{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:35:10Z","timestamp":1730277310335,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/itcc.2004.1286510","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"523-527 Vol.1","source":"Crossref","is-referenced-by-count":1,"title":["Protecting federated databases using a practical implementation of a formal RBAC policy"],"prefix":"10.1109","author":[{"given":"S.","family":"Barker","sequence":"first","affiliation":[]},{"given":"P.","family":"Douglas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"journal-title":"The World Wide Web Security FAQ","year":"2002","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/191839.191927"},{"journal-title":"The XSB System Version 2 0 Programmer's Manual","year":"1999","author":"sagonas","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83189-8"},{"key":"14","first-page":"503","article-title":"Role-based access control features in commercial database management systems","author":"ramaswarmy","year":"1998","journal-title":"Proc 21st National Information Systems Security Conference"},{"year":"0","author":"dueker","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/383891.383894"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45241-9_9"},{"key":"2","first-page":"1300","article-title":"Data protection by logic programming","author":"barker","year":"2000","journal-title":"Intl Conference on Computational Logic"},{"journal-title":"An Introduction to Database Systems","year":"2000","author":"date","key":"10"},{"journal-title":"The Apache Jakarta Project","year":"1999","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950194"},{"key":"6","first-page":"187","article-title":"Flexible scurity plicies in sql","author":"barker","year":"2001","journal-title":"DBSec2001"},{"key":"5","first-page":"27","article-title":"Implementing rbac policies in pl\/sql","volume":"13","author":"barker","year":"2003","journal-title":"IFIP WG"},{"key":"4","article-title":"Practical rbac policy implementation for sql databases","volume":"13","author":"barker","year":"2003","journal-title":"IFIP WG"},{"journal-title":"Database Security","year":"1995","author":"castano","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011299"}],"event":{"name":"International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.","start":{"date-parts":[[2004,4,5]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2004,4,7]]}},"container-title":["International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9035\/28682\/01286510.pdf?arnumber=1286510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T01:34:40Z","timestamp":1489455280000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1286510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/itcc.2004.1286510","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}