{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:45:43Z","timestamp":1755035143040,"version":"3.40.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,7,6]],"date-time":"2012-07-06T00:00:00Z","timestamp":1341532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s00778-012-0282-x","type":"journal-article","created":{"date-parts":[[2012,7,5]],"date-time":"2012-07-05T13:49:09Z","timestamp":1341496149000},"page":"203-228","source":"Crossref","is-referenced-by-count":6,"title":["Auditing a database under retention policies"],"prefix":"10.1007","volume":"22","author":[{"given":"Wentian","family":"Lu","sequence":"first","affiliation":[]},{"given":"Gerome","family":"Miklau","sequence":"additional","affiliation":[]},{"given":"Neil","family":"Immerman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,6]]},"reference":[{"key":"282_CR1","doi-asserted-by":"crossref","unstructured":"Antova, L., Jansen, T., Koch, C., Olteanu, D.: Fast and simple relational processing of uncertain data. In: ICDE, pp. 983\u2013992 (2008)","DOI":"10.1109\/ICDE.2008.4497507"},{"key":"282_CR2","unstructured":"ARMA Internaltional: Generally Accepted Recordkeeping Principles. http:\/\/www.arma.org\/GARP\/"},{"key":"282_CR3","doi-asserted-by":"crossref","unstructured":"Ataullah, A., Aboulnaga, A., Tompa, F.: Records retention in relational database systems. In: Proceeding of the ACM Conference on Information and Knowledge Management (CIKM), pp. 873\u2013882 (2008)","DOI":"10.1145\/1458082.1458197"},{"key":"282_CR4","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bettini, C., Samarati, P.: A temporal authorization model. In: ACM Conference on Computer and Communications Security (CCS), pp. 126\u2013135. ACM Press, New York (1994)","DOI":"10.1145\/191177.191202"},{"key":"282_CR5","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1145\/319996.320014","volume":"8","author":"J. Biskup","year":"1983","unstructured":"Biskup J.: A foundation of codd\u2019s relational maybe-operations. ACM Trans. Database Syst. 8, 608\u2013636 (1983)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"282_CR6","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1145\/68012.68015","volume":"14","author":"J. Blakeley","year":"1989","unstructured":"Blakeley J., Coburn N., Larson P.: Updating derived relations: detecting irrelevant and autonomously computable updates. TODS 14(3), 369\u2013400 (1989)","journal-title":"TODS"},{"issue":"2","key":"282_CR7","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/16856.16861","volume":"15","author":"J.A. Blakeley","year":"1986","unstructured":"Blakeley J.A., Larson P.A., Tompa F.W.: Efficiently updating materialized views. SIGMOD Rec. 15(2), 61\u201371 (1986)","journal-title":"SIGMOD Rec."},{"key":"282_CR8","doi-asserted-by":"crossref","unstructured":"Chomicki, J.: Temporal query languages: a survey. In: Temporal Logic (ICTL\u201994), vol. 827, pp. 506\u2013534 (1994)","DOI":"10.1007\/BFb0014006"},{"key":"282_CR9","unstructured":"EMC Corporation: http:\/\/www.emc.com"},{"key":"282_CR10","doi-asserted-by":"crossref","unstructured":"Fabbri, D., LeFevre, K., Zhu, Q.: PolicyReplay: misconfiguration-response queries for data breach reporting. In: Proceedings of the VLDB Endowment, vol. 3, no. (1\u20132), pp. 36\u201347 (2010)","DOI":"10.14778\/1920841.1920851"},{"key":"282_CR11","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1145\/49346.50065","volume":"13","author":"S.K. Gadia","year":"1988","unstructured":"Gadia S.K.: A homogeneous relational model and query languages for temporal databases. ACM Trans. Database Syst. 13, 418\u2013448 (1988)","journal-title":"ACM Trans. Database Syst."},{"key":"282_CR12","unstructured":"Gadia, S.K., Nair, S.S., Poon, Y.C.: Incomplete information in relational temporal databases. In: 18th VLDB Conference (1992)"},{"key":"282_CR13","unstructured":"Garcia-Molina, H., Labio, W., Yang, J.: Expiring data in a warehouse. In: VLDB Conference, pp. 500\u2013511 (1998)"},{"key":"282_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54919-6","volume-title":"The Problem of Incomplete Information in Relational Databases","author":"G. Grahne","year":"1991","unstructured":"Grahne G.: The Problem of Incomplete Information in Relational Databases. Springer, Berlin (1991)"},{"key":"282_CR15","unstructured":"GRM LLC: http:\/\/www.grmdocumentmanagement.com"},{"issue":"2","key":"282_CR16","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1145\/232616.232692","volume":"21","author":"S. Guo","year":"1996","unstructured":"Guo S., Sun W., Weiss M.: Solving satisfiability and implication problems in database systems. ACM Trans. Database Syst. 21(2), 270\u2013293 (1996)","journal-title":"ACM Trans. Database Syst."},{"key":"282_CR17","doi-asserted-by":"crossref","unstructured":"Hasan, R., Winslett, M.: Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 621\u2013632. ACM (2010)","DOI":"10.1145\/1739041.1739115"},{"key":"282_CR18","unstructured":"Hasan, R., Winslett, M., Mitra, S.: Efficient Audit-based Compliance for Relational Data Retention. UIUC Dept. of CS Tech Report UIUCDCS-R-2009-3044 (2009)"},{"issue":"2","key":"282_CR19","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.orl.2007.05.005","volume":"36","author":"D. Hochbaum","year":"2008","unstructured":"Hochbaum D., Moreno-Centeno E.: The inequality-satisfiability problem. Oper. Res. Lett. 36(2), 229\u2013233 (2008)","journal-title":"Oper. Res. Lett."},{"issue":"4","key":"282_CR20","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1145\/1634.1886","volume":"31","author":"T. Imielinski","year":"1984","unstructured":"Imielinski T., Lipski W.: Incomplete information in relational databases. J. ACM 31(4), 761\u2013791 (1984)","journal-title":"J. ACM"},{"key":"282_CR21","first-page":"192","volume":"4","author":"C.S. Jensen","year":"1992","unstructured":"Jensen C.S., Mark L.: Queries on change in an extended relational model. IEEE TKDE 4, 192\u2013200 (1992)","journal-title":"IEEE TKDE"},{"key":"282_CR22","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1109\/69.109107","volume":"3","author":"C.S. Jensen","year":"1991","unstructured":"Jensen C.S., Mark L., Roussopoulos N.: Incremental implementation model for relational databases with transaction time. IEEE Trans. Knowl. Data Eng. 3, 461\u2013473 (1991)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"282_CR23","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0306-4379(94)90008-6","volume":"19","author":"M. Koubarakis","year":"1994","unstructured":"Koubarakis M.: Database models for infinite and indefinite temporal information. Inf. Syst. 19, 141 (1994)","journal-title":"Inf. Syst."},{"issue":"1","key":"282_CR24","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1111\/j.1467-9574.1976.tb00264.x","volume":"30","author":"B. Lageweg","year":"1976","unstructured":"Lageweg B., Lenstra J., Kan A.: Minimizing maximum lateness on one machine: computational experience and some applications. Stat. Neerl. 30(1), 25\u201341 (1976)","journal-title":"Stat. Neerl."},{"key":"282_CR25","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting disclosure in hippocratic databases. In: VLDB Conference, pp. 108\u2013119 (2004)","DOI":"10.1016\/B978-012088469-8.50013-9"},{"key":"282_CR26","unstructured":"LexisNexis: Document Retention & Destruction Policies for Digital Data. http:\/\/www.lexisnexis.com\/applieddiscovery\/lawlibrary\/whitePapers\/ADI_WP_DocRetentionDestruction.pdf"},{"key":"282_CR27","doi-asserted-by":"crossref","unstructured":"Lomet, D.B., Barga, R.S., Mokbel, M.F., Shegalov, G., Wang, R. Zhu, Y.: Transaction time support inside a database engine. In: ICDE, p. 35 (2006)","DOI":"10.1109\/ICDE.2006.162"},{"key":"282_CR28","doi-asserted-by":"crossref","unstructured":"Lu, W., Miklau, G.: AuditGuard: a system for database auditing under retention restrictions. IN: Proceedings of the VLDB Endowment vol. 1, no. 2, pp. 1484\u20131487 (2008)","DOI":"10.14778\/1454159.1454207"},{"key":"282_CR29","doi-asserted-by":"crossref","unstructured":"Lu, W., Miklau, G.: Auditing a database under retention restrictions. In: IEEE International Conference on Data Engineering (ICDE), pp. 42\u201353 (2009)","DOI":"10.1109\/ICDE.2009.125"},{"key":"282_CR30","unstructured":"Mullins, C.S.: Database Archiving for Long-term Data Retention. http:\/\/www.tdan.com\/view-articles\/4591 (2006)"},{"key":"282_CR31","unstructured":"OpenText Corporation: http:\/\/www.opentext.com"},{"key":"282_CR32","unstructured":"Perez, R.A., Moreau, L.: Securing provenance-based audits. In: International Provenance and Annotation Workshop 2010. Springer, Berlin (2010)"},{"key":"282_CR33","unstructured":"RainStor Inc.: http:\/\/rainstor.com"},{"key":"282_CR34","unstructured":"Rosenkrantz, D.J., Hunt, H.B.: Processing conjunctive predicates and queries. In: VLDB Conference, p. 72 (1980)"},{"key":"282_CR35","unstructured":"SAND Technology: http:\/\/www.sand.com"},{"key":"282_CR36","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/69.54721","volume":"2","author":"N.L. Sarda","year":"1990","unstructured":"Sarda N.L.: Extensions to sql for historical databases. IEEE Trans. Knowl. Data Eng. 2, 220\u2013230 (1990)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"282_CR37","doi-asserted-by":"crossref","unstructured":"Sarma, A., Benjelloun, O., Halevy, A., Widom, J.: Working models for uncertain data. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.174"},{"issue":"2","key":"282_CR38","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/317087.317089","volume":"2","author":"B. Schneier","year":"1999","unstructured":"Schneier B., Kelsey J.: Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. 2(2), 159\u2013176 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"282_CR39","doi-asserted-by":"crossref","unstructured":"Shaull, R., Shrira, L., Xu, H.: Skippy: a new snapshot indexing method for time travel in the storage manager. In: ACM SIGMOD Conference, pp. 637\u2013648 (2008)","DOI":"10.1145\/1376616.1376681"},{"key":"282_CR40","doi-asserted-by":"crossref","unstructured":"Simons, B., Sipser, M.: On scheduling unit-length jobs with multiple release time\/deadline intervals. Oper. Res. 80\u201388 (1984)","DOI":"10.1287\/opre.32.1.80"},{"issue":"1","key":"282_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0169-023X(02)00060-5","volume":"44","author":"J. Skyt","year":"2003","unstructured":"Skyt J., Jensen C., Mark L.: A foundation for vacuuming temporal databases. Data Knowl. Eng. 44(1), 1\u201329 (2003)","journal-title":"Data Knowl. Eng."},{"key":"282_CR42","doi-asserted-by":"crossref","unstructured":"Snodgrass, R., Yao, S., Collberg, C.: Tamper detection in audit logs. In: 13th VLDB Conference, pp. 504\u2013515 (2004)","DOI":"10.1016\/B978-012088469-8\/50046-2"},{"key":"282_CR43","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-2289-8","volume-title":"The TSQL2 Temporal Query Language","author":"R.T. Snodgrass","year":"1995","unstructured":"Snodgrass R.T.: The TSQL2 Temporal Query Language. Kluwer Academic Publishers, Norwell (1995)"},{"key":"282_CR44","unstructured":"Snodgrass, R.T.: Developing time-oriented database applications in SQL. Morgan Kaufmann Publishers Inc., San Francisco (1999)"},{"key":"282_CR45","unstructured":"Snodgrass, R.T., Collberg, C.S.: The \u03c4-BerkeleyDB Temporal Subsystem. Published: Available at http:\/\/www.cs.arizona.edu\/tau\/tbdb\/"},{"key":"282_CR46","doi-asserted-by":"crossref","unstructured":"Stahlberg, P., Miklau, G., Levine, B.N.: Threats to privacy in the forensic analysis of database systems. In: SIGMOD Conference, pp. 91\u2013102 (2007)","DOI":"10.1145\/1247480.1247492"},{"key":"282_CR47","doi-asserted-by":"crossref","unstructured":"Toman, D.: Expiration of historical databases. In: Symposium on Temporal Representation and Reasoning (TIME), pp. 128\u2013135 (2001)","DOI":"10.1109\/TIME.2001.930708"},{"key":"282_CR48","unstructured":"Wang, Q., Yu, T., Li, N., Lobo, J., Bertino, E., Irwin, K., Byun, J.W.: On the correctness criteria of fine-grained access control in relational databases. In: VLDB Conference, pp. 555\u2013566 (2007)"},{"key":"282_CR49","unstructured":"Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an encrypted and searchable audit log. In: NDSS, vol. 6 (2004)"},{"key":"282_CR50","unstructured":"Wrozek, B.: Electronic Data Retention Policy (2001). http:\/\/www.sans.org\/reading_room\/whitepapers\/backup\/electronic-data-retention-policy_514"},{"key":"282_CR51","unstructured":"ZL Technologies, Inc.: http:\/\/www.zlti.com"},{"key":"282_CR52","unstructured":"ZyLAB: http:\/\/www.zylab.com"}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-012-0282-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00778-012-0282-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-012-0282-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T07:56:46Z","timestamp":1743667006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00778-012-0282-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,6]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["282"],"URL":"https:\/\/doi.org\/10.1007\/s00778-012-0282-x","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"type":"print","value":"1066-8888"},{"type":"electronic","value":"0949-877X"}],"subject":[],"published":{"date-parts":[[2012,7,6]]}}}