{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:38:47Z","timestamp":1742999927634,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":35,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_77","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"449-455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement"],"prefix":"10.1007","author":[{"given":"Serguei A.","family":"Mokhov","sequence":"first","affiliation":[]},{"given":"Lee Wei","family":"Huynh","sequence":"additional","affiliation":[]},{"given":"Lingyu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"77_CR1","unstructured":"S. Mokhov, I. Clement, S. Sinclair, and D. Nicolacopoulos, \u201cModular Audio Recognition Framework,\u201d Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, 2002\u2013 2003, project report, http:\/\/marf.sf.net, last viewed April 2008."},{"key":"77_CR2","unstructured":"The hsqldb Development Group, \u201cHSQLDB \u2013 lightweight 100% Java SQL database engine v.1.8.0.10,\u201d hsqldb.org, 2001\u20132008, http:\/\/hsqldb.org\/."},{"key":"77_CR3","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, \u201cIntroducing MARF: a modular audio recognition framework and its applications for scientific and software engineering research,\u201d in Advances in Computer and Information Sciences and Engineering. University of Bridgeport, U.S.A.: Springer Netherlands, Dec. 2007, pp. 473\u2013478, proceedings of CISSE\/SCSS\u201907, cisse2007.org.","DOI":"10.1007\/978-1-4020-8741-7_84"},{"key":"77_CR4","unstructured":"\u2014\u2014, \u201cOn design and implementation of distributed modular audio recognition framework: Requirements and specification design document,\u201d Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Aug. 2006, project report, http:\/\/marf.sf.net, last viewed December 2008."},{"key":"77_CR5","unstructured":"S. A. Mokhov, L. W. Huynh, and J. Li, \u201cManaging distributed MARF\u2019s nodes with SNMP,\u201d in Proceedings of PDPTA\u20192008. Las Vegas, USA: CSREA Press, Aug. 2008, to appear."},{"key":"77_CR6","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov and R. Jayakumar, \u201cDistributed modular audio recognition framework (DMARF) and its applications over web services,\u201d in Proceedings of TeNe\u201908. Springer, 2008, to appear.","DOI":"10.1007\/978-90-481-3662-9_72"},{"key":"77_CR7","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, \u201cChoosing best algorithm combinations for speech processing tasks in machine learning using MARF,\u201d in Proceedings of the 21st Canadian AI\u201908, S. Bergler, Ed. Windsor, Ontario, Canada: Springer-Verlag, Berlin Heidelberg, May 2008, pp. 216\u2013221, LNAI 5032.","DOI":"10.1007\/978-3-540-68825-9_21"},{"key":"77_CR8","doi-asserted-by":"crossref","unstructured":"\u2014\u2014, \u201cStudy of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF,\u201d in Proceedings of C3S2E\u201908, B. C. Desai, Ed. Montreal, Quebec, Canada: ACM and BytePress, May 2008, pp. 29\u201343, ISBN 978\u20131-60558\u2013101-9.","DOI":"10.1145\/1370256.1370262"},{"key":"77_CR9","unstructured":"Sun Microsystems, Inc., \u201cOpenOffice,\u201d [online], 2008, openoffice.org."},{"key":"77_CR10","unstructured":"S. A. Mokhov, L. W. Huynh, J. Li, and F. Rassai, \u201cA Java Data Security Framework (JDSF) for MARF and HSQLDB,\u201d Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada, Apr. 2007, project report. Hosted at http:\/\/marf.sf.net, last viewed April 2008."},{"key":"77_CR11","unstructured":"\u2014\u2014, \u201cA privacy framework within the java data security framework (JDSF): Design refinement, implementation, and statistics,\u201d in Proceedings of the 12th World Multi-Conference on Systemics, Cybernetics and Informatics (WM-SCI\u201908), N. Callaos, W. Lesso, C. D. Zinn, J. Baralt, J. Boukachour, C. White, T. Marwala, and F. V. Nelwamondo, Eds., vol. V. Orlando, Florida, USA: IIIS, Jun. 2008, pp. 131\u2013136."},{"key":"77_CR12","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, F. Rassai, L. W. Huynh, and L. Wang, \u201cThe authentication framework within the java data security framework (JDSF): Design refinement and implementation,\u201d in Proceedings of CISSE\u201908. University of Bridgeport, CT, USA: Springer, Dec. 2008, to appear.","DOI":"10.1007\/978-90-481-3662-9_73"},{"key":"77_CR13","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, L. Wang, and J. Li, \u201cSimple dynamic key management in SQL randomization,\u201d 2008, unpublished.","DOI":"10.1109\/NTMS.2009.5384673"},{"key":"77_CR14","doi-asserted-by":"crossref","unstructured":"R. Chandramouli, N. Memon, and M. Rabbani, \u201cDigital watermarking,\u201d 2002.","DOI":"10.1002\/0471443395.img010"},{"key":"77_CR15","unstructured":"L. de C.T. Gomes, P. Cano, E. Gomez, M. Bonnet, and E. Batlle, \u201cAudio watermarking and fingerprinting,\u201d 2002."},{"key":"77_CR16","unstructured":"H.-C. Wu and H.-C. Lin, \u201cDigital watermarking techniques,\u201d 2005."},{"key":"77_CR17","doi-asserted-by":"crossref","unstructured":"R. Agrawal and J. Kiernan, \u201cWatermarking relational database.\u201d IBM Almaden Research Center, 2002.","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"key":"77_CR18","doi-asserted-by":"crossref","unstructured":"R. Sion, M. Atallah, and S. Prabhakar, \u201cRights protection for relational data,\u201d in IEEE Transactions on Knowledge and Data Engineering. IEEE Computer Society, 2004.","DOI":"10.1145\/872757.872772"},{"key":"77_CR19","volume-title":"Spread Spectrum Systems","author":"R. C. Dixon","year":"1994","unstructured":"R. C. Dixon, Spread Spectrum Systems, 3rd ed. John Wiley and Sons, New York, 1994.","edition":"3"},{"key":"77_CR20","volume-title":"Digital Communications","author":"S. Haykin","year":"1988","unstructured":"S. Haykin, Digital Communications. John Wiley and Sons, New York, 1988."},{"key":"77_CR21","doi-asserted-by":"crossref","unstructured":"L. Boney, A. H. Tewfik, and K. N. Hamdy, \u201cDigital watermarks for audio signals,\u201d in International Conference on Multimedia Computing and Systems, 1996, pp. 473\u2013480.","DOI":"10.1109\/MMCS.1996.535015"},{"key":"77_CR22","unstructured":"R. A. Garcia, \u201cDigital watermarking of audio signals using psychoacousting auditory model and spread spectrum theory,\u201d in 107th Convention on Audio Engineering Society, 1999."},{"key":"77_CR23","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"W. Bender, D. Gruhl, N. Morimoto, and A. Lu, \u201cTechniques for data hiding,\u201d IBM System Journal, vol. 35, pp. 313\u2013336, 1996.","journal-title":"IBM System Journal"},{"key":"77_CR24","unstructured":"C. Neubauer and J. Herre, \u201cAdvanced audio watermarking and its application,\u201d in 109th Convention on Audio Engineering Society, 2000."},{"key":"77_CR25","doi-asserted-by":"crossref","unstructured":"J. Lacy, S. R. Quackenbush, A. Reibman, and J. H. Snyder, \u201cIntellectual property protection systems and digital watermarking,\u201d in Information Hiding (Proceedings of the Second International Workshop, IH\u201998), D. Aucsmith, Ed. Springer, LNCS 1525, Dec. 1998, pp. 158\u2013168.","DOI":"10.1007\/3-540-49380-8_12"},{"key":"77_CR26","volume-title":"Psychoacoustics facts and models","author":"E. Zwicker","year":"1990","unstructured":"E. Zwicker and H. Fastl, Psychoacoustics facts and models. Springer-Verlag, Berlin, 1990."},{"key":"77_CR27","unstructured":"L. Wang, \u201cINSE691A: Database security and privacy, course notes,\u201d CIISE, Concordia University, 2007, http:\/\/users.encs.concordia.ca\/?wang\/INSE691A.html."},{"key":"77_CR28","doi-asserted-by":"crossref","unstructured":"W. T. Polk and L. E. Bassham, Security Issues in the Database Language SQL. NIST, 1993, NIST Special Publication 800\u20138.","DOI":"10.6028\/NIST.SP.800-8"},{"key":"77_CR29","unstructured":"Unascribed, \u201cCBC-DES Java implementation,\u201d [online], 2007."},{"key":"77_CR30","unstructured":"J. O. Grabbe, \u201cJava program for RSA encryption,\u201d [online], 2001, http:\/\/www.laynetworks.com\/rsa_java.txt."},{"key":"77_CR31","unstructured":"Unascribed, Sign and Verify a DSA Signature. java2s.com, 2004, http:\/\/www.java2s.com\/Code\/Java\/Security\/VerifyaDSAsignature.htm."},{"key":"77_CR32","unstructured":"Sun Microsystems, Inc., Security Features in Java SE. java.sun.com, 2007, http:\/\/java.sun.com\/docs\/books\/tutorial\/security\/index.html."},{"key":"77_CR33","unstructured":"S. Paavolainen and S. Ostermiller, MD5 hash generator. ostermiller.org, 2007, http:\/\/ostermiller.org\/utils\/MD5.java.html."},{"key":"77_CR34","unstructured":"A. Andreu and M.-A. Laverdi`ere, SSHA Digest, Modified. www.securitydocs.com, 2006, http:\/\/www.securitydocs.com\/library\/3439."},{"key":"77_CR35","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov, \u201cTowards security hardening of scientific distributed demand-driven and pipelined computing systems,\u201d in Proceedings of the 7th International Symposium on Parallel and Distributed Computing (ISPDC\u201908). Krakow, Poland: IEEE Computer Society Press, Jul. 2008, to appear, http:\/\/ispdc2008.ipipan.waw.pl\/.","DOI":"10.1109\/ISPDC.2008.52"}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T03:13:33Z","timestamp":1739762013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_77","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}