},{"key":"6_CR10","volume-title":"Computers and Security","author":"M. G. Fugini","year":"1984","unstructured":"Fugini, M. G., Martella, G., ACTEN: A Conceptual Model for Security System Design, Computers and Security, Elsevier (North Holland), 3(3), 1984."},{"key":"6_CR11","unstructured":"Ingres manuals, Release 4.55, Computer Associate, 1993."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Manna, Z., Pnueli, A., The Temporal Logic of Reactive and Concurrent Systems-Specification \u2014, Springer-Verlag, 1991.","DOI":"10.1007\/978-1-4612-0931-7"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Mazumdar, S., Stemple, D., Shread, T., Resolving the Tension between Integrity and Security Using a Theorem Prover, ACM SIGMOD, 1988.","DOI":"10.1145\/50202.50231"},{"key":"6_CR14","unstructured":"Melton, J., Personal correspondance with Jim Melton, Senior Architect of Standards for Sybase Corp. and Editor of the ISO SQL-92 and emerging SQL-3 standards, December 1995."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Morgenstern, M., Security and Inference in Multilevel Database and Knowledge-Based Systems, Proceedings of Association for Computing Machinery Special Interest Group on Management of Data, 1987.","DOI":"10.1145\/38713.38752"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Oracle Manuals, Release 7, Oracle Corp., 1995.","DOI":"10.1016\/1353-4858(96)89755-8"},{"key":"6_CR17","unstructured":"Information Technology \u2014 Database Language SQL, Third Edition, ISO\/IEC 9075 (and 1994 addendum), 1992."},{"key":"6_CR18","unstructured":"Database Language SQL (SQL3), ISO-ANSI Working Draft, ANSI TC X3H2, ISO\/IEC JTC 1\/SC 21\/WG 3, August 1994."},{"key":"6_CR19","unstructured":"Wiseman, S., Terry, P., Wood, A., Harrold, C., The Trusted Path between SMITE and the User, IEEE Symposium on Security and Privacy, April 18\u201321, Oakland, 1988."},{"key":"6_CR20","unstructured":"Wiseman, S., The trouble with Secure Databases, Procs. MILCOMP'89, London, September 1989."},{"key":"6_CR21","unstructured":"Wiseman, S., On the Problem of Security in Data Bases, Database Security III, Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, September 1989."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Wiseman, S., Control of Confidentiality in Databases, Computers and Security, Vol. 9, No.6, October 1990.","DOI":"10.1016\/0167-4048(90)90131-C"}],"container-title":["Lecture Notes in Computer Science","Advances in Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61442-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T08:33:38Z","timestamp":1558254818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61442-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540614425","9783540685890"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-61442-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]},"assertion":[{"value":"4 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}