{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T21:33:29Z","timestamp":1726522409814},"reference-count":24,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1999,7,1]],"date-time":"1999-07-01T00:00:00Z","timestamp":930787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems"],"published-print":{"date-parts":[[1999,7]]},"DOI":"10.1016\/s0306-4379(99)00023-x","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T18:22:28Z","timestamp":1027621348000},"page":"377-400","source":"Crossref","is-referenced-by-count":14,"title":["A belief-consistent multilevel secure relational data model"],"prefix":"10.1016","volume":"24","author":[{"given":"Nenad","family":"Jukic","sequence":"first","affiliation":[]},{"given":"Susan V.","family":"Vrbsky","sequence":"additional","affiliation":[]},{"given":"Allen","family":"Parrish","sequence":"additional","affiliation":[]},{"given":"Brandon","family":"Dixon","sequence":"additional","affiliation":[]},{"given":"Boris","family":"Jukic","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"1996","author":"Abrams","key":"10.1016\/S0306-4379(99)00023-X_BIB1"},{"article-title":"Secure Computer Systems: Mathematical Foundations and Model","year":"1974","author":"Bell","key":"10.1016\/S0306-4379(99)00023-X_BIB2"},{"year":"1994","author":"Castano","key":"10.1016\/S0306-4379(99)00023-X_BIB3"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB4","series-title":"Proceedings IEEE Symposium on Security and Privacy","first-page":"218","article-title":"The sea view security model","author":"Denning","year":"1988"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB5","series-title":"Proceedings IEEE Symposium on Security and Privacy","first-page":"220","article-title":"A multilevel relational data model","author":"Denning","year":"1987"},{"year":"1982","author":"Denning","key":"10.1016\/S0306-4379(99)00023-X_BIB6"},{"issue":"5","key":"10.1016\/S0306-4379(99)00023-X_BIB7","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/69.469837","article-title":"Enriching the expressive power of security labels","volume":"7","author":"Gong","year":"1995","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"10.1016\/S0306-4379(99)00023-X_BIB8","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1145\/320473.320482","article-title":"An authorization mechanism for a relational database systems","volume":"1","author":"Griffiths","year":"1976","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB9","series-title":"Database Security IV: Status and Prospects","first-page":"265","article-title":"The LDV Secure Relational DBMS Model","author":"Haigh","year":"1991"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB10","series-title":"Proceedings ACM SIGMOD","first-page":"50","article-title":"Toward a multilevel secure relational data model","author":"Jajodia","year":"1991"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB11","series-title":"Proceedings IEEE Symposium on Security and Privacy","first-page":"104","article-title":"Polyinstantiation integrity in multilevel relations","author":"Jajodia","year":"1990"},{"article-title":"A Multilevel Secure Relational Model Based on the Semantics of All Visible Information","year":"1997","author":"Jukic","key":"10.1016\/S0306-4379(99)00023-X_BIB12"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB13","series-title":"Proceedings 20th International Conference on Information Technology Interfaces","first-page":"335","article-title":"A belief-consistent multilevel secure database through active rules","author":"Jukic","year":"1998"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB14","series-title":"Proceedings IASTED International Conference on Artificial Intelligence and Soft Computing","first-page":"352","article-title":"Toward a non-ambiguous multilevel secure relational databases","author":"Jukic","year":"1997"},{"issue":"3","key":"10.1016\/S0306-4379(99)00023-X_BIB15","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/262762.262767","article-title":"Asserting beliefs in MLS relational models","volume":"26","author":"Jukic","year":"1997","journal-title":"SIGMOD Record"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB16","series-title":"Supplement to the Proceedings IEEE Symposium on Security and Privacy","first-page":"8","article-title":"Subjects interpretation of objects on lower security levels","author":"Jukic","year":"1996"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB17","series-title":"Proceedings IEEE Symposium on Security and Privacy","first-page":"128","article-title":"The semantics and expressive power of the MLR data model","author":"Sandhu","year":"1995"},{"issue":"1","key":"10.1016\/S0306-4379(99)00023-X_BIB18","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/290163.290171","article-title":"The multilevel relational (MLR) data model","volume":"1","author":"Sandhu","year":"1998","journal-title":"Transactions on Information and System Security"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB19","series-title":"Proceedings European Symposium on Research in Computer Security","first-page":"307","article-title":"Polyinstantiation for cover stories","author":"Sandhu","year":"1992"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB20","series-title":"Proceedings 18th National Information Systems Security Conference","first-page":"50","article-title":"TOP: a practical trusted ODMS","author":"Schaefer","year":"1995"},{"article-title":"Formal methods","year":"1992","author":"Smith","key":"10.1016\/S0306-4379(99)00023-X_BIB21"},{"key":"10.1016\/S0306-4379(99)00023-X_BIB22","series-title":"Proceedings 18th VLDB Conference","first-page":"199","article-title":"Entity modeling in the MLS relational model","author":"Smith","year":"1992"},{"article-title":"Security of the Belief-Consistency Model","year":"1998","author":"Vrbsky","key":"10.1016\/S0306-4379(99)00023-X_BIB23"},{"issue":"4","key":"10.1016\/S0306-4379(99)00023-X_BIB24","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1145\/195664.195675","article-title":"Formal query languages for secure relational databases","volume":"19","author":"Winslett","year":"1994","journal-title":"ACM Transactions on Database Systems"}],"container-title":["Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S030643799900023X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S030643799900023X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T22:23:47Z","timestamp":1556058227000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S030643799900023X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,7]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1999,7]]}},"alternative-id":["S030643799900023X"],"URL":"https:\/\/doi.org\/10.1016\/s0306-4379(99)00023-x","relation":{},"ISSN":["0306-4379"],"issn-type":[{"type":"print","value":"0306-4379"}],"subject":[],"published":{"date-parts":[[1999,7]]}}}