{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T20:49:43Z","timestamp":1672346983020},"reference-count":20,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1989,10,1]],"date-time":"1989-10-01T00:00:00Z","timestamp":623203200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1989,10]]},"DOI":"10.1016\/0167-4048(89)90081-3","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:56:18Z","timestamp":1034344578000},"page":"517-533","source":"Crossref","is-referenced-by-count":32,"title":["SODA: A secure object-oriented database system"],"prefix":"10.1016","volume":"8","author":[{"given":"T.F.","family":"Keefe","sequence":"first","affiliation":[]},{"given":"W.T.","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"M.B.","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/0167-4048(89)90081-3_BIB1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/22890.22945","article-title":"Data model issues for object-oriented applications","author":"Banerjee","year":"1987","journal-title":"ACM Trans. Office Inform. Syst."},{"key":"10.1016\/0167-4048(89)90081-3_BIB2","series-title":"Tech. Rep. MTR-2997","article-title":"Secure computer systems: unified exposition and multics interpretations","author":"Bell","year":"1976"},{"key":"10.1016\/0167-4048(89)90081-3_BIB3","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/SECPRI.1988.8095","article-title":"A secure distributed operating system","author":"Casey","year":"1988","journal-title":"Proc. 1988 IEEE Symp. on Security and Privacy"},{"issue":"2","key":"10.1016\/0167-4048(89)90081-3_BIB4","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TSE.1987.232889","article-title":"Views for multilevel database security","volume":"SE-13","author":"Denning","year":"1987","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0167-4048(89)90081-3_BIB5","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/SP.1987.10023","article-title":"A multilevel relational data model","author":"Denning","year":"1987","journal-title":"Proc. 1987 Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(89)90081-3_BIB6","doi-asserted-by":"crossref","DOI":"10.2514\/6.1986-2771","article-title":"A practical design for multilevel security in secure database management systems","author":"Dillaway","year":"1986","journal-title":"Aerospace Security Conf."},{"issue":"1","key":"10.1016\/0167-4048(89)90081-3_BIB7","first-page":"48","article-title":"IRIS: an object-oriented database management system","volume":"5","author":"Fishman","year":"1987","journal-title":"ACM Trans. Office Inform. Syst."},{"key":"10.1016\/0167-4048(89)90081-3_BIB8","series-title":"Approaches to Prototyping","article-title":"A systematic look at prototyping","author":"Floyd","year":"1984"},{"key":"10.1016\/0167-4048(89)90081-3_BIB9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/SECPRI.1988.8100","article-title":"ASD_views","author":"Garvey","year":"1988","journal-title":"Proc. 1988 IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(89)90081-3_BIB10","series-title":"Building a Secure Computer","author":"Gasser","year":"1988"},{"key":"10.1016\/0167-4048(89)90081-3_BIB11","series-title":"SMALLTALK-80: The Language and Its Implementation","author":"Goldberg","year":"1983"},{"key":"10.1016\/0167-4048(89)90081-3_BIB12","first-page":"1","article-title":"A multilevel security model for object-oriented systems","author":"Keefe","year":"1988","journal-title":"Proc. 11th Nat. Computer Security Conf."},{"issue":"3","key":"10.1016\/0167-4048(89)90081-3_BIB13","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/2.16229","article-title":"Strategies for secure query processing","volume":"22","author":"Keefe","year":"1989","journal-title":"IEEE Computer"},{"key":"10.1016\/0167-4048(89)90081-3_BIB14","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/ACSAC.1988.113421","article-title":"Making databases secure with TRUDATA technology","author":"Knode","year":"1988","journal-title":"Proc. 4th Aerospace Computer Security Applications Conf."},{"key":"10.1016\/0167-4048(89)90081-3_BIB15","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/SECPRI.1988.8115","article-title":"A near-term design for the SeaView multilevel database system","author":"Lunt","year":"1988","journal-title":"Proc. 1988 IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(89)90081-3_BIB16","first-page":"65","article-title":"Secure distributed data views: identification of deficiencies and directions for future research","volume":"Vol. 4","author":"Lunt","year":"1989"},{"key":"10.1016\/0167-4048(89)90081-3_BIB17","series-title":"Research Directions in Object-Oriented Programming","first-page":"355","article-title":"Development and implementation of an object-oriented DBMS","author":"Maier","year":"1987"},{"key":"10.1016\/0167-4048(89)90081-3_BIB18","first-page":"56","article-title":"Information flow control in a distributed object-oriented system with statically bound object variables","author":"Mizunc","year":"1987","journal-title":"Proc. 10th NBS\/NCSC National Computer Security Conf."},{"issue":"4","key":"10.1016\/0167-4048(89)90081-3_BIB19","first-page":"40","article-title":"Object-oriented programming: themes and variations","volume":"6","author":"Stefik","year":"1986","journal-title":"AI Mag."},{"key":"10.1016\/0167-4048(89)90081-3_BIB20","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/ICCL.1988.13069","article-title":"Data security in an object-oriented environment such as Smalltalk\u201480","author":"Tosten","year":"1988","journal-title":"Proc. 1988 Int. Conf. on Computer Languages"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404889900813?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404889900813?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:53:37Z","timestamp":1554954817000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404889900813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,10]]},"references-count":20,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1989,10]]}},"alternative-id":["0167404889900813"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(89)90081-3","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1989,10]]}}}