{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:56Z","timestamp":1772163956131,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,4]],"date-time":"2009-03-04T00:00:00Z","timestamp":1236124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,4]]},"DOI":"10.1145\/1508865.1508954","type":"proceedings-article","created":{"date-parts":[[2009,3,3]],"date-time":"2009-03-03T11:06:03Z","timestamp":1236078363000},"page":"241-245","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Teaching database security and auditing"],"prefix":"10.1145","author":[{"given":"Li","family":"Yang","sequence":"first","affiliation":[{"name":"University of Tennessee at Chattanooga, Chattanooga, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231060"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324302.1324356"},{"key":"e_1_3_2_1_3_1","first-page":"21559","article-title":"Database security and Auditing: Protecting data integrity and accessibility. Course technology","volume":"0","author":"Afyouni Hassan A.","year":"2006","journal-title":"ISBN"},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE Computer Society Press","author":"Abrams Marshall D.","year":"1995"},{"key":"e_1_3_2_1_5_1","volume-title":"Elsevier Digital Press","author":"Ben-Natan Ron","year":"2005"},{"key":"e_1_3_2_1_6_1","unstructured":"Oracle by Example Series: Oracle Database 10g Tutorial: http:\/\/www.oracle.com\/technology\/obe\/10gr2_db_single\/index.htm  Oracle by Example Series: Oracle Database 10g Tutorial: http:\/\/www.oracle.com\/technology\/obe\/10gr2_db_single\/index.htm"},{"issue":"9","key":"e_1_3_2_1_7_1","volume":"19","author":"Litwin Paul","journal-title":"Stop SQL Injection Attacks Before They Stop You. MSDN. Magazine"},{"key":"e_1_3_2_1_8_1","first-page":"46304","volume":"0","author":"Sunderraman Rajshekhar","year":"2007","journal-title":"Addison Wesley. ISBN"},{"key":"e_1_3_2_1_9_1","unstructured":"RUTHERFOR F. J. Hands-on: A means to an end. 2061 Today 3(5) 1993.  RUTHERFOR F. J. Hands-on: A means to an end. 2061 Today 3(5) 1993."},{"key":"e_1_3_2_1_10_1","unstructured":"Haury D. L. and P. Rillero. Perspectives of Hands-On Science Teaching. ERIC Clearinghouse for Science Mathematics and Environmental Education Columbus OH 1994.  Haury D. L. and P. Rillero. Perspectives of Hands-On Science Teaching. ERIC Clearinghouse for Science Mathematics and Environmental Education Columbus OH 1994."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of VLDB Conference","author":"Kiernan Jerry","year":"2002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Hacigumus Hakan Bala Iyer Sharad Mehrotra. Efficient Execution of Aggregation Queries over Encrypted Relational Databases. Database Systems for Advanced Applications (DASFAA). 2004. Lecture Notes in Computer Science (LNCS) 2973 pp. 125--136. Springer-Verlag. 2004.  Hacigumus Hakan Bala Iyer Sharad Mehrotra. Efficient Execution of Aggregation Queries over Encrypted Relational Databases. Database Systems for Advanced Applications (DASFAA). 2004. Lecture Notes in Computer Science (LNCS) 2973 pp. 125--136. Springer-Verlag. 2004.","DOI":"10.1007\/978-3-540-24571-1_10"},{"key":"e_1_3_2_1_16_1","unstructured":"Wang Hui and Laks Lakshmanan. \"Efficient Secure Query Evaluation over Encrypted XML Databases.\" ACM Very Large Database. Seoul Korea. pp 127--138 2006.   Wang Hui and Laks Lakshmanan. \"Efficient Secure Query Evaluation over Encrypted XML Databases.\" ACM Very Large Database. Seoul Korea. pp 127--138 2006."}],"event":{"name":"SIGCSE09: The 40th ACM Technical Symposium on Computer Science Education","location":"Chattanooga TN USA","acronym":"SIGCSE09","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 40th ACM technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1508865.1508954","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1508865.1508954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:29:43Z","timestamp":1750238983000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1508865.1508954"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,4]]},"references-count":16,"alternative-id":["10.1145\/1508865.1508954","10.1145\/1508865"],"URL":"https:\/\/doi.org\/10.1145\/1508865.1508954","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1539024.1508954","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009,3,4]]},"assertion":[{"value":"2009-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}