{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:49:04Z","timestamp":1743097744990,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642257063"},{"type":"electronic","value":"9783642257070"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-25707-0_7","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T23:00:23Z","timestamp":1328655623000},"page":"77-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting, Monitoring and Preventing Database Security Breaches in a Housing-Based Outsourcing Model"],"prefix":"10.1007","author":[{"given":"Tran Khanh","family":"Dang","sequence":"first","affiliation":[]},{"given":"Tran Thi Que","family":"Nguyet","sequence":"additional","affiliation":[]},{"given":"Truong Quynh","family":"Chi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,21]]},"reference":[{"issue":"5","key":"7_CR1_7","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/s00778-007-0051-4","volume":"17","author":"K Ashish","year":"2008","unstructured":"Ashish, K., Evimaria, K., Elisa, B.: Detecting Anomalous Access Patterns in Relational Databases. VLDB Journal, 17(5), 1063\u20131077 (2008)","journal-title":"VLDB Journal"},{"unstructured":"The Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Study: A Penetration Testing Model, URL: (2003)","key":"7_CR2_7"},{"doi-asserted-by":"crossref","unstructured":"Dang, T.K., Nguyen, T.S.: Providing Query Assurance for Outsourced Tree-Indexed Data. HPSC2006, Hanoi, Vietnam, pp. 207\u2013224 (2008)","key":"7_CR3_7","DOI":"10.1007\/978-3-540-79409-7_13"},{"issue":"1","key":"7_CR4_7","first-page":"59","volume":"21","author":"TK Dang","year":"2008","unstructured":"Dang, T.K.: Ensuring Correctness, Completeness and Freshness for Outsourced Tree-Indexed Data. IRMJ, Idea Group, 21(1), 59\u201376 (2008)","journal-title":"IRMJ, Idea Group"},{"unstructured":"Dang, T.K., Truong, Q.C., Cu-Nguyen, P.H., Tran, T.Q.N.: An Extensible Framework for Detecting Database Security Flaws. ACOMP2008, Vietnam, pp. 68\u201377 (2008)","key":"7_CR5_7"},{"unstructured":"Dang, T.K., Tran, T.Q.N., Truong, Q.C.: Security Issues in Housing Service Outsourcing Model with Database Systems. ASIS LAB, ASIS-TR-0017\/2009, URL: (2009)","key":"7_CR6_7"},{"doi-asserted-by":"crossref","unstructured":"Geer, D., Harthorne, J.: Penetration testing: a duet. Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, USA, pp. 185\u2013198 (2002)","key":"7_CR7_7","DOI":"10.1109\/CSAC.2002.1176290"},{"unstructured":"Handscombe, K.: Continuous Auditing From A Practical Perspective. Information Systems Control Journal, 2 (2007)","key":"7_CR8_7"},{"doi-asserted-by":"crossref","unstructured":"Huynh, V.Q.P, Dang, T.K: eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss. VLDB Workshop on Secure Data Management, LNCS, Springer Verlag, Singapore, pp. 26\u201340 (2010)","key":"7_CR9_7","DOI":"10.1007\/978-3-642-15546-8_3"},{"unstructured":"Natan, R.B.: Implementing Database Security and Auditing. Elsevier Digital Press (2005)","key":"7_CR10_7"},{"unstructured":"Qiang, L.: Defense In-Depth to Achieve Unbreakable Database Security. ICITA2004, China, pp. 386\u2013390 (2004)","key":"7_CR11_7"},{"unstructured":"Raffael, M.: Applied Security Visualization. Addison-Wesley (2008)","key":"7_CR12_7"},{"unstructured":"Rich, M.: Understanding and Selecting a Database Activity Monitoring Solution. URL: (2008)","key":"7_CR13_7"},{"unstructured":"Surajit, C., Arnd, C., Koenig, V.N.: SQLCM: A Continuous Monitoring Framework for Relational Database Engines. ICDE2004, USA, pp. 473\u2013485 (2004)","key":"7_CR14_7"},{"unstructured":"Tran, T.Q.N., Dang, T.K.: Towards Side-Effects-free Database Penetration Testing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 1(1), 72\u201385 (2010)","key":"7_CR15_7"},{"doi-asserted-by":"crossref","unstructured":"Varun, C., Arindam B., Vipin K.: Anomaly Detection: A Survey. ACM Computing Surveys (CSUR), 41(3), article 15 (2009)","key":"7_CR16_7","DOI":"10.1145\/1541880.1541882"}],"container-title":["Modeling, Simulation and Optimization of Complex Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25707-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T01:43:26Z","timestamp":1742435006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-25707-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642257063","9783642257070"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25707-0_7","relation":{},"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"21 January 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}