{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:43:40Z","timestamp":1743007420700,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":40,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_73","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"423-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement"],"prefix":"10.1007","author":[{"given":"Serguei A.","family":"Mokhov","sequence":"first","affiliation":[]},{"given":"Farid","family":"Rassai","sequence":"additional","affiliation":[]},{"given":"Lee Wei","family":"Huynh","sequence":"additional","affiliation":[]},{"given":"Lingyu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"73_CR1","unstructured":"S. Mokhov, I. Clement, S. Sinclair, and D. Nicolacopoulos, \u201cModular Audio Recognition Framework,\u201d Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, 2002\u2013 2003, project report, http:\/\/marf.sf.net, last viewed April 2008."},{"key":"73_CR2","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, \u201cIntroducing MARF: a modular audio recognition framework and its applications for scientific and software engineering research,\u201d in Advances in Computer and Information Sciences and Engineering. University of Bridgeport, U.S.A.: Springer Netherlands, Dec. 2007, pp. 473\u2013478, proceedings of CISSE\/SCSS\u201907, cisse2007.org.","DOI":"10.1007\/978-1-4020-8741-7_84"},{"key":"73_CR3","unstructured":"The hsqldb Development Group, \u201cHSQLDB \u2013 lightweight 100% Java SQL database engine v.1.8.0.10,\u201d hsqldb.org, 2001\u20132008, http:\/\/hsqldb.org\/."},{"key":"73_CR4","unstructured":"S. A. Mokhov, L. W. Huynh, J. Li, and F. Rassai, \u201cA Java Data Security Framework (JDSF) for MARF and HSQLDB,\u201d Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada, Apr. 2007, project report. Hosted at http:\/\/marf.sf.net, last viewed April 2008."},{"key":"73_CR5","unstructured":"D.X. Song,D.Wagner, andA. Perrig, \u201cPractical techniques for searches on encrypted data.\u201d University of California, Berkley."},{"key":"73_CR6","unstructured":"L.Wang, S. Jajodia, and D.Wijesekera, Preserving Privacy in On-line Analytical Processing (OLAP). Springer, Berlin, 2007, ISBN: 0\u201338746273-2."},{"key":"73_CR7","unstructured":"L. Wang and S. Jajodia, Security in Data Warehouses and OLAP Systems in The Handbook of Database Security: Applications and Trends, M. Gertz and S. Jajodia, Eds. Springer, Berlin, 2007."},{"key":"73_CR8","doi-asserted-by":"crossref","unstructured":"L. Sweeney, \u201ck-anonymity: A model for protecting privacy,\u201d in International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 2002, pp. 557\u2013570.","DOI":"10.1142\/S0218488502001648"},{"key":"73_CR9","unstructured":"L.Wang, \u201cINSE691A: Database security and privacy, course notes,\u201d CIISE, Concordia University, 2007, http:\/\/users.encs.concordia.ca\/~wang\/ INSE691A.html."},{"key":"73_CR10","unstructured":"S. A. Mokhov, \u201cExperimental results and statistics in the implementation of the modular audio recognition framework\u2019s API for text-independent speaker Identification,\u201d in Proceedings of the 6th International Conference on Computing, Communications and Control Technologies (CCCT\u201908), C. D. Zinn, H.-W. Chu, M. Savoie, J. Ferrer, and A. Munitic, Eds., vol. II. Orlando, Florida, USA: IIIS, Jun. 2008, pp. 267\u2013272."},{"key":"73_CR11","unstructured":"\u2014\u2014, \u201cOn design and implementation of distributed modular audio recognition framework: Requirements and specification design document,\u201d Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Aug. 2006, project report, http:\/\/marf.sf.net, last viewed December 2008."},{"key":"73_CR12","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov and R. Jayakumar, \u201cDistributed modular audio recognition framework (DMARF) and its applications over web services,\u201d in Proceedings of TeNe\u201908. Springer, 2008, to appear.","DOI":"10.1007\/978-90-481-3662-9_72"},{"key":"73_CR13","unstructured":"S. A. Mokhov, S. Sinclair, I. Clement, D. Nicolacopoulos, and the MARF Research & Development Group, \u201cText-Independent Speaker Identification Application,\u201d Published electronically within the MARF project, http:\/\/marf.sf.net, 2002\u20132008, last viewed April 2008."},{"key":"73_CR14","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, \u201cChoosing best algorithm combinations for speech processing tasks in machine learning using MARF,\u201d in Proceedings of the 21st Canadian AI\u201908, S. Bergler, Ed. Windsor, Ontario, Canada: Springer-Verlag, Berlin Heidelberg, May 2008, pp. 216\u2013221, LNAI 5032.","DOI":"10.1007\/978-3-540-68825-9_21"},{"key":"73_CR15","doi-asserted-by":"crossref","unstructured":"\u2014\u2014, \u201cStudy of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF,\u201d in Proceedings of C3S2E\u201908, B. C. Desai, Ed. Montreal, Quebec, Canada: ACM and BytePress, May 2008, pp. 29\u201343, ISBN 978\u20131-60558\u2013101-9.","DOI":"10.1145\/1370256.1370262"},{"key":"73_CR16","unstructured":"Sun Microsystems, Inc., \u201cOpenOffice,\u201d [online], 2008, openoffice.org."},{"key":"73_CR17","unstructured":"The PostgreSQL Global Development Group, \u201cPostgreSQL \u2013 the world\u2019s most advanced open-source database,\u201d postgresql.org, 1996\u20132008, http:\/\/www.postgresql.org\/, last viewed May 2008."},{"key":"73_CR18","unstructured":"MySQL AB and Sun Microsystems, Inc., \u201cMySQL \u2013 the world\u2019s most popular open source database,\u201d www.mysql.com, 1995\u20132008, http:\/\/www.mysql.com\/, last viewed December 2008."},{"key":"73_CR19","unstructured":"S. A. Mokhov, L.W. Huynh, J. Li, andF. Rassai, \u201cAprivacyframework within the java data security framework (JDSF): Design refinement, implementation, and statistics,\u201d in Proceedings of the 12th World Multi-Conference on Systemics, Cybernetics and Informatics (WM-SCI\u201908), N. Callaos, W. Lesso, C. D. Zinn, J. Baralt, J. Boukachour, C. White, T. Marwala, and F. V. Nelwamondo, Eds., vol. V. Orlando, Florida, USA: IIIS, Jun. 2008, pp. 131\u2013136."},{"key":"73_CR20","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov and L. W. Huynh, \u201cThe integrity framework within the java data security framework (JDSF): Design refinement and implementation,\u201d in Proceedings of CISSE\u201908. University of Bridgeport, CT, USA: Springer, Dec. 2008, to appear.","DOI":"10.1007\/978-90-481-3662-9_77"},{"key":"73_CR21","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, L. Wang, and J. Li, \u201cSimple dynamic key management in SQL randomization,\u201d 2008, unpublished.","DOI":"10.1109\/NTMS.2009.5384673"},{"key":"73_CR22","unstructured":"The GIPSY Research and Development Group, \u201cThe General Intensional Programming System (GIPSY) project,\u201d Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, 2002\u20132008, http:\/\/newton.cs.concordia.ca\/~gipsy\/, last viewed April 2008."},{"key":"73_CR23","doi-asserted-by":"crossref","unstructured":"E. Mykletun, M. Narasimha, and G. Tsudik, \u201cAuthentication and integrity in outsourced databases.\u201d Computer Science Department, School of Information and Computer Science, University of California, Irvine, 2006.","DOI":"10.1145\/1149976.1149977"},{"key":"73_CR24","doi-asserted-by":"crossref","unstructured":"M. Narasimha and G. Tsudik, \u201cAuthentication of outsourced databases using signature aggregation and chaining,\u201d 2006.","DOI":"10.1007\/11733836_30"},{"key":"73_CR25","unstructured":"F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, \u201cAuthenticated index structures for aggregation queries in outsourced databases,\u201dTech. Rep., 2006."},{"key":"73_CR26","unstructured":"\u2014\u2014, \u201cDynamic authenticated index structures for outsourced databases,\u201d in SIGMOD 2006. ACM, 2006."},{"key":"73_CR27","unstructured":"DNSSEC.NET, \u201cDNSSEC: DNS Security Extensions Securing the Domain Name System,\u201d 2002\u20132008, http:\/\/www.dnssec.net\/, last viewed December 2008."},{"key":"73_CR28","doi-asserted-by":"crossref","unstructured":"D. Atkins and R. Austein, \u201cRFC 3833: Threat Analysis of the Domain Name System (DNS),\u201d [online], Aug. 2004, http:\/\/www.rfc-archive.org\/getrfc.php?rfc=3833, viewed in December 2008.","DOI":"10.17487\/rfc3833"},{"key":"73_CR29","doi-asserted-by":"crossref","unstructured":"R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, \u201cRFC 4034: Resource Records for the DNS Security Extensions,\u201d [online], Mar. 2005, http:\/\/www.rfc-archive.org\/getrfc.php?rfc=4034, viewed in December 2008.","DOI":"10.17487\/rfc4034"},{"key":"73_CR30","doi-asserted-by":"crossref","unstructured":"D. Conrad, \u201cRFC 3225: Indicating Resolver Support of DNSSEC,\u201d [online], Dec. 2001, http:\/\/www.rfc-archive.org\/getrfc.php?rfc=3225, viewed in December 2008.","DOI":"10.17487\/rfc3225"},{"key":"73_CR31","unstructured":"C. Assi, INSE7120: Advanced Network Management, Course Notes. CIISE, Concordia University, 2007, http:\/\/users.encs.concordia.ca\/~assi\/courses\/inse7120.htm."},{"key":"73_CR32","doi-asserted-by":"crossref","unstructured":"R. Merkle, \u201cA digital signature based on a conventional encryption function,\u201d in Advances in Cryptology \u2013 CRYPTO\u201987, 1988, pp. 369\u2013378.","DOI":"10.1007\/3-540-48184-2_32"},{"key":"73_CR33","unstructured":"\u2014\u2014, \u201cA certified digital signature,\u201d in Advances in Cryptology \u2013 CRYPTO\u201989, 1990, pp. 218\u2013239."},{"key":"73_CR34","unstructured":"Unascribed, \u201cCBC-DES Java implementation,\u201d [online], 2007."},{"key":"73_CR35","unstructured":"J. O. Grabbe, \u201cJava program for RSA encryption,\u201d [online], 2001, http:\/\/www.laynetworks.com\/rsa java.txt."},{"key":"73_CR36","unstructured":"Unascribed, Sign and Verify a DSA Signature. java2s.com, 2004, http:\/\/www.java2s.com\/Code\/Java\/Security\/VerifyaDSAsignature.htm."},{"key":"73_CR37","unstructured":"Sun Microsystems, Inc., Security Features in Java SE. java.sun.com, 2007, http:\/\/java.sun.com\/docs\/books\/tutorial\/security\/index.html."},{"key":"73_CR38","unstructured":"S.Paavolainen andS. Ostermiller, MD5 hash generator. ostermiller.org, 2007, http:\/\/ostermiller.org\/utils\/MD5.java.html."},{"key":"73_CR39","unstructured":"A. Andreu and M.-A. Laverdi`ere, \u201cSSHA digest, modified,\u201d [online], 2006, http:\/\/www.securitydocs.com\/library\/3439."},{"key":"73_CR40","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, \u201cTowards security hardening of scientific distributed demand-driven and pipelined computing systems,\u201d in Proceedings of the 7th International Symposium on Parallel and Distributed Computing (ISPDC\u201908). Krakow,Poland: IEEE Computer Society, Jul. 2008, pp. 375\u2013382.","DOI":"10.1109\/ISPDC.2008.52"}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T03:14:08Z","timestamp":1739762048000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_73","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}