{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:19:34Z","timestamp":1725664774308},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540614425"},{"type":"electronic","value":"9783540685890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61442-7_7","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T16:39:51Z","timestamp":1330274391000},"page":"107-123","source":"Crossref","is-referenced-by-count":0,"title":["SPEAR: Extending ER for dynamic behaviour and refinement"],"prefix":"10.1007","author":[{"given":"Simon","family":"Wiseman","sequence":"first","affiliation":[]},{"given":"Bryony","family":"Pomeroy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,4]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"The Entity-Relationship Model \u2014 Toward a Unified View of Data, P.P.Chen, ACM Trans. Database Systems, Vol 1, Num 1, March 1976, pp9\u201336.","DOI":"10.1145\/320434.320440"},{"key":"7_CR2","unstructured":"Abstract and Concrete Models for Secure Database Applications, S. Wiseman, Procs. IFIP WG11.3 Workshop on Database Security, Shepherdstown, WV, November 1991, pp 239\u2013273, publ. North Holland."},{"key":"7_CR3","first-page":"55","volume-title":"The SPEAR Data Design Method","author":"P.J. Sell","year":"1992","unstructured":"The SPEAR Data Design Method, P.J. Sell, Procs. IFIP WG11.3 Workshop on Database Security, Vancouver, BC, August 1992, pp 55\u201372, North Holland."},{"key":"7_CR4","unstructured":"The Z Notation \u2014 A Reference Manual, J.M.Spivey, Prentice-Hall, ISBN-0-13-983768-X, 1989."},{"key":"7_CR5","unstructured":"Conceptual Database Design, C.Batini, S.Ceri & S.B.Navathe, Benjamin\/Cummings, ISBN-0-8053-0244-1, 1992."},{"key":"7_CR6","unstructured":"SABRE User Guide, E.R.Bilsby, S.R.Lewis & B.R.Pomeroy, February 1996."},{"key":"7_CR7","unstructured":"SPEAR User Guide \u2014 Volume 1: Using SPEAR to Model the Information Structure of an Application, S.R.Lewis, E.R.Bilsby & B.R.Pomeroy, March 1996."},{"key":"7_CR8","unstructured":"SPEAR User Guide \u2014 Volume 2: Using SPEAR to Model The Dynamic Behaviour of an Application, S.R.Lewis, E.R.Bilsby & B.R.Pomeroy, March 1996"},{"key":"7_CR9","unstructured":"A Comparison of Commercial and Military Computer Security Policies, D.D.Clark & D.R.Wilson, Procs. IEEE Symp. on Security and Privacy, Oakland CA, April 1987, pp184\u2013194."}],"container-title":["Lecture Notes in Computer Science","Advances in Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61442-7_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:06:25Z","timestamp":1605629185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61442-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540614425","9783540685890"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-61442-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}