{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:28:28Z","timestamp":1726000108909},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030010683"},{"type":"electronic","value":"9783030010690"}],"license":[{"start":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T00:00:00Z","timestamp":1542672000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-01069-0_19","type":"book-chapter","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T10:45:36Z","timestamp":1542624336000},"page":"256-266","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On Restricted Set of DML Operations in an ERP System\u2019s Database"],"prefix":"10.1007","author":[{"given":"Pavlo","family":"Zhezhnych","sequence":"first","affiliation":[]},{"given":"Dmytro","family":"Tarasov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,20]]},"reference":[{"key":"19_CR1","unstructured":"Alagic, S.: Relational Database Technology. Springer Science & Business Media (2012)"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.2478\/v10179-011-0005-9","volume":"23","author":"J Bagi\u0144ski","year":"2011","unstructured":"Bagi\u0144ski, J., Rosta\u0144ski, M.: The modeling of business impact analysis for the loss of integrity, confidentiality and availability in business processes and data. Theor. Appl. Inform. 23, 73\u201382 (2011)","journal-title":"Theor. Appl. Inform."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Banyal, R., Jain P., Jain V.: Multi-factor authentication framework for cloud computing. In: Fifth International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), pp. 105\u2013110 (2013)","DOI":"10.1109\/CIMSim.2013.25"},{"issue":"12","key":"19_CR4","first-page":"28","volume":"47","author":"I Basharat","year":"2012","unstructured":"Basharat, I., Azam, F., Muzaffar, A.W.: Database security and encryption: a survey study. Int. J. Comput. Appl. 47(12), 28\u201334 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"19_CR5","unstructured":"Chaudhuri, S., Kaushik R., Ramamurthy R.: Database access control and privacy: is there a common ground? In: CIDR, pp. 96\u2013103 (2011)"},{"key":"19_CR6","unstructured":"Daya, B.: Network security: History, importance, and future, vol. 4. Department of Electrical and Computer Engineering, University of Florida (2013)"},{"issue":"2","key":"19_CR7","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MAHC.2013.30","volume":"35","author":"DR Deutsch","year":"2013","unstructured":"Deutsch, D.R.: The SQL standard: how it happened. IEEE Ann. Hist. Comput. 35(2), 72\u201375 (2013)","journal-title":"IEEE Ann. Hist. Comput."},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-35362-8_15","volume-title":"Cyberspace Safety and Security","author":"Luca Ferretti","year":"2012","unstructured":"Ferretti, L., Colajanni, M., Marchetti, M.: Supporting security and consistency for cloud database. In: Cyberspace Safety and Security, pp. 179\u2013193. Springer, Heidelberg (2012)"},{"key":"19_CR9","first-page":"696","volume":"5","author":"K Govinda","year":"2013","unstructured":"Govinda, K., Nelge, P., Malwade, M.: Database audit over cloud environment using forensic analysis algorithm. Int. J. Eng. Technol. 5, 696\u2013699 (2013)","journal-title":"Int. J. Eng. Technol."},{"key":"19_CR10","first-page":"37","volume":"25","author":"SV Grabski","year":"2011","unstructured":"Grabski, S.V., Leech, S.A., Schmidt, P.J.: A review of ERP research: a future agenda for accounting information systems. J. Inf. Syst. 25, 37\u201378 (2011)","journal-title":"J. Inf. Syst."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Jain, S., Ingle, M.: Software security requirements gathering instrument. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2(7) (2011)","DOI":"10.14569\/IJACSA.2011.020717"},{"key":"19_CR12","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-319-18422-7_8","volume-title":"Beyond Databases, Architectures and Structures","author":"Florian K\u00fcnzner","year":"2015","unstructured":"K\u00fcnzner, F., Petkovi\u0107, D.: A comparison of different forms of temporal data management. In: International Conference: Beyond Databases, Architectures and Structures, pp. 92\u2013106. Springer, Cham (2015)"},{"issue":"1","key":"19_CR13","first-page":"36","volume":"5","author":"C Pascu","year":"2013","unstructured":"Pascu, C.: Security principles in ERP systems. J. Mob. Embed. Distrib. Syst. 5(1), 36\u201344 (2013)","journal-title":"J. Mob. Embed. Distrib. Syst."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Radhakrishna, V., Kumar, P.V., Janaki, V.: A survey on temporal databases and data mining. In: Proceedings of the International Conference on Engineering & MIS 2015, p. 52. ACM (2015)","DOI":"10.1145\/2832987.2833064"},{"issue":"1","key":"19_CR15","first-page":"300","volume":"13","author":"O Shoewu","year":"2012","unstructured":"Shoewu, O., Idowu, O.: A: development of attendance management system using biometrics. Pac. J. Sci. Technol. 13(1), 300\u2013307 (2012)","journal-title":"Pac. J. Sci. Technol."},{"issue":"3","key":"19_CR16","doi-asserted-by":"publisher","first-page":"503","DOI":"10.2307\/25750689","volume":"34","author":"Spears","year":"2010","unstructured":"Spears, J.L., Barki, H.: User participation in information systems security risk management. MIS Q. 503\u2013522 (2010)","journal-title":"MIS Quarterly"},{"key":"19_CR17","unstructured":"Tarasov, D., Andrukhiv, A.: Algorithms of the corporate information system\u2019s protection analyses. In: Proceedings of the International Conference on Computer Science and Information Technologies (CSIT 2006), pp. 178\u2013183 (2006)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Teixeira, A.: Attack models and scenarios for networked control systems. In: Proceedings of the 1st International Conference on High Confidence Networked Systems, pp. 55\u201364. ACM (2012)","DOI":"10.1145\/2185505.2185515"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"6221","DOI":"10.4028\/www.scientific.net\/AMM.644-650.6221","volume":"644","author":"MT Wang","year":"2014","unstructured":"Wang, M.T.: The design and implementation of enterprise management system based on ERP. Appl. Mech. Mater. 644, 6221\u20136224 (2014)","journal-title":"Appl. Mech. Mater."},{"key":"19_CR20","first-page":"009","volume":"2","author":"X Wang","year":"2012","unstructured":"Wang, X.: Network database security detection and the realized management program design. Netinfo Secur. 2, 009 (2012)","journal-title":"Netinfo Secur."},{"key":"19_CR21","volume-title":"Principles of information security","author":"ME Whitman","year":"2011","unstructured":"Whitman, M.E., Mattord, H.J.: Principles of information security. Cengage Learning, Boston (2011)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Zhezhnych, P., Burak, T., Chyrka, O.: On the temporal access control implementation at the logical level of relational databases. In: XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, pp. 84\u201387 (2016)","DOI":"10.1109\/STC-CSIT.2016.7589875"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Zhezhnych, P., Peleschychyn, A.: Time aspects of information systems. In: Proceedings of the 9th International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), pp. 530\u2013533 (2007)","DOI":"10.1109\/CADSM.2007.4297640"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Zhezhnych, P., Tarasov, D.: Methods of data processing restriction in ERP systems. In: Proceedings of the 13th International Scientific and Technical Conference Computer Science and Information Technologies (CSIT 2018), Lviv, Ukraine (2018)","DOI":"10.1109\/STC-CSIT.2018.8526734"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Intelligent Systems and Computing III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01069-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T12:49:11Z","timestamp":1572958151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01069-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,20]]},"ISBN":["9783030010683","9783030010690"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01069-0_19","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,11,20]]},"assertion":[{"value":"CSIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Computer Science and Information Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csit2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csit.lp.edu.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}