{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:37:00Z","timestamp":1743100620899,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030336943"},{"type":"electronic","value":"9783030336950"}],"license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33695-0_51","type":"book-chapter","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T16:04:57Z","timestamp":1572624297000},"page":"771-780","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Approach to Multiple Security System Development Using Database Schemas"],"prefix":"10.1007","author":[{"given":"Pavlo","family":"Zhezhnych","sequence":"first","affiliation":[]},{"given":"Teodor","family":"Burak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"key":"51_CR1","volume-title":"Implementing Database Security and Auditing: A Guide for DBA\u2019s, Information Security Administrators and Auditors","author":"R Ben-Natan","year":"2009","unstructured":"Ben-Natan, R.: Implementing Database Security and Auditing: A Guide for DBA\u2019s, Information Security Administrators and Auditors. Elsevier Digital Press, eBook, Burlington (2009)"},{"key":"51_CR2","doi-asserted-by":"publisher","unstructured":"Bender, G., Kot, L., Gehrke, J.: Explainable security for relational databases. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, Snowbird, Utah, USA (2014). \nhttps:\/\/doi.org\/10.1145\/2588555.2593663","DOI":"10.1145\/2588555.2593663"},{"issue":"1\u20132","key":"51_CR3","first-page":"1","volume":"3","author":"E Bertino","year":"2011","unstructured":"Bertino, E., Ghinita, G., Kamra, A.: Access control for databases: concepts and systems. Found. Trends\u00ae Databases 3(1\u20132), 1\u2013148 (2011)","journal-title":"Found. Trends\u00ae Databases"},{"key":"51_CR4","doi-asserted-by":"crossref","unstructured":"Blazhko, A.A., Antoshchuk, S.G., Saoud, E.: Automated design method of hierarchical access control in database. In: Proceedings of 5th IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 21\u201323 September, Rende (Cosenza), Italy, pp. 361\u2013363 (2009)","DOI":"10.1109\/IDAACS.2009.5342960"},{"key":"51_CR5","unstructured":"Brodersen, K., Rothwein, T.M., Malden, M.S., Chen, M.J., Annadata, A.: Database access method and system for user role defined access. United States Patent, No.US6732100B1, 4 May 2004. \nhttps:\/\/patents.google.com\/patent\/US6732100B1\/en"},{"issue":"5","key":"51_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3103\/S1068335614050029","volume":"41","author":"VM Grachev","year":"2014","unstructured":"Grachev, V.M., Esin, V.I., Polukhina, N.G., Rassomakhin, S.G.: Data security mechanisms implemented in the database with universal model. Bull. Lebedev. Phys. Inst. 41(5), 123\u2013126 (2014)","journal-title":"Bull. Lebedev. Phys. Inst."},{"issue":"12","key":"51_CR7","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.14778\/2732977.2733003","volume":"7","author":"M Guarnieri","year":"2014","unstructured":"Guarnieri, M., Basin, D.: Optimal security-aware query processing. Proc. VLDB Endow. 7(12), 1307\u20131318 (2014). \nhttps:\/\/doi.org\/10.14778\/2732977.2733003","journal-title":"Proc. VLDB Endow."},{"key":"51_CR8","unstructured":"Kagalwala, R.A., Thompson, J.P.: Database schema for structured query language (SQL) server, United States Patent, No.USOO7653652B2, 26 January 2010. \nhttps:\/\/patents.google.com\/patent\/US7653652B2\/en"},{"issue":"6","key":"51_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"DR Kuhn","year":"2010","unstructured":"Kuhn, D.R., Coyne, E., Timothy, R.W.: Adding attributes to role-based access control. IEEE Comput. 43(6), 79\u201381 (2010)","journal-title":"IEEE Comput."},{"key":"51_CR10","unstructured":"Kuji, K.: Database access system and database access method. United States Patent, No.US007778955B2, 17 August 2010. \nhttps:\/\/patents.google.com\/patent\/US7778955B2\/en"},{"key":"51_CR11","unstructured":"Lucovsky, M.H., Pierce, S.D., White, S.D., Movva, R., Kalki, J., Auerbach, D.B., Ford, P.S., Jacobs, J.C., Steckler, P.A., Hsueh, W.C., Keil, K.D., Gopal, B., Kannan, S., Yi-Wen Guu, George, S.J., Hoffman, W.R., Smoot, P.M., Fang, L., Taylor, M.B., Wu, W.C., Leach, P.J., Ward, R.B., Yuan, Y.-Q.: Schema-based services for identity-based data access. United States Patent, No.USOO7302634B2, 27 November 2007. [\nhttps:\/\/patents.google.com\/patent\/US7302634B2\/en"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Olson, D.L., Subodh, K.: Enterprise information systems: contemporary trends and issues. World Scientific, 579 (2009)","DOI":"10.1142\/7287"},{"key":"51_CR13","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2005.9","volume":"2","author":"R Sandhu","year":"2005","unstructured":"Sandhu, R., Bertino, E.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secure Comput. 2, 2\u201319 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"51_CR14","unstructured":"Shakhovska, N.: Consolidated processing for differential information products. In: Proceedings of the VIIth International Conference \u201cPerspective Technologies and Methods in MEMS Design\u201d, Polyana, Ukraine, pp. 176\u2013177 (2011)"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Shastri, A.A., Chatur, P.N.: Efficient and effective security model for database specially designed to avoid internal threats. In: Proceedings of the International Conference Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM). IEEE (2015)","DOI":"10.1109\/ICSTM.2015.7225407"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Tsoumas, B., Dritsas, S., Gritzalis, D.: An ontology-based approach to information systems security management. In: Computer Network Security (MMM-ACNS 2005), LNCS, vol. 3685, pp. 151\u2013164. Springer, Berlin (2005)","DOI":"10.1007\/11560326_12"},{"key":"51_CR17","doi-asserted-by":"crossref","unstructured":"Zhezhnych, P., Burak, T., Chyrka, O.: On the temporal access control implementation at the logical level of relational databases. In: Proceedings of the 11th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT), pp. 84\u201387 (2016)","DOI":"10.1109\/STC-CSIT.2016.7589875"},{"key":"51_CR18","doi-asserted-by":"crossref","unstructured":"Zhezhnych, P., Tarasov, D.: Methods of data processing restriction in ERP systems. In: Proceedings of the IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, vol. 1, pp. 274\u2013277 (2018)","DOI":"10.1109\/STC-CSIT.2018.8526734"},{"key":"51_CR19","doi-asserted-by":"crossref","unstructured":"Zhezhnych, P., Tarasov, D.: On restricted set of DML operations in an ERP System\u2019s database. In: AISC Systems and Computing III, vol. 871, pp. 256\u2013266. Springer, Cham (2018)","DOI":"10.1007\/978-3-030-01069-0_19"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Intelligent Systems and Computing IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33695-0_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T10:14:47Z","timestamp":1600510487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33695-0_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"ISBN":["9783030336943","9783030336950"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33695-0_51","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"2 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Computer Science and Information Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csit2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}