{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:10:32Z","timestamp":1742994632667,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221517"},{"type":"electronic","value":"9783540259756"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25975-6_18","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:42:51Z","timestamp":1281314571000},"page":"234-247","source":"Crossref","is-referenced-by-count":9,"title":["Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment"],"prefix":"10.1007","author":[{"given":"Xiaocheng","family":"Ge","sequence":"first","affiliation":[]},{"given":"Fiona","family":"Polack","sequence":"additional","affiliation":[]},{"given":"R\u00e9gine","family":"Laleau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/0167-4048(93)90085-J","volume":"12","author":"M. Abrams","year":"1993","unstructured":"Abrams, M., Amoroso, E., LaPadula, L., Lunt, T., Williams, J.: Report of an integrity research study group. Computers and Security\u00a012, 679\u2013689 (1993)","journal-title":"Computers and Security"},{"key":"18_CR2","volume-title":"Fundamentals of Computer Security Technology","author":"E. Amoroso","year":"1994","unstructured":"Amoroso, E.: Fundamentals of Computer Security Technology. Prentice-Hall, Englewood Cliffs (1994)"},{"key":"18_CR3","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations and model. Technical Report MTR 2547 v2, MITRE Corporation (1973)"},{"key":"18_CR4","unstructured":"Biba, K.J.: Integrity constraints for secure computer systems. Technical Report EST TR-76-372, Hanscom AFB (1977)"},{"key":"18_CR5","volume-title":"Database Security","author":"S. Castano","year":"1994","unstructured":"Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison-Wesley, Reading (1994)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: IEEE Symposium on Security and Privacy, Oakland, April 1987, pp. 184\u2013194 (1987)","DOI":"10.1109\/SP.1987.10001"},{"key":"18_CR7","unstructured":"Cuppens, F.: Mod\u00e9lisation formelle de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019informations. Habilitation, Paul Sabatier University, Toulouse, France (2000)"},{"key":"18_CR8","volume-title":"Integrity and Internal Control in Information Systems","author":"F. Cuppens","year":"1998","unstructured":"Cuppens, F., Saurel, C.: A logical formalization of integrity policies for database management systems. In: Jajodia, S., List, W., McGregor, G.W., Strous, L. (eds.) Integrity and Internal Control in Information Systems, Kluwer, Dordrecht (1998)"},{"key":"18_CR9","unstructured":"DOD. TCSEC: Trusted computer system evaluation criteria. Technical Report 5200.28-STD, U.S. Department of Defense (1985)"},{"key":"18_CR10","unstructured":"Elmasri, R., Navathe, S.B.: Fundamentals of Database Systems, 2nd edn. Benjamin Commings (1994)"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/266420.266447","volume-title":"4th ACM Conf. on Computer and Communications Security","author":"S.N. Foley","year":"1997","unstructured":"Foley, S.N.: The specification and implementation of \u201ccommercial\u201d security requirements including dynamic segregation of duties. In: 4th ACM Conf. on Computer and Communications Security, April 1997, pp. 125\u2013134. ACM Press, New York (1997)"},{"key":"18_CR12","unstructured":"IBM. DB2 universal database: SQL reference, release 7. IBM Corporation (2000)"},{"key":"18_CR13","unstructured":"ISO. International standard \u2013 SQL. Technical report, ISO\/IEC 9075-1 (19990"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-45314-8_14","volume-title":"Fundamental Approaches to Software Engineering","author":"J. J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J.: Towards development of secure systems using UML. In: Hussmann, H. (ed.) FASE 2001. LNCS, vol.\u00a02029, pp. 187\u2013201. Springer, Heidelberg (2001)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Lee, T.M.P.: Using mandatory integrity to enforce \u201ccommercial\u201d security. In: IEEE Symposium on Security and Privacy, Oakland, April 1988, pp. 140\u2013146 (1988)","DOI":"10.1109\/SECPRI.1988.8106"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Lipner, S.B.: Non-discrentionary controls for commercial applications. In: IEEE Symposium on Security and Privacy, Oakland, May 1982, pp. 2\u201310 (1982)","DOI":"10.1109\/SP.1982.10022"},{"key":"18_CR18","unstructured":"Microsoft. SQL server, version 7.0. Microsoft Corporation (1999)"},{"key":"18_CR19","unstructured":"Oracle. Oracle8i SQL reference, release 8.1.6. Oracle Corporation (1999)"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Pernul, G., Winiwarter, W., Min Tjoa, A.: The entity-relationship model for multilevel security. In: Int. Conf. on Conceptual Modeling \/ the Entity Relationship Approach, pp. 166\u2013177 (1993)","DOI":"10.1007\/BFb0024365"},{"key":"18_CR21","volume-title":"Security in Computing","author":"C.P. Pfleeger","year":"2003","unstructured":"Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 3rd edn. Prentice-Hall, Englewood Cliffs (2003)","edition":"3"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-45341-5_27","volume-title":"Advanced Information Systems Engineering","author":"F. Polack","year":"2001","unstructured":"Polack, F., Laleau, R.: A rigorous metamodel for UML static conceptual modelling of information systems. In: Dittrich, K.R., Geppert, A., Norrie, M.C. (eds.) CAiSE 2001. LNCS, vol.\u00a02068, pp. 402\u2013416. Springer, Heidelberg (2001)"},{"key":"18_CR23","unstructured":"Shockley, W.R.: Implementing the Clark\/Wilson integrity policy using current technology. In: 11th National Computer Security Conference, Baltimore, October 1988, pp. 29\u201337 (1988)"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25975-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T23:25:13Z","timestamp":1740353113000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25975-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221517","9783540259756"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25975-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}