{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:22Z","timestamp":1725562762685},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_19","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"287-294","source":"Crossref","is-referenced-by-count":0,"title":["An Access Control Model for Web Databases"],"prefix":"10.1007","author":[{"given":"Ahlem","family":"Bouchahda-Ben Tekaya","sequence":"first","affiliation":[]},{"given":"Nhan","family":"Le Thanh","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Bouhoula","sequence":"additional","affiliation":[]},{"given":"Faten","family":"Labbene-Ayachi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"American national standard for information technology, role based access control. ansi incits 359-2004 (February 2004)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Gertz, M., Gandhi, M.: Security Re-engineering for Databases: Concepts and Techniques. In: Handbook of Database Security, pp. 267\u2013296 (2007)","DOI":"10.1007\/978-0-387-48533-1_12"},{"key":"19_CR3","unstructured":"Roichman, A.: Intrusion prevention and detection for web databases (2008)"},{"key":"19_CR4","unstructured":"Halfond, W.G., Viegas, J., Orso, A.: A classification of sql-injection attacks and countermeasures. In: Proceedings of the IEEE International Symposium on Secure Software Engineering, Arlington, VA, USA (2006)"},{"key":"19_CR5","first-page":"350","volume-title":"PRDC 2005: Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing","author":"M. Vieira","year":"2005","unstructured":"Vieira, M., Madeira, H.: Detection of malicious transactions in dbms. In: PRDC 2005: Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing, Washington, DC, USA, pp. 350\u2013357. IEEE Computer Society, Los Alamitos (2005)"},{"key":"19_CR6","unstructured":"Oracle corporation: Oracle9i database concepts release 2 (9.2). ch. 22: Controlling database access, \n                    \n                      http:\/\/download-west.oracle.com\/docs\/cd\/B10501_01\/server.920\/a96524\/c23acces.htm"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:21:36Z","timestamp":1558300896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}