{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:15Z","timestamp":1725548295529},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_14","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"257-272","source":"Crossref","is-referenced-by-count":1,"title":["Security in Relational Databases"],"prefix":"10.1007","author":[{"given":"Neerja","family":"Bhatnagar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"S.\u00a0Smith, J.\u00a0Marchesini: The Craft of System Security (Addison-Wesley Professional, 2007)"},{"key":"14_CR2","unstructured":"B. Wiedman: Database security (common-sense principles) (2008), http:\/\/governmentsecurity.org\/articles\/DatabaseSecurityCommon-sensePrinciples.php"},{"key":"14_CR3","volume-title":"Database System Concepts","author":"A. Silberschatz","year":"2005","unstructured":"A.\u00a0Silberschatz, H.\u00a0Korth, S.\u00a0Sudarshan: Database System Concepts, 5th edn. (McGraw-Hill, New York, NY 2005)","edition":"5"},{"key":"14_CR4","unstructured":"Information technology security evaluation criteria (ITSEC), Provisional Harmonized Criteria, COM(90)314 (Commission of the European Communities, 1991)"},{"key":"14_CR5","unstructured":"http:\/\/www.commoncriteriaportal.org\/"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"D.E.\u00a0Bell, L.J.\u00a0LaPadula: Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997 (MITRE Corp., Bedford 1976)","DOI":"10.21236\/ADA023588"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"G.\u00a0Pernul: Database Security. In: Advances in Computers, Vol. 38, ed. by M.C.\u00a0Yovits (Academic Press, 1994) pp. 1\u201372","DOI":"10.1016\/S0065-2458(08)60175-8"},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/69.54719","volume":"2","author":"P.D. Stachour","year":"1990","unstructured":"P.D.\u00a0Stachour, B.\u00a0Thuraisingham: Design of LDV: a\u00a0multilevel secure relational database management system, IEEE Trans. Knowl. Data Eng. 2(2), 190\u2013209 (1990)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"14_CR9","series-title":"IFIP Transactions","first-page":"203","volume-title":"Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects","author":"S. Jajodia","year":"1992","unstructured":"S.\u00a0Jajodia, R.\u00a0Mukkamala: Effects of the SeaView decomposition of multilevel relations on database performance. In: Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects, IFIP Transactions, Vol.\u00a0A-6, ed. by C.E.\u00a0Landwehr, S.\u00a0Jajodia (North Holland, Amsterdam 1992) pp.\u00a0203\u2013225"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"S.\u00a0Jajodia, R.\u00a0Sandhu: Toward a multilevel secure relational data model, Proc. ACM SIGMOD (Denver, 1991)","DOI":"10.1145\/115790.115796"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"S.\u00a0Jajodia, R.\u00a0Sandhu: Polyinstantiation Integrity in Multilevel Relations, Proc. Symposium on Research in Security and Privacy (IEEE Computer Society Press, 1990)","DOI":"10.1109\/RISP.1990.63843"},{"key":"14_CR12","unstructured":"B. Schneier: Schneier on Security, A blog covering security and security technology (March 2005), http:\/\/www.schneier.com\/blog\/archives\/2005\/03\/the_failure_of.html"},{"key":"14_CR13","unstructured":"P. Zikopoulos: The Database Security Blanket (19 July 2009), http:\/\/www.governmentsecurity.org\/articles\/Thedatabasesecurityblanket.php"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:21Z","timestamp":1606185561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_14","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}