{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T23:28:25Z","timestamp":1673911705968},"reference-count":25,"publisher":"Maria Curie-Sklodowska University","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,1,1]]},"DOI":"10.2478\/v10065-010-0043-7","type":"journal-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T12:47:39Z","timestamp":1302180459000},"source":"Crossref","is-referenced-by-count":1,"title":["Middleware non-repudiation service for the data warehouse"],"prefix":"10.17951","volume":"10","author":[{"given":"Bogdan","family":"Ksi\u0119\u017copolski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zbigniew","family":"Kotulski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7349","reference":[{"key":"1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00287-004-0450-5","article-title":"Architektur von data warehouses und business intelligence systemem","volume":"28","author":"B. Humm","year":"2005","journal-title":"Informatyk-Spektrum"},{"key":"2","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0306-4379(99)00017-4","article-title":"Architecture and quality in data warehouses: an extended repository approach","volume":"24","author":"M. Jarke","year":"1999","journal-title":"Information Systems"},{"issue":"2","key":"3","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1023\/A:1021548024224","article-title":"Improving data quality in practice: a case study in the italian public administration","volume":"13","author":"P. Missier","year":"2003","journal-title":"Distributed and Parallel Databases"},{"key":"4","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/11537878_24","article-title":"An adaptive privacy management system for data repositories","volume":"3592","author":"C. Mont","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"issue":"1","key":"5","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00766-007-0057-x","article-title":"An approach to engineering the requirements of data warehouses","volume":"13","author":"N. Prakash","year":"2008","journal-title":"Requirements Engineering"},{"key":"6","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.cose.2004.09.011","article-title":"Secure information systems development-a survey and comparison","volume":"24","author":"R. Villarroel","year":"2005","journal-title":"Computer & Security"},{"issue":"1","key":"7","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TDSC.2005.9","article-title":"Database security-concepts, aproaches, and challenges","volume":"2","author":"E. Bertino","year":"2005","journal-title":"IEEE Transactions on Dependable and Security Computing"},{"issue":"7","key":"8","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/0306-4379(95)00029-4","article-title":"Database security: research and practice","volume":"20","author":"E. Bertino","year":"1995","journal-title":"Information Systems"},{"issue":"1","key":"9","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s00778-002-0083-8","article-title":"Lineage tracing for general data warehouse transformations","volume":"12","author":"Y. Cui","year":"2003","journal-title":"VLDB Journal"},{"issue":"3","key":"10","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.cose.2006.11.002","article-title":"Adaptable security mechanism for the dynamic environments","volume":"26","author":"B. Ksiezopolski","year":"2007","journal-title":"Computers & Security"},{"key":"11","doi-asserted-by":"crossref","first-page":"1873","DOI":"10.1016\/S0140-3664(03)00082-3","article-title":"Security requirements for e-government services: a methodological approach for developing a common pki-based security policy","volume":"26","author":"C. Lambrinoudakis","year":"2003","journal-title":"Computer Communication"},{"key":"12","unstructured":"ISO\/IEC19790, Security Techniques Security Requirements for Cryptographic Modules (2006)."},{"key":"13","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/j.infsof.2004.09.013","article-title":"Designinig secure databases","volume":"47","author":"E. Fernandez-Medina","year":"2005","journal-title":"Information and Software Technology"},{"key":"14","article-title":"Authentic third-party data publication","author":"P. Devanbu","year":"2000"},{"key":"15","unstructured":"SSSWG, Official web page of Storage System Standards Working Group (2002) <a target=\"_blank\" href='http:\/\/www.ssswg.org\/'>http:\/\/www.ssswg.org\/<\/a>"},{"issue":"2","key":"16","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1363-4127(01)00203-5","article-title":"Database security in a web environment","volume":"6","author":"P. Lothian","year":"2001","journal-title":"Information Security Technical Report"},{"key":"17","volume-title":"Database Security-Concepts, Aproaches, and Challenges","author":"C. Kaufman","year":"2002"},{"key":"18","unstructured":"ISO\/IEC15408, Information Technology. Security Techniques Evaluation Criteria for IT Security (2003)."},{"key":"19","unstructured":"ISO\/IEC17799, Information Technology-Code of Practice for Information Security Management (2005)."},{"key":"20","volume-title":"Oracle Label Security, Administrator's Guide (relase 2) (9.2)","author":"J. Levinger","year":"2002"},{"key":"21","volume-title":"Access control: policies models, and mechanisms","author":"P. Samarati","year":"2000"},{"key":"22","unstructured":"RFC2560, X.509 Internet Public Key Infrastructure, Online Certificate Status Protocol-OCSP (1999)."},{"key":"23","unstructured":"ETSI101903, XML Advanced Electronic Signatures (XAdES) (2004)."},{"issue":"2","key":"24","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/s10550-006-0051-8","article-title":"Security issues of wireless sensor networks in healthcare applications h s","volume":"24","author":"H. Ng","year":"2006","journal-title":"BT Technology Journal"},{"key":"25","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s11042-006-0096-1","article-title":"Security and privacy for multimedia database management systems","volume":"33","author":"B. Thuraisingham","year":"2007","journal-title":"Multimedia Tools Application"}],"container-title":["Annales UMCS, Informatica"],"original-title":[],"link":[{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/download\/3275\/2469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T15:47:33Z","timestamp":1653493653000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/view\/3275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,1]]},"references-count":25,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.2478\/v10065-010-0043-7","relation":{},"ISSN":["2083-3628","1732-1360"],"issn-type":[{"value":"2083-3628","type":"electronic"},{"value":"1732-1360","type":"print"}],"subject":[],"published":{"date-parts":[[2010,1,1]]}}}