{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:45:39Z","timestamp":1771699539659,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540705666","type":"print"},{"value":"9783540705673","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-70567-3_1","type":"book-chapter","created":{"date-parts":[[2008,7,15]],"date-time":"2008-07-15T07:57:37Z","timestamp":1216108657000},"page":"1-16","source":"Crossref","is-referenced-by-count":3,"title":["Dynamic Meta-level Access Control in SQL"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Foundations of Databases","author":"S. Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45619-8_5","volume-title":"Logic Programming","author":"S. Barker","year":"2002","unstructured":"Barker, S.: Access Control for Deductive Databases by Logic Programming. In: Stuckey, P.J. (ed.) ICLP 2002. LNCS, vol.\u00a02401, pp. 54\u201369. Springer, Heidelberg (2002)"},{"issue":"3","key":"1_CR3","first-page":"231","volume":"23","author":"S. Barker","year":"2002","unstructured":"Barker, S.: Protecting deductive databases from unauthorized retrieval and update requests. Journal of Data and Knowledge Engineering\u00a023(3), 231\u2013285 (2002)","journal-title":"Journal of Data and Knowledge Engineering"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Barker, S.: Action-status access control. In: SACMAT, pp. 195\u2013204 (2007)","DOI":"10.1145\/1266840.1266873"},{"issue":"4","key":"1_CR5","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/950191.950194","volume":"6","author":"S. Barker","year":"2003","unstructured":"Barker, S., Stuckey, P.: Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security\u00a06(4), 501\u2013546 (2003)","journal-title":"ACM Trans. on Information and System Security"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system: Unified exposition and multics interpretation. MITRE-2997 (1976)","DOI":"10.21236\/ADA023588"},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/293910.293151","volume":"23","author":"E. Bertino","year":"1998","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM TODS\u00a023(3), 231\u2013285 (1998)","journal-title":"ACM TODS"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: A temporal role-based access control model. In: Proc. 5th ACM Workshop on Role-Based Access Control, pp. 21\u201330 (2000)","DOI":"10.1145\/344287.344298"},{"issue":"2","key":"1_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/306686.306687","volume":"17","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst.\u00a017(2), 101\u2013140 (1999)","journal-title":"ACM Trans. Inf. Syst."},{"key":"1_CR10","volume-title":"An Introduction to Database Systems","author":"C. Date","year":"2003","unstructured":"Date, C.: An Introduction to Database Systems. Addison-Wesley, Reading (2003)"},{"issue":"3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.I., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J. Joshi","year":"2005","unstructured":"Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng.\u00a017(1), 4\u201323 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.J.: Limiting disclosure in hippocratic databases. In: VLDB, pp. 108\u2013119 (2004)","DOI":"10.1016\/B978-012088469-8.50013-9"},{"key":"1_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"J. Lloyd","year":"1987","unstructured":"Lloyd, J.: Foundations of Logic Programming. Springer, Heidelberg (1987)"},{"key":"1_CR15","unstructured":"Oracle. Oracle 11g, http:\/\/www.oracle.com"},{"key":"1_CR16","unstructured":"PostgreSQL 8.3: User Manual, http:\/\/www.postgresql.org\/docs\/"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Mendelzon, A.O., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: SIGMOD Conference, pp. 551\u2013562 (2004)","DOI":"10.1145\/1007568.1007631"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: Proc. 1974 Annual Conf (ACM\/CSC-ER), pp. 180\u2013186 (1974)","DOI":"10.1145\/800182.810400"},{"key":"1_CR19","unstructured":"Wang, Q., Yu, T., Li, N., Lobo, J., Bertino, E., Irwin, K., Byun, J.-W.: On the correctness criteria of fine-grained access control in relational databases. In: VLDB, pp. 555\u2013566 (2007)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security XXII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70567-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T17:15:34Z","timestamp":1557681334000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70567-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540705666","9783540705673"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70567-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}