{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:45:06Z","timestamp":1730299506524,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/stc-csit.2016.7589875","type":"proceedings-article","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T21:44:24Z","timestamp":1476395064000},"page":"84-87","source":"Crossref","is-referenced-by-count":3,"title":["On the temporal access control implementation at the logical level of relational databases"],"prefix":"10.1109","author":[{"given":"Pavlo","family":"Zhezhnych","sequence":"first","affiliation":[]},{"given":"Teodor","family":"Burak","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Chyrka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.07.005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73538-0_16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11560647_25"},{"key":"ref6","first-page":"38","article-title":"An Approach for Prevention of SQL Injection Attacks on Database","volume":"1","author":"randive","year":"2014","journal-title":"International Journal of Innovative Research in Advanced Engineering (IJIRAE)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335413"},{"key":"ref8","first-page":"113","article-title":"An Effective Role Administration Model Using Organization Structure","author":"sejong","year":"2006","journal-title":"ACM Transactions on Information and System Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2001.960606"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.09.013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266865"},{"key":"ref9","first-page":"361","article-title":"Automated Design Method of Hierarchical Access Control In Database","author":"blazhko","year":"2009","journal-title":"Procs of 5th IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications"}],"event":{"name":"2016 XIth International Scientific and Technical Conference \u201cComputer Sciences and Information Technologies (CSIT)","start":{"date-parts":[[2016,9,6]]},"location":"Lviv, Ukraine","end":{"date-parts":[[2016,9,10]]}},"container-title":["2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7581234\/7589853\/07589875.pdf?arnumber=7589875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T07:09:32Z","timestamp":1478070572000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7589875\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/stc-csit.2016.7589875","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}