{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,2]],"date-time":"2023-04-02T20:50:06Z","timestamp":1680468606650},"reference-count":43,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1992,3,1]],"date-time":"1992-03-01T00:00:00Z","timestamp":699408000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1992,3]]},"DOI":"10.1016\/0167-4048(92)90220-l","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:56:18Z","timestamp":1034344578000},"page":"41-56","source":"Crossref","is-referenced-by-count":10,"title":["Security in database systems: A research perspective"],"prefix":"10.1016","volume":"11","author":[{"given":"Teresa F.","family":"Lunt","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(92)90220-L_BIB1","doi-asserted-by":"crossref","DOI":"10.1109\/RISP.1990.63844","article-title":"Naming and grouping privileges to simplify security management in large databases","author":"Baldwin","year":"1990","journal-title":"Proc. 1990 IEEE Symp. on Research in Security and Privacy"},{"key":"10.1016\/0167-4048(92)90220-L_BIB2","series-title":"EHDM Specification and Verification System Version 4.1: User's Guide","year":"1988"},{"key":"10.1016\/0167-4048(92)90220-L_BIB3","series-title":"EHDM Specification and Verification System Version 5.0: Description of the EHDM Specification Language","year":"1990"},{"key":"10.1016\/0167-4048(92)90220-L_BIB4","series-title":"EHDM Specification and Verification System: Version 5.1 Suplement to User's and Language Manuals","year":"1990"},{"key":"10.1016\/0167-4048(92)90220-L_BIB5","article-title":"EHDM verification environment: An overview","author":"Crow","year":"1988","journal-title":"Proc. 11th National Computer Security Conf."},{"key":"10.1016\/0167-4048(92)90220-L_BIB6","series-title":"Cryptography and Data Security","author":"Denning","year":"1982"},{"key":"10.1016\/0167-4048(92)90220-L_BIB7","doi-asserted-by":"crossref","DOI":"10.1109\/SP.1987.10023","article-title":"A multilevel relational data model","author":"Denning","year":"1987","journal-title":"Proc. 1987 IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(92)90220-L_BIB8","series-title":"Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD","year":"1985"},{"key":"10.1016\/0167-4048(92)90220-L_BIB9","article-title":"Issues in distributed database security","author":"Downing","year":"1989","journal-title":"Proc. 5th Aerospace Computer Security Conf."},{"key":"10.1016\/0167-4048(92)90220-L_BIB10","doi-asserted-by":"crossref","DOI":"10.1109\/SP.1985.10014","article-title":"Issues in discretionary access control","author":"Downs","year":"1985","journal-title":"Proc. 1985 IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(92)90220-L_BIB11","doi-asserted-by":"crossref","DOI":"10.1109\/ACSAC.1988.113419","article-title":"Some results from the entity\/relationship multilevel secure DBMS project","author":"Gajnak","year":"1988","journal-title":"Proc. Fourth Aerospace Computer Security Applications Conf."},{"key":"10.1016\/0167-4048(92)90220-L_BIB12","series-title":"Proc. EISS Workshop on Database Security","article-title":"Multilevel security for knowledge-based systems","author":"Garvey","year":"1990"},{"key":"10.1016\/0167-4048(92)90220-L_BIB13","doi-asserted-by":"crossref","DOI":"10.1109\/CSFW.1991.151578","article-title":"Abductive and approximate reasoning models for characterizing inference channels","author":"Garvey","year":"1991","journal-title":"Proc. Fourth Workshop on the Foundations of Computer Security"},{"key":"10.1016\/0167-4048(92)90220-L_BIB14","article-title":"Protection: Principes and practice","volume":"Vol. 40","author":"Graham","year":"1972"},{"key":"10.1016\/0167-4048(92)90220-L_BIB15","doi-asserted-by":"crossref","DOI":"10.1109\/SP.1982.10021","article-title":"A preliminary naval surveillance DBMS security model","author":"Graubart","year":"1982","journal-title":"Proc. 1982 IEEE Symp. on Security and Privacy"},{"issue":"3","key":"10.1016\/0167-4048(92)90220-L_BIB16","doi-asserted-by":"crossref","DOI":"10.1145\/320473.320482","article-title":"An authorization mechanism for a relational database system","volume":"1","author":"Griffiths","year":"1976","journal-title":"ACM Trans. Database Systems"},{"key":"10.1016\/0167-4048(92)90220-L_BIB17","article-title":"DBMS trusted computing base taxonomy","author":"Hinke","year":"1989","journal-title":"Proc. Third IFIP Workshop on Database Security"},{"key":"10.1016\/0167-4048(92)90220-L_BIB18","article-title":"A1 secure DBMS design","author":"Hinke","year":"1988","journal-title":"Proc. 11th National Computer Security Conf."},{"key":"10.1016\/0167-4048(92)90220-L_BIB19","series-title":"Technical Report RADC-TR-75-266","article-title":"Security data management system","author":"Hinke","year":"1975"},{"key":"10.1016\/0167-4048(92)90220-L_BIB20","doi-asserted-by":"crossref","DOI":"10.1109\/RISP.1990.63840","article-title":"Integrating an object-oriented data model with multilevel security","author":"Jajodia","year":"1990","journal-title":"Proc. 1990 IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(92)90220-L_BIB21","series-title":"Technical Report TR89-12","article-title":"SODA: A secure object-oriented database system","author":"Keefe","year":"1989"},{"key":"10.1016\/0167-4048(92)90220-L_BIB22","doi-asserted-by":"crossref","DOI":"10.1109\/CSFW.1989.40584","article-title":"Formal policies for trusted processes","author":"Landauer","year":"1989","journal-title":"Proc. Second Workshop on the Foundations of Computer Security"},{"issue":"3","key":"10.1016\/0167-4048(92)90220-L_BIB23","doi-asserted-by":"crossref","DOI":"10.1145\/989.991","article-title":"A security model for military message systems","volume":"2","author":"Landwehr","year":"1984","journal-title":"ACM Trans. Comput. Syst."},{"key":"10.1016\/0167-4048(92)90220-L_BIB24","series-title":"Database Security II: Status and Prospects","article-title":"Access control policies for database systems","author":"Lunt","year":"1989"},{"key":"10.1016\/0167-4048(92)90220-L_BIB25","doi-asserted-by":"crossref","DOI":"10.1016\/0167-4048(89)90038-2","article-title":"Access control policies: Some unanswered questions","author":"Lunt","year":"1989","journal-title":"Comput. Secur."},{"key":"10.1016\/0167-4048(92)90220-L_BIB26","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.1989.36284","article-title":"Aggregation and inference: Facts and fallacies","author":"Lunt","year":"1989","journal-title":"Proc. 1989 IEEE Symp. on Research in Security and Privacy"},{"key":"10.1016\/0167-4048(92)90220-L_BIB27","series-title":"Database Security III: Status and Prospects","article-title":"Multilevel security for object-oriented database systems","author":"Lunt","year":"1990"},{"key":"10.1016\/0167-4048(92)90220-L_BIB28","article-title":"The true meaning of polyinstantiation: Proposal for an operational semantics for a multilevel relational database system","author":"Lunt","year":"1990","journal-title":"Proc. Third RADC Database Security Workshop"},{"key":"10.1016\/0167-4048(92)90220-L_BIB29","doi-asserted-by":"crossref","DOI":"10.1109\/32.55088","article-title":"The SeaView security model","author":"Lunt","year":"1990","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0167-4048(92)90220-L_BIB30","article-title":"The SeaView secure database system: A progress report","author":"Lunt","year":"1990","journal-title":"Proc. 1990 European Symposium on Research in Computer Security"},{"key":"10.1016\/0167-4048(92)90220-L_BIB31","series-title":"Proc. 4th IFIP WG11.3 Workshop on Database Security","article-title":"Update semantics for a multilevel relational database system","author":"Lunt","year":"1990"},{"key":"10.1016\/0167-4048(92)90220-L_BIB32","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.1988.8115","article-title":"A near-term design for the SeaView multilevel database system","author":"Lunt","year":"1988","journal-title":"Proc. 1988 IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(92)90220-L_BIB33","doi-asserted-by":"crossref","DOI":"10.1109\/ACSAC.1988.113420","article-title":"Toward a multilevel relational data language","author":"Lunt","year":"1988","journal-title":"Proc. Fourth Aerospace Computer Security Applications Conf."},{"key":"10.1016\/0167-4048(92)90220-L_BIB34","doi-asserted-by":"crossref","DOI":"10.1109\/CSAC.1990.143762","article-title":"Single-level multiversion schedulers for multilevel secure database systems","author":"Maimone","year":"1990","journal-title":"Proc. Sixth Annual Computer Security Applications Conf."},{"key":"10.1016\/0167-4048(92)90220-L_BIB35","series-title":"Technical Report SRI-CSL-90-04","article-title":"Secure knowledge-based systems","author":"Millen","year":"1989"},{"key":"10.1016\/0167-4048(92)90220-L_BIB36","article-title":"Sybase secure dataserver: A solution to the multilevel secure dbms problem","author":"Rougeau","year":"1987","journal-title":"Proc. 10th National Computer Security Conf."},{"key":"10.1016\/0167-4048(92)90220-L_BIB37","doi-asserted-by":"crossref","DOI":"10.1109\/SP.1984.10024","article-title":"Toward an understanding of extensible architectures for evaluated trusted computer system products","author":"Schaefer","year":"1984","journal-title":"Proc. 1984 IEEE Symp. on Security and Privacy"},{"key":"10.1016\/0167-4048(92)90220-L_BIB38","article-title":"TCB subsetting for incremental evaluation","author":"Shockley","year":"1987","journal-title":"Proc. Third AIAA Conf. on Computer Security"},{"issue":"2","key":"10.1016\/0167-4048(92)90220-L_BIB39","doi-asserted-by":"crossref","DOI":"10.1109\/69.54719","article-title":"Design of Idv: A multilevel secure relational database management system","volume":"2","author":"Stachour","year":"1990","journal-title":"IEEE Trans. Knowledge Data Eng."},{"key":"10.1016\/0167-4048(92)90220-L_BIB40","series-title":"Introduction to EHDM","author":"von Henke","year":"1988"},{"key":"10.1016\/0167-4048(92)90220-L_BIB41_1","series-title":"Formal Semantics of EHDM","author":"von Henke","year":"1990"},{"key":"10.1016\/0167-4048(92)90220-L_BIB42","doi-asserted-by":"crossref","DOI":"10.1109\/CSFW.1989.40595","article-title":"The SeaView verification","author":"Whitehurst","year":"1989","journal-title":"Proc. Second Workshop on the Foundations of Computer Security"},{"key":"10.1016\/0167-4048(92)90220-L_BIB43","article-title":"The SeaView verification effort","author":"Whitehurst","year":"1989","journal-title":"Proc. 12th National Computer Security Conf."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489290220L?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489290220L?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:56:08Z","timestamp":1554954968000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489290220L"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,3]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1992,3]]}},"alternative-id":["016740489290220L"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(92)90220-l","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1992,3]]}}}