{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T20:10:05Z","timestamp":1748463005306,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_22","type":"book-chapter","created":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T03:47:00Z","timestamp":1434944820000},"page":"311-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Stream Processing with Secure Information Flow Constraints"],"prefix":"10.1007","author":[{"given":"Indrakshi","family":"Ray","sequence":"first","affiliation":[]},{"given":"Raman","family":"Adaikkalavan","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Rose","family":"Gamble","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"22_CR1","unstructured":"Abadi, D.J., Ahmad, Y., Balazinska, M., \u00c7etintemel, U., Cherniack, M., Hwang, J., Lindner, W., Maskey, A., Rasin, A., Ryvkina, E., Tatbul, N., Xing, Y., Zdonik, S.B.: The design of the borealis stream processing engine. In: Proceedings of the CIDR, pp. 277\u2013289 (2005)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Adaikkalavan, R., Perez, T.: Secure shared continuous query processing. In: Proceedings of the ACM SAC (Data Streams Track), pp. 1005\u20131011, Taiwan, March 2011","DOI":"10.1145\/1982185.1982404"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-22348-8_11","volume-title":"Data and Applications Security and Privacy XXV","author":"R Adaikkalavan","year":"2011","unstructured":"Adaikkalavan, R., Ray, I., Xie, X.: Multilevel secure data stream processing. In: Li, Y. (ed.) DBSec. LNCS, vol. 6818, pp. 122\u2013137. Springer, Heidelberg (2011)"},{"issue":"5","key":"22_CR4","doi-asserted-by":"crossref","first-page":"547","DOI":"10.3233\/JCS-2012-0451","volume":"20","author":"R Adaikkalavan","year":"2012","unstructured":"Adaikkalavan, R., Xie, X., Ray, I.: Multilevel secure data stream processing: architecture and implementation. J. Comput. Secur. 20(5), 547\u2013581 (2012)","journal-title":"J. Comput. Secur."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Arasu, A., Babcock, B., Babu, S., Cieslewicz, J., Datar, M., Ito, K., Motwani, R., Srivastava, U., Widom, J.: STREAM: The Stanford Data Stream Management System. Technical Report 2004\u201320, Stanford InfoLab (2004)","DOI":"10.1145\/872757.872854"},{"issue":"2","key":"22_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s00778-004-0147-z","volume":"15","author":"A Arasu","year":"2006","unstructured":"Arasu, A., Babu, S., Widom, J.: The CQL Continuous Query Language: semantic foundations and query execution. VLDB J. 15(2), 121\u2013142 (2006)","journal-title":"VLDB J."},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1031570.1031572","volume":"33","author":"A Arasu","year":"2004","unstructured":"Arasu, A., Widom, J.: A denotational semantics for continuous queries over streams and relations. SIGMOD Rec. 33, 6\u201311 (2004)","journal-title":"SIGMOD Rec."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and issues in data stream systems. In: Proceedings of the PODS, pp. 1\u201316, June 2002","DOI":"10.1145\/543614.543615"},{"issue":"4","key":"22_CR9","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/s00778-004-0133-5","volume":"13","author":"H Balakrishnan","year":"2004","unstructured":"Balakrishnan, H., Balazinska, M., Carney, D., \u00c7etintemel, U., Cherniack, M., Convey, C., Galvez, E., Salz, J., Stonebraker, M., Tatbul, N., Tibbetts, R., Zdonik, S.B.: Retrospective on aurora. VLDB J.: Spec. Issue Data Stream Process. 13(4), 370\u2013383 (2004)","journal-title":"VLDB J.: Spec. Issue Data Stream Process."},{"key":"22_CR10","unstructured":"Bell, D.E., LaPadula, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical Report MTR-2997 Rev. 1 and ESD-TR-75-306, rev. 1, The MITRE Corporation, Bedford, MA 01730, March 1976"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The chinese wall security policy. In: Proceedings of the IEEE S & P, pp. 206\u2013214, May 1989","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Cao, J., Carminati, B., Ferrari, E., Tan, K.: Acstream: enforcing access control over data streams. In: Proceedings of the ICDE, pp. 1495\u20131498 (2009)","DOI":"10.1109\/ICDE.2009.25"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Tan, K.L.: Enforcing access control over data streams. In: Proceedings of the ACM SACMAT, pp. 21\u201330 (2007)","DOI":"10.1145\/1266840.1266845"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Carney, D., \u00c7etintemel, U., Cherniack, M., Convey, C., Lee, S., Seidman, G., Stonebraker, M., Tatbul, N., Zdonik, S.B.: Monitoring streams - a new class of data management applications. In: Proceedings of the VLDB, pp. 215\u2013226, August 2002","DOI":"10.1016\/B978-155860869-6\/50027-5"},{"key":"22_CR15","series-title":"Advances in Database Systems","volume-title":"Stream Data Processing: A Quality of Service Perspective: Modeling, Scheduling, Load Shedding, and Complex Event Processing","author":"S Chakravarthy","year":"2009","unstructured":"Chakravarthy, S., Jiang, Q.: Stream Data Processing: A Quality of Service Perspective: Modeling, Scheduling, Load Shedding, and Complex Event Processing. Advances in Database Systems. Springer, Heidelberg (2009)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Hsiao, Y.-C., Hwang, G.-H.: Implementing the chinese wall security model in workflow management systems. In: Proceedings of the ISPA, pp. 574\u2013581 (2010)","DOI":"10.1109\/ISPA.2010.41"},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/844357.844362","volume":"4","author":"PCK Hung","year":"2003","unstructured":"Hung, P.C.K., Qiu, G.-S.: Specifying conflict of interest assertions in WS-policy with chinese wall security policy. SIGecom Exchanges 4(1), 11\u201319 (2003)","journal-title":"SIGecom Exchanges"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Lindner, W., Meier, J.: Securing the borealis data stream engine. In: Proceedings of the IDEAS, pp. 137\u2013147 (2006)","DOI":"10.1109\/IDEAS.2006.40"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Nehme, R.V., Lim, H., Bertino, E., Rundensteiner, E.A.: StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: Proceedings of the ACM SIGMOD, pp. 1027\u20131030 (2009)","DOI":"10.1145\/1559845.1559972"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Nehme, R.V., Lim, H.-S., Bertino, E.: Fence: Continuous access control enforcement in dynamic data stream environments. In: Proceedings of the ACM CODASPY 2013, pp. 243\u2013254 (2013)","DOI":"10.1145\/2435349.2435383"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Nehme, R.V., Rundensteiner, E.A., Bertino, E.: A security punctuation framework for enforcing access control on streaming data. In: Proceedings of the ICDE, pp. 406\u2013415 (2008)","DOI":"10.1109\/ICDE.2008.4497449"},{"key":"22_CR22","first-page":"2190","volume-title":"chapter Foundational Calculi for Programming Languages","author":"BC Pierce","year":"1997","unstructured":"Pierce, B.C.: The Computer Science and Engineering Handbook. In: Tucker, A.B. (ed.) chapter Foundational Calculi for Programming Languages, pp. 2190\u20132207. CRC Press, US (1997)"},{"issue":"8","key":"22_CR23","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/0167-4048(92)90131-A","volume":"11","author":"R Sandhu","year":"1992","unstructured":"Sandhu, R.: Lattice-based enforcement of chinese walls. Comput. Secur. 11(8), 753\u2013763 (1992)","journal-title":"Comput. Secur."},{"key":"22_CR24","first-page":"2237","volume-title":"The Computer Science and Engineering Handbook","author":"DA Schmidt","year":"1997","unstructured":"Schmidt, D.A.: Programming language semantics. In: Tucker, A.B. (ed.) The Computer Science and Engineering Handbook, pp. 2237\u20132254. CRC Press, US (1997)"},{"issue":"3","key":"22_CR25","first-page":"330","volume":"6","author":"W She","year":"2013","unstructured":"She, W., Yen, I.-L., Thuraisingham, B.M., Bertino, E.: Security-aware service composition with fine-grained information flow control. IEEE TDSC 6(3), 330\u2013343 (2013)","journal-title":"IEEE TDSC"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Shen, Q., Yang, X., Sun, P., Yang, Y., Wu, Z.: Towards data isolation & collaboration in storage cloud. In: Proceedings of the APSCC, pp. 139\u2013146 (2011)","DOI":"10.1109\/APSCC.2011.56"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Tsai, T., Chen, Y., Huang, H., Huang, P., Chou, K.: A practical chinese wall security model in cloud computing. In: Proceedings of the APNOMS, pp. 1\u20134 (2011)","DOI":"10.1109\/APNOMS.2011.6076992"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Wu, R., Ahn, G., Hu, H., Singhal, M.: Information flow control in cloud computing. In: Proceedings of the CollaborateCom, pp. 1\u20137 (2010)","DOI":"10.4108\/icst.trustcol.2010.1"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Xie, R., Gamble, R.: A tiered strategy for auditing in the cloud. In: IEEE International Conference on Cloud Computing, June 2012","DOI":"10.1109\/CLOUD.2012.144"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Xie, X., Ray, I., Adaikkalavan, R.: On the efficient processing of multilevel secure continuous queries. In: Proceedings of Social Computing, pp. 417\u2013422 (2013)","DOI":"10.1109\/SocialCom.2013.65"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Xie, X., Ray, I., Adaikkalavan, R., Gamble, R.: Information flow control for stream processing in clouds. In: Proceedings of the ACM SACMAT, pp. 89\u2013100 (2013)","DOI":"10.1145\/2462410.2463205"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T19:43:13Z","timestamp":1748461393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}