{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T05:19:48Z","timestamp":1649049588424},"reference-count":14,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2000,1]]},"DOI":"10.1016\/s1383-7621(99)00013-2","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T18:33:56Z","timestamp":1049740436000},"page":"397-410","source":"Crossref","is-referenced-by-count":10,"title":["Issues and approaches to supporting timeliness and security in real-time database systems"],"prefix":"10.1016","volume":"46","author":[{"given":"S.H.","family":"Son","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/S1383-7621(99)00013-2_BIB1","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1145\/132271.132276","article-title":"Scheduling real-time transactions: A performance evaluation","volume":"17","author":"Abbott","year":"1992","journal-title":"ACM Trans. on Database Sys."},{"key":"10.1016\/S1383-7621(99)00013-2_BIB2","doi-asserted-by":"crossref","unstructured":"D.E. Bell, L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Tech. Report, The Mitre Corp., 1976","DOI":"10.21236\/ADA023588"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB3","doi-asserted-by":"crossref","unstructured":"B. George, J. Haritsa, Secure transaction processing in firm real-time database systems, in: ACM SIGMOD Conference, Tucson, AZ, May 1997, pp. 462\u2013473","DOI":"10.1145\/253260.253362"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB4","unstructured":"Y. Kim, S.H. Son, Supporting predictability in real-time database systems, in: IEEE Real-Time Technology and Applications Symposium, Boston, MA, June 1996, pp. 38\u201348"},{"issue":"10","key":"10.1016\/S1383-7621(99)00013-2_BIB5","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","article-title":"A note on the confinement problem","volume":"16","author":"Lampson","year":"1973","journal-title":"Commun. ACM"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB6","unstructured":"J. Lee, S.H. Son, Concurrency control algorithms for real-time database systems, in: V. Kumar (Ed.), Performance of Concurrency Control Mechanisms in Centralized Database Systems, Prentice Hall, Englewood Cliffs, NJ, 1996, pp. 429\u2013460"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB7","unstructured":"IEEE Symposium on Real-Time Technology and Applications, IEEE Computer Society, Denver, CO, June 1998"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB8","doi-asserted-by":"crossref","unstructured":"K.G. Shin, P. Ramanathan, Real-time computing: A new discipline of computer science and engineering, in: Proceedings of the IEEE, Special Issue on Real-Time Systems 82 (1) (1994) 6\u201324","DOI":"10.1109\/5.259423"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB9","doi-asserted-by":"crossref","unstructured":"S.H. Son, B. Thuraisingham, Towards a multilevel secure database management system for real-time applications, in: IEEE Workshop on Real-Time Applications, IEEE Computer Society, New York, May 1993","DOI":"10.1109\/RTA.1993.263101"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB10","unstructured":"S.H. Son, R. David, Synthesis of multilevel security and timing requirements in complex real-time database systems, in: Complex Systems Engineering Synthesis and Assessment Technology Workshop, Washington, DC, July 1994"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB11","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/S0020-0255(96)00281-2","article-title":"Design and analysis of an adaptive policy for secure real-time locking protocol","volume":"99","author":"Son","year":"1997","journal-title":"J. Inf. Sci."},{"key":"10.1016\/S1383-7621(99)00013-2_BIB12","doi-asserted-by":"crossref","unstructured":"S.H. Son, C. Chaney, N. Thomlinson, Partial security policies to support timeliness in secure real-time databases, in: IEEE Symposium on Security and Privacy, IEEE Computer Society Oakland, CA, May 1998, pp. 136\u2013147","DOI":"10.1109\/SECPRI.1998.674830"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB13","doi-asserted-by":"crossref","unstructured":"T.C. Ting, How Secure is Secure? Opening Remarks, in: IFIP WG 11.3 Working Conference on Database Security, Rensselaerville, New York, August 1995","DOI":"10.1007\/978-0-387-34932-9_1"},{"key":"10.1016\/S1383-7621(99)00013-2_BIB14","unstructured":"Woods Hole Report, Multilevel Data Management Security, Committee on Multilevel Data Management Security, National Research Council, Washington, DC, 1983"}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762199000132?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762199000132?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T19:23:37Z","timestamp":1580325817000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762199000132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,1]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2000,1]]}},"alternative-id":["S1383762199000132"],"URL":"https:\/\/doi.org\/10.1016\/s1383-7621(99)00013-2","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2000,1]]}}}