{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T22:25:08Z","timestamp":1743459908867},"reference-count":29,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1997,8,1]],"date-time":"1997-08-01T00:00:00Z","timestamp":870393600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[1997,8]]},"DOI":"10.1016\/s0169-023x(96)00054-7","type":"journal-article","created":{"date-parts":[[2003,5,19]],"date-time":"2003-05-19T12:52:26Z","timestamp":1053348746000},"page":"97-117","source":"Crossref","is-referenced-by-count":7,"title":["A multi-level view model for secure object-oriented databases"],"prefix":"10.1016","volume":"23","author":[{"given":"Ahmad","family":"Baraani-Dastjerdi","sequence":"first","affiliation":[]},{"given":"Josef","family":"Pieprzyk","sequence":"additional","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-023X(96)00054-7_BIB1","series-title":"Proc. 1991 ACM SIGMOD Int. Conf. on Management of Data","first-page":"238","article-title":"Objects and Views","author":"Abiteboul","year":"1991"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB2","first-page":"503","article-title":"A Model of Authorization for Object-Oriented Databases based on Object Views","author":"Baraani-Dastjerdi","year":"1995"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB3","article-title":"Secure Computer System: Unified Exposition and Multics Interpretation","author":"Bell","year":"1975"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB4","first-page":"136","article-title":"A View Mechanism for Object-Oriented Databases","author":"Bertino","year":"1992"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB5","first-page":"415","article-title":"Modeling Multilevel Entities Using Single Level Objects","author":"Bertino","year":"1994"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB6","first-page":"375","article-title":"Decomposition of Multilevel Objects in an Object-Oriented Database","author":"Boulahia-Cuppens","year":"1994"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB7","series-title":"Proc. 1983 IEEE Symp. on Security and Privacy","first-page":"4","article-title":"Using Views in A Multilevel Secure Database Management System","author":"Claybrook","year":"1983"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB8","series-title":"Database Security V","first-page":"315","article-title":"A Model Logic Framework to Solve Aggregation Problems","author":"Cuppens","year":"1992"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB9","article-title":"Queries and views in an Object-Oriented Data Model","volume":"Vol. 2","author":"Dayal","year":"1989"},{"issue":"2","key":"10.1016\/S0169-023X(96)00054-7_BIB10","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TSE.1987.232889","article-title":"Views for Multilevel Database Security","volume":"SE-13","author":"Denning","year":"1987","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0169-023X(96)00054-7_BIB11","series-title":"Proc. Symp. on Computer Security and Privacy","first-page":"220","article-title":"A Multilevel Relational Data Model","author":"Denning","year":"1987"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MC.1983.1654444","article-title":"Inference Control for Statistical Databases","volume":"16","author":"Denning","year":"1983","journal-title":"Computer"},{"issue":"3","key":"10.1016\/S0169-023X(96)00054-7_BIB13","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/0167-4048(87)90105-2","article-title":"Multilevel Security in Database Management Systems","volume":"6","author":"Dwyer","year":"1987","journal-title":"Computers & Security"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB14","doi-asserted-by":"crossref","unstructured":"G.E. Gajnak, Some Results from the Entity\/Relationship Multilevel Secure DBMS Project, in T.F. Lunt (ed.), Discussions of topics presented at a Workshop held at the Vallombrosa, Conf. and Retreat Centre, Menlo Park, CA, May 1988, Research Directions in Database Security (Springer) 173\u2013190.","DOI":"10.1109\/ACSAC.1988.113419"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB15","series-title":"Proc. 6th Data Engineering Conf.","first-page":"86","article-title":"Object Views: Extending the Vision","author":"Heiler","year":"1990"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB16","series-title":"Database Security VI","first-page":"179","article-title":"AERIE: An Inference Modeling and Detection Approach for Databases","author":"Hinke","year":"1993"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB17","first-page":"76","author":"Jajodia","year":"1990"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB18","series-title":"Database Security II","first-page":"211","article-title":"Prototyping the SODA Secrity Model","author":"Keefe","year":"1990"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB19","series-title":"Database Security VI","first-page":"317","article-title":"Inference secure Multilevel Databases","author":"Lin","year":"1993"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB20","series-title":"Database Security III","first-page":"199","article-title":"Multilevel Secrity for Object-Database Systems","author":"Lunt","year":"1990"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB21","series-title":"Discussions of topics presented at a Workshop held at the Vallombrosa, Conf. and Retreat Centre","first-page":"2","article-title":"Sea View","author":"Lung","year":"1992"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB22","series-title":"Proc. IEEE Computer Society Symp. on Research in Security and Privacy","first-page":"260","article-title":"Security for Object-Oriented Database Systems","author":"Millen","year":"1992"},{"issue":"1","key":"10.1016\/S0169-023X(96)00054-7_BIB23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/174638.174640","article-title":"A Taxomony for Secure Object-Oriented Databases","volume":"19","author":"Olivier","year":"1993","journal-title":"ACM Trans. Database Syst."},{"key":"10.1016\/S0169-023X(96)00054-7_BIB24","first-page":"189","article-title":"Updatable Views in Object-Oriented Databases","author":"Scholl","year":"1991"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB25","series-title":"Proc. Fourth Aerospace Computer Security Applications Conf.","article-title":"Identifying and Representing the Security Semantics of an Application","author":"Smith","year":"1988"},{"issue":"2","key":"10.1016\/S0169-023X(96)00054-7_BIB26","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/69.54719","article-title":"Design of LDV: A Multilevel Secure Relational Database Management System","volume":"2","author":"Stachour","year":"1990","journal-title":"IEEE Trans. Knowledge Data Eng."},{"issue":"6","key":"10.1016\/S0169-023X(96)00054-7_BIB27","article-title":"Security Checking in Relational Database Management system Augmented with inference Engines","volume":"6","author":"Turaisingham","year":"1987","journal-title":"Computers & Security"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB28","series-title":"Proc. Int. Conf. on Object-Oriented Programming Systems, Languages and Applications (OOPSLA)","first-page":"203","article-title":"Mandatory Security in Object-Oriented Database Systems","author":"Thuraisingham","year":"1989"},{"key":"10.1016\/S0169-023X(96)00054-7_BIB29","series-title":"Proc. Symp. on Computer Security and Privacy","article-title":"Views as the Secrity Objects in a Multilevel Secure Relational Database Management System","author":"Wilson","year":"1988"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X96000547?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X96000547?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T19:53:45Z","timestamp":1556654025000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X96000547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,8]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1997,8]]}},"alternative-id":["S0169023X96000547"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(96)00054-7","relation":{},"ISSN":["0169-023X"],"issn-type":[{"value":"0169-023X","type":"print"}],"subject":[],"published":{"date-parts":[[1997,8]]}}}