{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T18:32:00Z","timestamp":1769020320052,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,16]],"date-time":"2008-03-16T00:00:00Z","timestamp":1205625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,16]]},"DOI":"10.1145\/1363686.1363921","type":"proceedings-article","created":{"date-parts":[[2008,4,29]],"date-time":"2008-04-29T13:04:11Z","timestamp":1209474251000},"page":"1013-1020","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Online detection of malicious data access using DBMS auditing"],"prefix":"10.1145","author":[{"given":"Jos\u00e9","family":"Fonseca","sequence":"first","affiliation":[{"name":"University of Coimbra, Coimbra - Portugal"}]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[{"name":"University of Coimbra, Coimbra - Portugal"}]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[{"name":"University of Coimbra, Coimbra - Portugal"}]}],"member":"320","published-online":{"date-parts":[[2008,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287383"},{"key":"e_1_3_2_1_2_1","first-page":"2004","article-title":"A roadmap for comprehensive online privacy policies","author":"Anton A.","year":"2004","unstructured":"A. Anton , E. Bertino , N. Li , and T. Yu , \" A roadmap for comprehensive online privacy policies \", In CERIAS Technical Report , 2004 - 2047 , 2004 . A. Anton, E.Bertino, N.Li, and T.Yu, \"A roadmap for comprehensive online privacy policies\", In CERIAS Technical Report, 2004-47, 2004.","journal-title":"CERIAS Technical Report"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.33"},{"key":"e_1_3_2_1_4_1","volume-title":"Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems","author":"Chung Christina Yip","year":"1999","unstructured":"Christina Yip Chung , Michael Gertz , Karl Levitt , \"DEMIDS : A Misuse Detection System for Database Systems \", Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems , Kluwer Academic Publishers , 1999 , 159--178. Christina Yip Chung, Michael Gertz, Karl Levitt, \"DEMIDS: A Misuse Detection System for Database Systems\", Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, Kluwer Academic Publishers, 1999, 159--178."},{"key":"e_1_3_2_1_5_1","volume-title":"William Lucyshyn and Robert Richardson","author":"Gordon Lawrence A.","year":"2006","unstructured":"Lawrence A. Gordon , Martin P. Loeb , William Lucyshyn and Robert Richardson , Computer Security Institute . Computer crime and security survey, 2006 . Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson, Computer Security Institute. Computer crime and security survey, 2006."},{"key":"e_1_3_2_1_6_1","volume-title":"International Database Engineering and Applications Symposium (IDEAS)","author":"Hu Y.","year":"2003","unstructured":"Y. Hu and B. Panda , \" Identification of malicious transactions in database systems \", International Database Engineering and Applications Symposium (IDEAS) , 2003 . Y. Hu and B. Panda, \"Identification of malicious transactions in database systems\", International Database Engineering and Applications Symposium (IDEAS), 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646649.699488"},{"key":"e_1_3_2_1_8_1","volume-title":"17th Annual Computer Security Applications Conference","author":"Liu Peng","year":"2001","unstructured":"Peng Liu , \"DAIS : A Real-time Data Attack Isolation System for Commercial Database Applications \", 17th Annual Computer Security Applications Conference , 2001 . Peng Liu, \"DAIS: A Real-time Data Attack Isolation System for Commercial Database Applications\", 17th Annual Computer Security Applications Conference, 2001."},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Dependable Systems and Networks (DSN-02)","author":"Townsend Roy","year":"2002","unstructured":"Maxion, Roy A. and Townsend , Tahlia N. \" Masquerade Detection Using Truncated Command Lines .\" International Conference on Dependable Systems and Networks (DSN-02) , Washington, D.C. 23- -26 June 2002 . Maxion, Roy A. and Townsend, Tahlia N. \"Masquerade Detection Using Truncated Command Lines.\" International Conference on Dependable Systems and Networks (DSN-02), Washington, D.C. 23--26 June 2002."},{"key":"e_1_3_2_1_10_1","volume-title":"Intl Conf on Dependable Systems &amp; Networks (DSN-03)","author":"Maxion Roy A.","year":"2003","unstructured":"Roy A. Maxion , \" Masquerade Detection Using Enriched Command Lines\" , Intl Conf on Dependable Systems &amp; Networks (DSN-03) , San Francisco, California , 2003 . Roy A. Maxion, \"Masquerade Detection Using Enriched Command Lines\", Intl Conf on Dependable Systems &amp; Networks (DSN-03), San Francisco, California, 2003."},{"key":"e_1_3_2_1_11_1","volume-title":"http:\/\/www.itarchitect.com\/shared\/article\/showArticl e.jhtml?articleId=166400792","author":"Conry-Murray Andrew","year":"2005","unstructured":"Andrew Conry-Murray , \" The Threat From Within\" , http:\/\/www.itarchitect.com\/shared\/article\/showArticl e.jhtml?articleId=166400792 , 2005 Andrew Conry-Murray, \"The Threat From Within\", http:\/\/www.itarchitect.com\/shared\/article\/showArticl e.jhtml?articleId=166400792, 2005"},{"key":"e_1_3_2_1_12_1","unstructured":"Oracle Corporation \"Oracle\u00ae Database Concepts 10g Release 1 (10.1)\" 2003.  Oracle Corporation \"Oracle\u00ae Database Concepts 10g Release 1 (10.1)\" 2003."},{"key":"e_1_3_2_1_13_1","unstructured":"Pen Test Limited \"Oracle security white paper series exploiting and protecting oracle\" 2001.  Pen Test Limited \"Oracle security white paper series exploiting and protecting oracle\" 2001."},{"key":"e_1_3_2_1_14_1","volume-title":"R. Ramakrishnan, J. Gehrke, \"Database Management Systems\"","year":"2002","unstructured":"R. Ramakrishnan, J. Gehrke, \"Database Management Systems\" 3 rd Ed., McGraw Hill , ISBN 0072465638, 2002 . R. Ramakrishnan, J. Gehrke, \"Database Management Systems\" 3rd Ed., McGraw Hill, ISBN 0072465638, 2002.","edition":"3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00122-8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/998929476"},{"key":"e_1_3_2_1_17_1","volume-title":"Version 5.4\"","author":"Transaction Processing Performance Council","year":"2005","unstructured":"Transaction Processing Performance Council , \" TPC Benchmark C , Standard Specification , Version 5.4\" , 2005 , available at: http:\/\/www.tpc.org\/tpcc\/. Transaction Processing Performance Council, \"TPC Benchmark C, Standard Specification, Version 5.4\", 2005, available at: http:\/\/www.tpc.org\/tpcc\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2005.31"},{"key":"e_1_3_2_1_19_1","volume-title":"Market overview","author":"Yuhanna Noel","year":"2005","unstructured":"Noel Yuhanna , \" Comprehensive Database Security Requires Native DBMS Features and Third-Party Tools\" , Market overview , Forrester Research Inc ., May 2005 Noel Yuhanna, \"Comprehensive Database Security Requires Native DBMS Features and Third-Party Tools\", Market overview, Forrester Research Inc., May 2005"}],"event":{"name":"SAC '08: The 2008 ACM Symposium on Applied Computing","location":"Fortaleza, Ceara Brazil","acronym":"SAC '08","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 2008 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1363686.1363921","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1363686.1363921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:10Z","timestamp":1750253950000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1363686.1363921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,16]]},"references-count":19,"alternative-id":["10.1145\/1363686.1363921","10.1145\/1363686"],"URL":"https:\/\/doi.org\/10.1145\/1363686.1363921","relation":{},"subject":[],"published":{"date-parts":[[2008,3,16]]},"assertion":[{"value":"2008-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}