{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T12:04:05Z","timestamp":1649160245444},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,3,12]],"date-time":"2013-03-12T00:00:00Z","timestamp":1363046400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s11416-013-0182-7","type":"journal-article","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T16:39:42Z","timestamp":1386693582000},"page":"95-107","source":"Crossref","is-referenced-by-count":2,"title":["The security of databases: the Access case"],"prefix":"10.1007","volume":"9","author":[{"given":"Baptiste","family":"David","sequence":"first","affiliation":[]},{"given":"Dorian","family":"Larget","sequence":"additional","affiliation":[]},{"given":"Thibaut","family":"Scherrer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,12]]},"reference":[{"key":"182_CR1","unstructured":"Starting Programming with Microsoft Access, http:\/\/www.office.microsoft.com\/en-us\/access-help\/introduction-to-access-programming-HA010341717.aspx?CTT=1 (2011). Accessed 20 Nov 2011"},{"key":"182_CR2","unstructured":"Compiler and Interpreter in Microsoft Access, http:\/\/www.support.microsoft.com\/kb\/109382\/en (2012). Accessed 23 Mar 2012"},{"key":"182_CR3","unstructured":"Introduction to the Access 2007 file format, http:\/\/www.office.microsoft.com\/en-us\/access-help\/introduction-to-the-access-2010-file-format-HA010067831.aspx (2011). Accessed 2 Nov 2011"},{"key":"182_CR4","unstructured":"http:\/\/www.counterpunch.org\/2008\/09\/27\/an-israeli-trojan-horse\/ and http:\/\/www.msnbc.msn.com\/id\/8064757\/ns\/technology_and_science-security\/t\/israeli-trojan-horse-scandal-widens\/"},{"key":"182_CR5","unstructured":"Presentation of the Microsoft Access 2010 security policy, http:\/\/www.office.microsoft.com\/en-us\/access-help\/introduction-to-access-2010-security-HA010341741.aspx?CTT=1 (2012). Accessed 23 Mar 2012"},{"key":"182_CR6","unstructured":"Jonathan, D., Eric, F., Jean-Paul, F.: Office Documents: New Weapons of Cyberwarfare. Hack.lu 2010 Conference, Luxembourg, 27\u201329 October 2010"},{"key":"182_CR7","unstructured":"Harshavardhan, K.: Classification of various security techniques in databases and their comparative analysis. ArXiV Repository. http:\/\/www.arxiv.org\/abs\/1206.4124 (2012)"},{"key":"182_CR8","doi-asserted-by":"crossref","unstructured":"Palamidessi, C., Stronati, M.: Differential privacy for relational algebra: improving the sensitivity bounds via constraint systems. ArXiV Repository. http:\/\/www.arxiv.org\/abs\/1207.0872 (2012)","DOI":"10.4204\/EPTCS.85.7"},{"key":"182_CR9","unstructured":"Intended use, http:\/\/www.eicar.org\/86-0-Intended-use.html . Accessed 2 Nov 2011"},{"key":"182_CR10","unstructured":"Matt, B.: Analysis of the ILOVEYOU Worm. http:\/\/www.citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.87.8077 (2000)"},{"key":"182_CR11","unstructured":"Jonathan, D., Eric, F., Jean-Paul, F.: Perverting eMails: a new dimension in internet (in)security. In: Proceedings of the 10th ECIW conference, July 2011, Tallinn, Estonia, pp. 106\u2013112. ACI Press (2011)."},{"key":"182_CR12","unstructured":"Threading in VBA: http:\/\/www.social.msdn.microsoft.com\/Forums\/en-US\/vsto\/thread\/735c8f26-2129-4b46-8c1a-aad385cab2ed (2012). Accessed 19 Mar 2012"},{"key":"182_CR13","unstructured":"MSDN Threads, http:\/\/www.msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms68191728v=vs.8529.aspx (2012). Accessed 19 Mar 2012"},{"key":"182_CR14","unstructured":"MSDN DLLs, http:\/\/www.msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms68258928v=vs.8529.aspx (2012). Accessed 19 Mar 2012"},{"key":"182_CR15","unstructured":"Result of the IAWACS 2010 AV Evaluation Contest, http:\/\/www.cvo-lab.blogspot.fr\/2012\/08\/perseus-and-iawacs-20092010-available.html . Accessed 9 May 2010"},{"key":"182_CR16","unstructured":"Baptiste, D.: Do you still believe that nobody can make a Win 7 system become useless despite using a \u201cpowerful\u201d antivirus? http:\/\/www.cvo-lab.blogspot.fr\/2012\/08\/perseus-and-iawacs-20092010-available.html (2010)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-013-0182-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-013-0182-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-013-0182-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T19:12:20Z","timestamp":1564945940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-013-0182-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,12]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["182"],"URL":"https:\/\/doi.org\/10.1007\/s11416-013-0182-7","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,12]]}}}