{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T03:13:04Z","timestamp":1648869184388},"reference-count":35,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1983,1,1]],"date-time":"1983-01-01T00:00:00Z","timestamp":410227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1983,1]]},"DOI":"10.1016\/0167-4048(83)90034-2","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T14:05:22Z","timestamp":1034345122000},"page":"49-62","source":"Crossref","is-referenced-by-count":2,"title":["Towards a new approach to secure database design"],"prefix":"10.1016","volume":"2","author":[{"given":"U.","family":"Bussolati","sequence":"first","affiliation":[]},{"given":"G.","family":"Martella","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"n. 1","key":"10.1016\/0167-4048(83)90034-2_BIB1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0306-4379(81)90014-4","article-title":"Data Base Security: System Architecture","volume":"vol. 6","author":"Hartson","year":"1981","journal-title":"Information Systems"},{"key":"10.1016\/0167-4048(83)90034-2_BIB2","series-title":"The Systems Programming Series","article-title":"Database Security and Integrity","author":"Fernandez","year":"1981"},{"key":"10.1016\/0167-4048(83)90034-2_BIB3","year":"1980"},{"key":"10.1016\/0167-4048(83)90034-2_BIB4","first-page":"437","article-title":"Protection","author":"Lampson","year":"1971","journal-title":"Proc. 5th Annual Princeton Conf. on Info. Sciences and Systs."},{"key":"10.1016\/0167-4048(83)90034-2_BIB5","first-page":"417","article-title":"Protection: Principles and practice","volume":"40","author":"Graham","year":"1972"},{"issue":"n. 2","key":"10.1016\/0167-4048(83)90034-2_BIB6","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/362007.362015","article-title":"A Formal System for Information Retrieval from Files","volume":"vol. 13","author":"Hsiao","year":"1970","journal-title":"Comm. ACM"},{"key":"10.1016\/0167-4048(83)90034-2_BIB7","series-title":"Ph.D. dissertation","article-title":"A Model for Data Secure System","author":"McCauley","year":"1975"},{"key":"10.1016\/0167-4048(83)90034-2_BIB8","first-page":"23","article-title":"An Authorization Model for a Shared Data Base","author":"Fernandez","year":"1975","journal-title":"Proc. ACM SIGMOD Int. Conf. on Management of Data"},{"key":"10.1016\/0167-4048(83)90034-2_BIB9","first-page":"27","article-title":"A Semantic Model for Data Base Protection Languages","author":"Hartson","year":"1975","journal-title":"Proc. Int. Conf. on Very Large Data Base"},{"issue":"8","key":"10.1016\/0167-4048(83)90034-2_BIB10","doi-asserted-by":"crossref","DOI":"10.1145\/360303.360333","article-title":"Protection in Operating Systems","volume":"19","author":"Harrison","year":"1976","journal-title":"Comm. ACM"},{"key":"10.1016\/0167-4048(83)90034-2_BIB11","article-title":"A Linear Time Algorithm for Deciding Security","author":"Jones","year":"1976","journal-title":"Foundations of Computer Science"},{"issue":"3","key":"10.1016\/0167-4048(83)90034-2_BIB12","doi-asserted-by":"crossref","DOI":"10.1145\/320473.320482","article-title":"An Authorization Mechanism for a Relational Database System","volume":"1","author":"Griffiths","year":"1976","journal-title":"ACM TODS"},{"key":"10.1016\/0167-4048(83)90034-2_BIB13","article-title":"An Authorization Mechanism for a Data Base","author":"Arditi","year":"1978"},{"key":"10.1016\/0167-4048(83)90034-2_BIB14","article-title":"An Integrated Approach to Logical Data Base Design","author":"Yao","year":"1978","journal-title":"N.Y.U. Symposium on Data Base Design"},{"key":"10.1016\/0167-4048(83)90034-2_BIB15","article-title":"New Orleans Data Base Design Workshop Report","author":"Lum","year":"1978","journal-title":"IBM Rept."},{"key":"10.1016\/0167-4048(83)90034-2_BIB16","unstructured":"U. Bussolati, G. Martella, \u201cSecurity\u201d, Advances in Personal Computer Management, Chapter 12, Heyden, (to appear)."},{"key":"10.1016\/0167-4048(83)90034-2_BIB17","doi-asserted-by":"crossref","DOI":"10.1145\/320434.320440","article-title":"The Entity-Relationship Model: Toward a Unified View of Data","author":"Chen","year":"1976","journal-title":"ACM TODS"},{"key":"10.1016\/0167-4048(83)90034-2_BIB18","article-title":"The Semantic Data Model: a Modelling Mechanism for Data Base Applications","author":"Hammer","year":"1978","journal-title":"SIGMOD ACM"},{"key":"10.1016\/0167-4048(83)90034-2_BIB19","article-title":"A Language Facility for Designing Interactive Data Base Intensive Application","author":"Mylopoulos","year":"1978","journal-title":"ACM SIGMOD"},{"key":"10.1016\/0167-4048(83)90034-2_BIB20","doi-asserted-by":"crossref","DOI":"10.1145\/320544.320546","article-title":"Data Base Abstractions: Aggregation and Generalization","author":"Smith","year":"1977","journal-title":"ACM TODS"},{"key":"10.1016\/0167-4048(83)90034-2_BIB21","article-title":"Data Model Integration Using The Structural Model","author":"EL-Masri","year":"1979","journal-title":"ACM SIGMOD"},{"key":"10.1016\/0167-4048(83)90034-2_BIB22","article-title":"The Functional Data Model and the Data Language Daplex","author":"Shipman","year":"1979","journal-title":"ACM SIGMOD"},{"key":"10.1016\/0167-4048(83)90034-2_BIB23","series-title":"Proceed. of International Conference on Data Bases","article-title":"The Role Data Model Approach to Data Structures","author":"Bachman","year":"1980"},{"key":"10.1016\/0167-4048(83)90034-2_BIB24","article-title":"The Functional Dependency Model for Logical Data Base Design","author":"Hansel","year":"1979","journal-title":"Proc. 5th International Conf. on Very Large Data Bases"},{"key":"10.1016\/0167-4048(83)90034-2_BIB25","unstructured":"U. Bussolati, M.G. Fugini, G. Martella, \u201cAn Entity-Action Model for Conceptual Design of Security Information\u201d, Dipartimento di Elettronica, Politecnico di Milano, Internal Report N. 82-10."},{"issue":"n. 6","key":"10.1016\/0167-4048(83)90034-2_BIB26","doi-asserted-by":"crossref","DOI":"10.1145\/362384.362685","article-title":"A Relational Model of Data for large Shared Data Banks","volume":"Vol. 13","author":"Codd","year":"1970","journal-title":"Comm. ACM"},{"key":"10.1016\/0167-4048(83)90034-2_BIB27","series-title":"Proc. of 7th Int. Conf. on Very Large Data Bases (VLDB)","article-title":"A Data Base Approach to Modelling and Managing of Security Information","author":"Bussolati","year":"1981"},{"issue":"n. 21","key":"10.1016\/0167-4048(83)90034-2_BIB28","first-page":"140","article-title":"Interim Report","volume":"7","year":"1975","journal-title":"FDT Bulletin of ACM SIGMOD"},{"key":"10.1016\/0167-4048(83)90034-2_BIB29","series-title":"Proc. of Convention Informatique Latine, CIL 81","first-page":"216","article-title":"Managing Data Privacy in Database Management Systems","author":"Bussolati","year":"1981"},{"issue":"n. 3","key":"10.1016\/0167-4048(83)90034-2_BIB30","doi-asserted-by":"crossref","DOI":"10.1016\/0306-4379(82)90013-8","article-title":"Data Security Management in Distributed Data Bases","volume":"Vol. 7","author":"Bussolati","year":"1982","journal-title":"Information Systems"},{"key":"10.1016\/0167-4048(83)90034-2_BIB31","first-page":"305","article-title":"Treating Data Privacy in Distributed Systems","volume":"4","author":"Bussolati","year":"1981"},{"key":"10.1016\/0167-4048(83)90034-2_BIB32","article-title":"Binary Logical Associations in Data Modelling","author":"Bracchi","year":"1976"},{"key":"10.1016\/0167-4048(83)90034-2_BIB33","doi-asserted-by":"crossref","DOI":"10.1109\/VLDB.1979.718141","article-title":"Interactive Specification and Formal Verification of User's Views in Data Base Design","author":"Baldissera","year":"1979","journal-title":"Proc. 5th International Conference on Very Large Data Bases"},{"key":"10.1016\/0167-4048(83)90034-2_BIB34","first-page":"288","article-title":"On Designing a Security Management System for Distributed Data Bases","volume":"80","author":"Bussolati","year":"1980"},{"key":"10.1016\/0167-4048(83)90034-2_BIB35","series-title":"ACM SIGMOD","article-title":"Formal Definitions of Mapping in a Data Base","author":"Paolini","year":"1977"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404883900342?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404883900342?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:26:20Z","timestamp":1554953180000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404883900342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1983,1]]}},"alternative-id":["0167404883900342"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(83)90034-2","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1983,1]]}}}