{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:51:59Z","timestamp":1763347919735},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/tdsc.2014.2306675","type":"journal-article","created":{"date-parts":[[2014,4,21]],"date-time":"2014-04-21T18:01:56Z","timestamp":1398103316000},"page":"217-229","source":"Crossref","is-referenced-by-count":2,"title":["Risk Aware Query Replacement Approach for Secure Databases Performance Management"],"prefix":"10.1109","volume":"12","author":[{"given":"Ousmane Amadou","family":"Dia","sequence":"first","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Answering Imprecise Database Queries: A Novel Approach","author":"kambhampati","year":"2003","journal-title":"Proceedings of the ACM Fifth International Workshop on Web Information and Data Management (WIDM)"},{"key":"ref31","year":"0"},{"key":"ref30","first-page":"236","article-title":"An Attribute Based Framework for Risk-Adaptive Access Control Models","author":"bhamidipati","year":"2011","journal-title":"Proc Sixth Int?l Conf Availability Reliability and Security (ARES ?11)"},{"key":"ref10","author":"ganapathi","year":"2009","journal-title":"Predicting and Optimizing System Utilization and Performance Via Statistical Machine Learning"},{"key":"ref11","author":"widom","year":"2009","journal-title":"Database Systems The Complete Book"},{"key":"ref12","article-title":"Query Similarity by Projecting the Query-Flow Graph","author":"castillo","year":"2010","journal-title":"Proc 33rd Int?l ACM SIGIR Conf Research and Development in Information Retrieval (SIGIR ?10)"},{"key":"ref13","first-page":"102","article-title":"Purpose Based Access Control of Complex Data for Privacy Protection","author":"bertino","year":"2005","journal-title":"Proc 10th ACM Symp Access Control Models and Technologies (SACMAT)"},{"key":"ref14","volume":"49","author":"huth","year":"2010","journal-title":"Insider Threats in Cyber Security Advances in Information Security"},{"key":"ref15","article-title":"Intent-Aware Query Similarity","author":"xu","year":"2011","journal-title":"Proc 20th ACM Int?l Conf Information and Knowledge Management (CIKM ?11)"},{"key":"ref16","article-title":"Risk Analysis in Access Control Systems","author":"mejri","year":"2010","journal-title":"Proc Eighth Ann Int?l Conf Privacy Security and Trust (PST)"},{"key":"ref17","article-title":"Risk-Aware Role-Based Access Control","author":"crampton","year":"2011","journal-title":"Proc Seventh Int?l Workshop Security and Trust Management"},{"key":"ref18","article-title":"Risk Adaptive Access Control (RADAC)","author":"mcgraw","year":"2009","journal-title":"Proc Privilege Management Workshop"},{"key":"ref19","year":"0"},{"key":"ref28","article-title":"MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control","author":"gunter","year":"2011","journal-title":"Proc First ACM Conf Data and Application Security and Privacy (CODASPY ?11)"},{"key":"ref4","author":"levitt","year":"1999","journal-title":"Integrity and Internal Control in Information System"},{"key":"ref27","article-title":"Automated Ranking of Database Query Results","author":"das","year":"2003","journal-title":"Proc CIDR Conf"},{"key":"ref3","article-title":"Workload-Aware Database Monitoring and Consolidation","author":"madden","year":"2011","journal-title":"Proc ACM SIGMOD Int?l Conf Management of Data"},{"key":"ref6","article-title":"Generalized Inverse Document Frequency","author":"donald","year":"2008","journal-title":"Proc 17th ACM Conf Information and Knowledge Management (CIKM)"},{"key":"ref29","article-title":"Enhancing Database Access Control with XACML Policy","author":"okhravi","year":"2009","journal-title":"Proc ACM Conf Computer Comm Security (CCS ?09)"},{"key":"ref5","author":"dantzig","year":"1963","journal-title":"Linear Programming and Extensions"},{"key":"ref8","author":"thuraisingham","year":"2006","journal-title":"A Model for Risk Adaptive Access Control in RBAC Employed Distributed Environments"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"21","DOI":"10.3233\/RDA-2008-0002","article-title":"A Risk Management Approach to RBAC","volume":"1","author":"bertino","year":"2009","journal-title":"Risk and Decision Analysis"},{"key":"ref2","article-title":"Sql Query Optimization through Nested Relational Algebra","volume":"32","author":"badia","year":"2007","journal-title":"ACM Trans Database Systems"},{"key":"ref9","article-title":"Implementing ACL-Based Policies in XACML","author":"van herreweghen","year":"2008","journal-title":"Proc Ann Computer Security Applications Conf (ACSAC)"},{"key":"ref1","year":"0"},{"key":"ref20","article-title":"A Trust-and-Risk Aware RBAC Framework: Tackling Insider Threat","author":"joshi","year":"2012","journal-title":"Proc 17th ACM Symp Access Control Models and Technologies (SACMAT)"},{"key":"ref22","article-title":"Risk-Based Access Control Systems Built on Fuzzy Inferences","author":"lobo","year":"2010","journal-title":"Proc Fifth ACM Symp Information Computer and Comm Security (ASIACCS)"},{"key":"ref21","article-title":"Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control","author":"kesar","year":"2007","journal-title":"Proc IEEE Symp Security and Privacy (SP ?07)"},{"key":"ref24","article-title":"Quantified Risk-Adaptive Access Control for Patient Privacy Protection in Health Information Systems","author":"jin","year":"2011","journal-title":"Proc Sixth ACM Symp Information Computer and Comm Security (ASIACCS ?11)"},{"key":"ref23","article-title":"Privacy-Aware Role-Based Access Control","volume":"13","author":"lobo","year":"2010","journal-title":"ACM Trans Information and System Security"},{"key":"ref26","article-title":"The NIST Model for Role-Based Access Control: Towards a Unified Standard","author":"ferraiolo","year":"2000","journal-title":"Proc Fifth ACM Workshop Role-Based Access Control"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1145\/1108906.1108909","article-title":"X-Gtrbac Admin: A Decentralized Administration Model for Enterprise-Wide Access Control","volume":"8","author":"bertino","year":"2005","journal-title":"ACM Trans Information Security"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/7057713\/06803042.pdf?arnumber=6803042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:59Z","timestamp":1642003199000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6803042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":32,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2014.2306675","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}