{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T05:15:57Z","timestamp":1733548557338,"version":"3.30.1"},"reference-count":13,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[2000,7,1]],"date-time":"2000-07-01T00:00:00Z","timestamp":962409600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2000,7]]},"DOI":"10.1016\/s1383-7621(99)00045-4","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T18:33:56Z","timestamp":1049740436000},"page":"889-902","source":"Crossref","is-referenced-by-count":2,"title":["Read-down conflict-preserving serializability as a correctness criterion for multilevel-secure optimistic concurrency control: CSR\/RD"],"prefix":"10.1016","volume":"46","author":[{"given":"Sukhoon","family":"Kang","sequence":"first","affiliation":[]},{"given":"Songchun","family":"Moon","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/S1383-7621(99)00045-4_BIB1","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1145\/356850.356852","article-title":"Formal models for computer security","volume":"13","author":"Landwehr","year":"1981","journal-title":"Comput. Surveys"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB2","series-title":"Database Security X: Status and Prospects","first-page":"79","article-title":"Multilevel secure transaction processing: Status and prospects","author":"Atluri","year":"1997"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB3","doi-asserted-by":"crossref","unstructured":"J.A. Goguen, J. Meseguer, Security policy and security models, in: Proceedings of the IEEE Computer Society Symposium on Security and Privacy, 1982, pp. 11\u201320","DOI":"10.1109\/SP.1982.10014"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB4","doi-asserted-by":"crossref","unstructured":"T.F. Keefe, W.T. Tsai, Multiversion concurrency control for secure database systems, in: Proceedings of the 1990 IEEE Computer Society Symposium on Security and Privacy, 1990, pp. 369\u2013383","DOI":"10.1109\/RISP.1990.63865"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB5","doi-asserted-by":"crossref","unstructured":"T.F. Keefe, W.T. Tasi, J. Srivastava, Mutilevel secure database concurrency control, in: Proceedings of the IEEE Symposium on Security and Privacy, 1990, pp. 337\u2013344","DOI":"10.1109\/ICDE.1990.113486"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB6","unstructured":"R. Sandhu, Mandatory controls for database integrity, in: D.L. Spooner, C. Landwehr (Eds.), Database Security III: Status and Prospects, Elsevier, Amsterdam, 1990, pp. 143\u2013150"},{"issue":"2","key":"10.1016\/S1383-7621(99)00045-4_BIB7","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/319566.319567","article-title":"On optimistic methods for concurrency control","volume":"6","author":"Kung","year":"1981","journal-title":"ACM Trans. Database Sys."},{"year":"1987","series-title":"Concurrency Control and Recovery in Database System","author":"Bernstein","key":"10.1016\/S1383-7621(99)00045-4_BIB8"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB9","doi-asserted-by":"crossref","unstructured":"P.K. Chrysanthis, K. Ramamritham, ACTA: a framework for specifying and reasoning about transaction structure and behavior, in: Proceedings of ACM International Conference on Management of Data ACM SIGMOD, 1990, pp. 194\u2013203","DOI":"10.1145\/93597.98729"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB10","unstructured":"R.K. Thomas, R. Sandhu, Towards a unified framework and theory for reasoning about security and correctness of transactions in multilevel databases, in: T.F. Keefe, C. Landwehr (Eds.), Database Security VII: Status and Prospects, Elsevier, Amsterdam, 1994, pp. 309\u2013328"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB11","unstructured":"C. Papadimitriou, The Theory of Database Concurrency Control, Computer Science Press, Rockville, MD, 1986, pp. 96\u2013106"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB12","doi-asserted-by":"crossref","unstructured":"V. Atluri, E. Bertino, S. Jajodia, Achieving stricter correctness requirements in multilevel secure databases, in: Proceedings of the IEEE Symposium on Security and Privacy, 1993, pp. 135\u2013147","DOI":"10.1109\/RISP.1993.287636"},{"key":"10.1016\/S1383-7621(99)00045-4_BIB13","doi-asserted-by":"crossref","unstructured":"S. Jajodia, V. Atluri, Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases, in: Proceedings of the IEEE Symposium on Security and Privacy, 1992, pp. 216\u2013224","DOI":"10.1109\/RISP.1992.213259"}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762199000454?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762199000454?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T17:51:45Z","timestamp":1733507505000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762199000454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,7]]},"references-count":13,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2000,7]]}},"alternative-id":["S1383762199000454"],"URL":"https:\/\/doi.org\/10.1016\/s1383-7621(99)00045-4","relation":{},"ISSN":["1383-7621"],"issn-type":[{"type":"print","value":"1383-7621"}],"subject":[],"published":{"date-parts":[[2000,7]]}}}