{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T04:03:30Z","timestamp":1742097810266,"version":"3.38.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2002,9,1]],"date-time":"2002-09-01T00:00:00Z","timestamp":1030838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2002,9]]},"DOI":"10.1109\/tkde.2002.1033780","type":"journal-article","created":{"date-parts":[[2002,10,18]],"date-time":"2002-10-18T21:39:07Z","timestamp":1034977147000},"page":"1141-1154","source":"Crossref","is-referenced-by-count":10,"title":["Multiversion locking protocol with freezing for secure real-time database systems"],"prefix":"10.1109","volume":"14","author":[{"family":"Chanjung Park","sequence":"first","affiliation":[]},{"family":"Seog Park","sequence":"additional","affiliation":[]},{"given":"S.H.","family":"Son","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/132271.132276"},{"volume-title":"Introduction to Simulation and SLAM II","year":"1986","author":"Alan","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34932-9_15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35167-4_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/sp.1983.10001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/319996.319998"},{"volume-title":"Concurrency Control and Recovery in Database Systems","year":"1987","author":"Bernstein","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344298"},{"key":"ref9","first-page":"57","article-title":"Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments","volume-title":"Proc. IFIP 11th Working Conf. Database Security","author":"Chaney"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/1079\/43255.27.9.20000301\/30321.7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/253262.253362"},{"volume-title":"Information Warfare, I-War, IW, C4I, Cyberwar","year":"1996","author":"Goldberg","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2000.896426"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1990.128734"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/risp.1992.213259"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35167-4_11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63865"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/69.250090"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1991.160377"},{"volume-title":"Performance of Concurrency Control Mechanisms in Centralized Database Systems","year":"1986","author":"Kumar","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21236\/ada465539"},{"key":"ref22","first-page":"235","article-title":"A Secure Concurrency Control Protocol for Real-Time Databases","volume-title":"Proc. IFIP Ninth Working Conf. Database Security","author":"Mukkamala"},{"key":"ref23","first-page":"199","article-title":"A Locking Protocol for Multilevel Secure Databases Providing Support For Long Transactions","volume-title":"Proc. IFIP Ninth Working Conf. Database Security","author":"Pal"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IDEAS.1997.625661"},{"key":"ref25","first-page":"200","article-title":"Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems","volume-title":"Proc. IFIP 11th Working Conf. Database Security","author":"Park"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"article-title":"Correctness Criteria and Concurrency Control for Real-Time Systems: A Survey","year":"1992","author":"Shu","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1992.213156"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RTA.1993.263101"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.21236\/ada447651"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(96)00281-2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/69.895799"},{"key":"ref33","first-page":"9","article-title":"Misconceptions About Real-Time Databases","volume-title":"Real-Time Database Systems: Architecture and Techniques","author":"Stankovic","year":"2001"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/69\/22199\/01033780.pdf?arnumber=1033780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T05:15:43Z","timestamp":1742015743000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1033780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,9]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2002,9]]}},"URL":"https:\/\/doi.org\/10.1109\/tkde.2002.1033780","relation":{},"ISSN":["1041-4347"],"issn-type":[{"type":"print","value":"1041-4347"}],"subject":[],"published":{"date-parts":[[2002,9]]}}}