{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:02:50Z","timestamp":1725901370553},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642311369"},{"type":"electronic","value":"9783642311376"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31137-6_52","type":"book-chapter","created":{"date-parts":[[2012,6,18]],"date-time":"2012-06-18T09:17:55Z","timestamp":1340011075000},"page":"682-697","source":"Crossref","is-referenced-by-count":1,"title":["BTA: Architecture for Reusable Business Tier Components with Access Control"],"prefix":"10.1007","author":[{"given":"\u00d3scar Mort\u00e1gua","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[]},{"given":"Maribel Yasmina","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","first-page":"377","volume-title":"Advances in Database Programming Languages","author":"M. David","year":"1990","unstructured":"David, M.: Representing database programs as objects. In: Bancilhon, F., Buneman, P. (eds.) Advances in Database Programming Languages, pp. 377\u2013386. ACM, N.Y (1990)"},{"key":"52_CR2","unstructured":"Cook, W., Ibrahim, A.: Integrating programming languages and databases: what is the problem? (May 2011), \n                    \n                      http:\/\/www.odbms.org\/experts.aspx#article10"},{"key":"52_CR3","unstructured":"Heineman, G.T., Councill, W.T.: Component-Based Software Engineering: Putting the Pieces Together, 1st edn. Addison-Wesley (2001)"},{"key":"52_CR4","volume-title":"JDBC Recipes: A Problem-Solution Approach","author":"M. Parsian","year":"2005","unstructured":"Parsian, M.: JDBC Recipes: A Problem-Solution Approach. Apress, NY (2005)"},{"key":"52_CR5","volume-title":"ACM SIGMOD International Conference on Management of Data","author":"M. Erik","year":"2006","unstructured":"Erik, M., Brian, B., Gavin, B.: LINQ: Reconciling Object, Relations and XML in the.NET framework. In: ACM SIGMOD International Conference on Management of Data. ACM, Chicago (2006)"},{"key":"52_CR6","unstructured":"Yang, D.: Java Persistence with JPA2010. Outskirts Press"},{"key":"52_CR7","unstructured":"Oracle. Oracle9i Database Administrator\u2019s Guide, Release 2 (9.2). (December 2011), \n                    \n                      http:\/\/docs.oracle.com\/cd\/B10501_01\/server.920\/a96521\/toc.html"},{"key":"52_CR8","unstructured":"Sack, J.: SQL Server 2008 - Transact-SQL Recipes. In: Gennick, J. (ed.). Apress (2008)"},{"key":"52_CR9","unstructured":"Keller, W.: Mapping Objects to Tables - A Pattern Language. In: European Conference on Pattern Languages of Programming Conference (EuroPLoP), Irsse, Germany (1997)"},{"key":"52_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/11877028","volume-title":"Generative and Transformation Techniques in Software Engineering","author":"R. Lammel","year":"2006","unstructured":"Lammel, R., Meijer, E.: Mappings Make data Processing Go \u2019Round: An Inter-paradigmatic Mapping Tutorial. In: Generative and Transformation Techniques in Software Engineering. Springer, Braga (2006)"},{"key":"52_CR11","unstructured":"Christian, B., Gavin, K.: Hibernate in Action. Manning Publications Co. (2004)"},{"key":"52_CR12","unstructured":"Oracle. Oracle TopLink (October 2011), \n                    \n                      http:\/\/www.oracle.com\/technetwork\/middleware\/toplink\/overview\/index.html"},{"key":"52_CR13","unstructured":"Microsoft. Microsoft Open Database Connectivity (October 2011), \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/library\/ms710252VS.85.aspx"},{"key":"52_CR14","volume-title":"ADO.NET 4 Database Programming with C# 2010","author":"G. Mead","year":"2011","unstructured":"Mead, G., Boehm, A.: ADO.NET 4 Database Programming with C# 2010. Mike Murach & Associates, Inc., USA (2011)"},{"issue":"5","key":"52_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/122215.122217","volume":"XI","author":"J.W. Moore","year":"1991","unstructured":"Moore, J.W.: The ANSI binding of SQL to ADA. Ada Letters\u00a0XI(5), 47\u201361 (1991)","journal-title":"Ada Letters"},{"key":"52_CR16","unstructured":"Eisenberg, A., Melton, J.: Part 1: SQL Routines using the Java (TM) Programming Language. In: International Committee for Information Technolgy American National Standard for Information for Technology Database Languages, SQLJ 1999 (1999)"},{"key":"52_CR17","volume-title":"27th International Conference on Software Engineering","author":"R.C. William","year":"2005","unstructured":"William, R.C., Siddhartha, R.: Safe query objects: statically typed objects as remotely executable queries. In: 27th International Conference on Software Engineering. ACM, St. Louis (2005)"},{"key":"52_CR18","volume-title":"27th International Conference on Software Engineering","author":"A.M. Russell","year":"2005","unstructured":"Russell, A.M., Ingolf, H.K.: SQL DOM: compile time checking of dynamic SQL statements. In: 27th International Conference on Software Engineering. ACM, St. Louis (2005)"},{"key":"52_CR19","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1145\/1559845.1559875","volume-title":"Proceedings of the 35th SIGMOD International Conference on Management of Data","author":"B.J. Corcoran","year":"2009","unstructured":"Corcoran, B.J., Swamy, N., Hicks, M.: Cross-tier, Label-based Security Enforcement for Web Applications. In: Proceedings of the 35th SIGMOD International Conference on Management of Data, pp. 269\u2013282. ACM, Providence (2009)"},{"key":"52_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-540-74792-5_12","volume-title":"Formal Methods for Components and Objects","author":"E. Cooper","year":"2007","unstructured":"Cooper, E., Lindley, S., Yallop, J.: Links: Web Programming Without Tiers. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2006. LNCS, vol.\u00a04709, pp. 266\u2013296. Springer, Heidelberg (2007)"},{"key":"52_CR21","unstructured":"Zhang, D., et al. Jif: Java + information flow (December 2011), \n                    \n                      http:\/\/www.cs.cornell.edu\/jif\/"},{"key":"52_CR22","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1145\/1007568.1007631","volume-title":"Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data","author":"S. Rizvi","year":"2004","unstructured":"Rizvi, S., et al.: Extending Query Rewriting Techniques for Fine-grained Access Control. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 551\u2013562. ACM, Paris (2004)"},{"key":"52_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C. Dwork","year":"2008","unstructured":"Dwork, C.: Differential Privacy: A Survey of Results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol.\u00a04978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"issue":"9","key":"52_CR24","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1810891.1810916","volume":"53","author":"F. McSherry","year":"2010","unstructured":"McSherry, F.: Privacy Integrated Queries: An Extensible Platform for Privacy-preserving Data Analysis. Commun. ACM\u00a053(9), 89\u201397 (2010)","journal-title":"Commun. ACM"},{"key":"52_CR25","doi-asserted-by":"crossref","unstructured":"Gregor Kiczales, J.L., Mendhekar, A., Maeda, C., Videira, C.L., Loingtier, J.-M., Irwin, J.: Aspect-Oriented Programming. In: ECOOP, Jyvaskyla, Finland (1997)","DOI":"10.1007\/BFb0053381"},{"key":"52_CR26","volume-title":"AspectJ in Action: Practical Aspect-Oriented Programming","author":"R. Laddad","year":"2003","unstructured":"Laddad, R.: AspectJ in Action: Practical Aspect-Oriented Programming. Manning Publications, Greenwich (2003)"},{"key":"52_CR27","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1145\/1141277.1141655","volume-title":"Proceedings of the 2006 ACM Symposium on Applied Computing","author":"J. Fabry","year":"2006","unstructured":"Fabry, J., D\u2019Hondt, T.: KALA: Kernel Aspect Language for Advanced Transactions. In: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 1615\u20131620. ACM, Dijon (2006)"},{"key":"52_CR28","unstructured":"Dinkelaker, T.: AO4SQL: Towards an Aspect-Oriented Extension for SQL. In: Proceedings of the 8th Workshop on Reflection, AOP and Meta-Data for Software Evolution (RAMSE 2011), Zurich, Switzerland (2011)"},{"key":"52_CR29","unstructured":"Oracle. Interface PreparedStatement (December 2011), \n                    \n                      http:\/\/download.oracle.com\/javase\/6\/docs\/api\/java\/sql\/PreparedStatement.html"},{"issue":"9","key":"52_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R.S. Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access Control: Principle and Practice. IEEE Communications Magazine\u00a032(9), 40\u201348 (1994)","journal-title":"IEEE Communications Magazine"},{"key":"52_CR31","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/115790.115796","volume-title":"Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data","author":"S. Jajodia","year":"1991","unstructured":"Jajodia, S., Sandhu, R.: Toward a Multilevel Secure Relational Data Model. In: Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data, pp. 50\u201359. ACM, Denver (1991)"},{"issue":"6","key":"52_CR32","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/32.55088","volume":"16","author":"T.F. Lunt","year":"1990","unstructured":"Lunt, T.F., et al.: The SeaView Security Model. IEEE Transactions on Software Engineering\u00a016(6), 593\u2013607 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"52_CR33","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/344287.344301","volume-title":"Proceedings of the fifth ACM Workshop on Role-based Access Control","author":"R. Sandhu","year":"2000","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-based Access Control: Towards a Unified Standard. In: Proceedings of the fifth ACM Workshop on Role-based Access Control, pp. 47\u201363. ACM, Berlin (2000)"},{"issue":"4","key":"52_CR34","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/950191.950194","volume":"6","author":"S. Barker","year":"2003","unstructured":"Barker, S., Stuckey, P.J.: Flexible Access Control Policy Specification with Constraint Logic Programming. ACM Transactions on Information and System Security\u00a06(4), 501\u2013546 (2003)","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31137-6_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:47:29Z","timestamp":1620128849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31137-6_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642311369","9783642311376"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31137-6_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}