{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:55:11Z","timestamp":1742943311370,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811631498"},{"type":"electronic","value":"9789811631504"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-3150-4_2","type":"book-chapter","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T12:03:10Z","timestamp":1624276990000},"page":"15-26","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Database Fine-Grained Access SQL Statement Control Model Based on the Dynamic Query Modification Algorithm"],"prefix":"10.1007","author":[{"given":"Ya","family":"Wei","sequence":"first","affiliation":[]},{"given":"Rongyan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Lan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"key":"2_CR1","first-page":"147","volume":"02","author":"Z Bingyu","year":"2010","unstructured":"Bingyu, Z., Huanguo, Z., Xi, G., et al.: A fine-grained authorization model based on credibility in trusted network connection. J. Wuhan Univ. (Sci. Edn.) 02, 147\u2013150 (2010)","journal-title":"J. Wuhan Univ. (Sci. Edn.)"},{"key":"2_CR2","unstructured":"Wu, C.: Fine-grained authorization delegation method based on quantitative roles. Comput. Eng. 13, 36\u201338\u2009+\u200942 (2012)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Chaudhuri, S., Dutta, T., Sudarshan, S.: Fine grained authorization through predicated grants. In: IEEE International Conference on Data Engineering. IEEE (2007)","DOI":"10.1109\/ICDE.2007.368976"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Sun, W., Shucheng, Y., Lou, W., et al.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6847943"},{"key":"2_CR5","unstructured":"Wang, Q., Yu, T., Li, N., et al.: On the correctness criteria of fine-grained access control in relational databases. In: International Conference on Very Large Data Bases. DBLP (2007)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Calvio, A.: A simple method for limiting disclosure in continuous microdata based on principal component analysis. J. Off. Stats 33(1) (2017)","DOI":"10.1515\/jos-2017-0002"},{"issue":"008","key":"2_CR7","first-page":"204","volume":"32","author":"W Yanan","year":"2010","unstructured":"Yanan, W., Yiqiu, S.: Performance optimization of oracle database application system. Manufact. Autom. 32(008), 204\u2013206 (2010)","journal-title":"Manufact. Autom."},{"key":"2_CR8","unstructured":"Sybase adaptive server enterprise 12.5, System Administration Guide. Row Level Access Control. http:\/\/sybooks.sybase.com\/onlinebooks"},{"key":"2_CR9","unstructured":"Agrawal, R., Bird, P., Grandison, T., et al.: Extending relational database systems to automatically enforce privacy policies. In: International Conference on Data Engineering. IEEE Computer Society (2005)"},{"key":"2_CR10","first-page":"95","volume":"04","author":"L Xiaofeng","year":"2008","unstructured":"Xiaofeng, L., Dengguo, F., Chaowu, C., et al.: Access control model based on attributes. J. Commun. 04, 95\u2013103 (2008)","journal-title":"J. Commun."},{"key":"2_CR11","unstructured":"Han, Y., Zhang, Z., Wang, Y.: Access control model based on authorization view. In: Proceedings of the 2005 National Theoretical Computer Science Annual Conference (2005)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting disclosure in hippocratic databases. In: Proceedings of VLDB, Toronto, Canada, August 2004","DOI":"10.1016\/B978-012088469-8.50013-9"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Ceri, S., Gottlob, G., et al.: Translating SQL into relational algebra: optimization, semantics, and equivalence of SQL queries. IEEE Trans. Softw. Eng. SE-11(4), 324\u2013345 (2006)","DOI":"10.1109\/TSE.1985.232223"},{"key":"2_CR14","unstructured":"DeWitt, D.J.: The wisconsin benchmark: past, present, and future, Technical report (1993)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/11596981_81","volume-title":"Computational Intelligence and Security","author":"B-O Purevjii","year":"2005","unstructured":"Purevjii, B.-O., Aritsugi, M., Imai, S., Kanamori, Y., Pancake, Cherri M.: Protecting personal data with various granularities: a logic-based access control approach. In: Hao, Y., et al. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 548\u2013553. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11596981_81"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-3150-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T12:05:10Z","timestamp":1624277110000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-3150-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811631498","9789811631504"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-3150-4_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"22 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"153","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}