{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:01:45Z","timestamp":1730203305680,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/ccece.2017.7946661","type":"proceedings-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:25:48Z","timestamp":1497993948000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["A content-based data masking technique for a built-in framework in Business Intelligence platform"],"prefix":"10.1109","author":[{"given":"Osama","family":"Ali","sequence":"first","affiliation":[]},{"given":"Abdelkader","family":"Ouda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SSIS Data Flow Transformation Component To Provide Basic Data Masking Capabilities","year":"2012","author":"arthur","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2016.7746327"},{"key":"ref12","first-page":"154","article-title":"Experimental Study of Various Data Masking Techniques with Random Replacement using data volume","volume":"9","author":"ravikumar","year":"2011","journal-title":"(IJCSIS) International Journal of Computer Science and Information Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2016.7746328"},{"key":"ref14","article-title":"A Survey on Recent Trends, Process and Development in Data Masking for Testing","volume":"8","author":"ravikumar","year":"2011","journal-title":"Int J Comput Sci Issues"},{"year":"2014","key":"ref4"},{"journal-title":"Components of business intelligence The Business Intelligence Guy","year":"2011","author":"guro","key":"ref3"},{"journal-title":"White Paper","article-title":"Data Masking Best Practices","year":"2010","key":"ref6"},{"journal-title":"Data shuffling procedure for masking data","year":"2007","author":"muralidhar and","key":"ref5"},{"journal-title":"Dynamic Data Masking","year":"2016","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2076623.2076632"},{"journal-title":"p l White Paper","article-title":"Why Add Data Masking To Your Best Practices For Securing Sensitive Data","year":"2010","key":"ref2"},{"key":"ref1","article-title":"Biggest Health Data Breaches in 2014","author":"mcgee","year":"2014","journal-title":"Data Breach Today (HealthInfoSec)"},{"journal-title":"Masking Personal Identifiable SQL Server Data","year":"2013","author":"dobson","key":"ref9"}],"event":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2017,4,30]]},"location":"Windsor, ON","end":{"date-parts":[[2017,5,3]]}},"container-title":["2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938141\/7946583\/07946661.pdf?arnumber=7946661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T21:22:43Z","timestamp":1525382563000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7946661\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccece.2017.7946661","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}