{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:52:13Z","timestamp":1730227933089,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275870","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T21:27:30Z","timestamp":1443475650000},"page":"1766-1770","source":"Crossref","is-referenced-by-count":2,"title":["Hybrid intelligent access control framework to protect data privacy and theft"],"prefix":"10.1109","author":[{"given":"Jignesh C","family":"Doshi","sequence":"first","affiliation":[]},{"given":"Bhushan","family":"Trivedi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Survey on SQL Injection: Vulnerabilities, attacks AND Prevention Techniques","author":"abdoulaye","year":"2011","journal-title":"IEEE 15th International Symposium on Consumer Electronics"},{"key":"ref11","first-page":"394","author":"srinivasan","year":"0","journal-title":"Clod Computing a Practical approach for learning and Implementation Pearson"},{"key":"ref12","first-page":"37","author":"doshi","year":"2014","journal-title":"A Quick Look at Virtual Private Database Security CSI Communication"},{"journal-title":"Deloitte - NASCIO Cyber Security Study 2014","year":"0","key":"ref13"},{"journal-title":"McAfee Database Security in Virtualization and Cloud Computing Environments","year":"0","key":"ref14"},{"journal-title":"Implementing Row-and Cell-Level Security in Classified Databases Using SQL Server","year":"0","key":"ref15"},{"journal-title":"MySQL 5 0 Fine-Grained Access Control (FGAC)","year":"0","key":"ref16"},{"journal-title":"Database security Cengage Learning","year":"2011","author":"basta","key":"ref17"},{"journal-title":"Secure Database Systems","year":"0","author":"almutairi","key":"ref18"},{"volume":"12","journal-title":"Global Journal of Computer Science and Technology Network Web & Security","year":"2012","key":"ref19"},{"journal-title":"WhiteHat Security","year":"0","key":"ref28"},{"key":"ref4","article-title":"How the database security controls adapted to threats over the last 30 years","author":"lesov","year":"2008","journal-title":"University of Minnesota CS 8701 Fall"},{"journal-title":"Three Cloud-Computing Data Security Risks That Can't be Overlooked","year":"0","author":"markovich","key":"ref27"},{"journal-title":"OWASP Top Ten project 2013","year":"0","key":"ref3"},{"journal-title":"Database Security Guide Using Oracle Virtual Private Database to Control Data Access","year":"0","key":"ref6"},{"journal-title":"Database Concepts Database Security","year":"0","key":"ref5"},{"key":"ref8","article-title":"Comparison of SQL Injection Detection and Prevention Techniques","author":"tajpour","year":"2012","journal-title":"2nd International Conference on Education Technology and Computer (ICETC)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2011.44"},{"journal-title":"2013 Data Breach Investigations Report","year":"0","key":"ref2"},{"key":"ref9","article-title":"A Survey on Web Application Vulnerabilities(SQLIA and XSS) Exploitation and Security Engine for SQL Injection","author":"johri","year":"0","journal-title":"IEEE 2012"},{"journal-title":"Internet User World Statistics","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FITME.2009.140"},{"key":"ref22","first-page":"975","volume":"47","author":"basharat","year":"2012","journal-title":"Database Security and Encryption A Survey Study International Journal of Computer Applications"},{"journal-title":"Computer Science and Information Technology (CSIT) 5th International Conference","article-title":"Database security threats: A survey study","year":"2013","key":"ref21"},{"key":"ref24","article-title":"Kuspriyanto: Big-data security management issues","author":"paryasto","year":"2014","journal-title":"Information and Communication Technology (ICoICT)"},{"key":"ref23","first-page":"1066","author":"lu","year":"2013","journal-title":"Next Big Thing in Big Data The Security of the ICT Supply Chain Social Computing (socialcom) 2013"},{"key":"ref26","article-title":"Ravuri3: Security issues associated with big data in cloud computing","volume":"6","author":"inukollul","year":"2014","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"journal-title":"An introduction to DATA PROTECTION","year":"0","key":"ref25"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275870.pdf?arnumber=7275870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:56:02Z","timestamp":1490392562000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275870","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}