{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:06:32Z","timestamp":1757617592691,"version":"3.44.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031834318"},{"type":"electronic","value":"9783031834325"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-83432-5_19","type":"book-chapter","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T04:15:57Z","timestamp":1741061757000},"page":"271-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Ensuring AI Data Access Control in RDBMS"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2373-8509","authenticated-orcid":false,"given":"William","family":"Kandolo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,5]]},"reference":[{"key":"19_CR1","unstructured":"A. Silberschatz, H., Korth, F., Sudarshan, S.: Database System Concepts, 7th ed., McGraw-Hill Education (2019)"},{"issue":"3","key":"19_CR2","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1145\/937503.937505","volume":"35","author":"C Blum","year":"2003","unstructured":"Blum, C., Roli, A.: Metaheuristics in combinatorial optimization: overview and conceptual comparison. ACM Comput. Surv. (CSUR) 35(3), 268\u2013308 (2003)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"19_CR3","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction, 2nd ed., MIT Press (2018)"},{"key":"19_CR4","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd ed., Pearson (2016)"},{"issue":"3\u20134","key":"19_CR5","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1023\/A:1022672621406","volume":"8","author":"RJ Williams","year":"1992","unstructured":"Williams, R.J.: Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach. Learn. 8(3\u20134), 229\u2013256 (1992)","journal-title":"Mach. Learn."},{"key":"19_CR6","unstructured":"Ng, A.Y., Jordan, M.I.: PEGASUS: a policy search method for large MDPs and POMDPs. In: Proceedings of the Sixteenth Conference on Uncertainty in Artificial Intelligence (UAI), pp. 406\u2013415 (2000)"},{"key":"19_CR7","unstructured":"Argyris, C., Sch\u00f6n, D.A.: Organizational Learning: A Theory of Action Perspective. Addison-Wesley (1978)"},{"issue":"7\/8","key":"19_CR8","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1108\/03684929610149747","volume":"25","author":"RL Flood","year":"1996","unstructured":"Flood, R.L., Romm, N.R.A.: Contours of triple loop learning. Kybernetes 25(7\/8), 154\u2013163 (1996)","journal-title":"Kybernetes"},{"issue":"3","key":"19_CR9","first-page":"579","volume":"32","author":"KY Lin","year":"2020","unstructured":"Lin, K.Y., Lee, W.S., Hu, Y.C.: Optimizing database access control with metaheuristic algorithms. IEEE Trans. Knowl. Data Eng. 32(3), 579\u2013591 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR10","first-page":"40","volume":"36","author":"A Rezazadeh","year":"2017","unstructured":"Rezazadeh, A., Javan, M.S.: A hybrid optimization approach for secure data encryption in relational databases. J. Inf. Secur. Appl. 36, 40\u201350 (2017)","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"19_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2716260","volume":"47","author":"E Vasilomanolakis","year":"2015","unstructured":"Vasilomanolakis, E., Karuppayah, S., M\u00fchle, A., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. (CSUR) 47(4), 1\u201333 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"4598","key":"19_CR12","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science 220(4598), 671\u2013680 (1983)","journal-title":"Science"},{"issue":"3\u20134","key":"19_CR13","first-page":"279","volume":"8","author":"CJ Watkins","year":"1992","unstructured":"Watkins, C.J., Dayan, P.: Q-learning. Mach. Learn. 8(3\u20134), 279\u2013292 (1992)","journal-title":"Mach. Learn."},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/3477.484436","volume":"26","author":"M Dorigo","year":"1996","unstructured":"Dorigo, M., Maniezzo, V., Colorni, A.: \u201cAnt system: optimization by a colony of cooperating agents. IEEE Trans. Syst. Man, Cybern. Part B (Cybernetics) 26(1), 29\u201341 (1996)","journal-title":"IEEE Trans. Syst. Man, Cybern. Part B (Cybernetics)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of ICNN\u201995 - International Conference on Neural Networks, vol. 4, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"19_CR17","unstructured":"Bertsimas, D., Tsitsiklis, J.: Introduction to Linear Optimization. Athena Scientific (1997)"},{"issue":"5","key":"19_CR18","first-page":"679","volume":"6","author":"R Bellman","year":"1957","unstructured":"Bellman, R.: A Markovian decision process. J. Math. Mech. 6(5), 679\u2013684 (1957)","journal-title":"J. Math. Mech."},{"key":"19_CR19","first-page":"381","volume":"17","author":"SJ Russell","year":"2002","unstructured":"Russell, S.J., Zimdars, A., Ghallab, M.W.: Efficient dynamic online algorithms for optimal metareasoning. J. Artif. Intell. Res. 17, 381\u2013417 (2002)","journal-title":"J. Artif. Intell. Res."},{"issue":"3","key":"19_CR20","first-page":"99","volume":"69","author":"C Argyris","year":"1991","unstructured":"Argyris, C.: Teaching smart people how to learn. Harv. Bus. Rev. 69(3), 99\u2013109 (1991)","journal-title":"Harv. Bus. Rev."}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-83432-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:54:04Z","timestamp":1757141644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-83432-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031834318","9783031834325"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-83432-5_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Chile","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.artiis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}