{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:45:16Z","timestamp":1725486316126},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540679783"},{"type":"electronic","value":"9783540444695"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44469-6_27","type":"book-chapter","created":{"date-parts":[[2007,6,9]],"date-time":"2007-06-09T04:57:23Z","timestamp":1181365043000},"page":"287-302","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace"],"prefix":"10.1007","author":[{"given":"Reind","family":"van de Riet","sequence":"first","affiliation":[]},{"given":"Wouter","family":"Janssen","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Olivier","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Serban","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,6,28]]},"reference":[{"key":"27_CR1","unstructured":"Dehne, F., R.P. van de Riet: A Guided Tour through Mokum 2.0, IR-368, Faculteit Wiskunde en Informatica, VU, October 1994."},{"key":"27_CR2","unstructured":"Gendler-Fishman, Masha, Ehud Gudes: Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databases, in: T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 88\u201310"},{"key":"27_CR3","unstructured":"Gudes, Ehud, Reind van de Riet, Hans Burg, Martin Olivier: Alter-egos and Roles Supporting WorkFlow Security in Cyberspace, in:T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 152\u2013166."},{"key":"27_CR4","unstructured":"Hale, John, Jody Threet, Sujeet Shenoi: Capability-Based Primitives for Access Control in Object-Oriented Systems, in: T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 88\u2013103."},{"key":"27_CR5","unstructured":"Olivier, M.S. E. Gudes, R.P. van de Riet, J.F.M. Burg: Specifying Application-lev el Security in Workflow Systems in: R. Wagner (Ed). Database and Expert Systems Applications, IEEE Computer Society, 1998, pp. 346\u2013354."},{"key":"27_CR6","first-page":"223","volume-title":"Proceedings of IFIP WG11.3 Working Conference on Database Security","author":"R.P. Riet van de","year":"1994","unstructured":"Riet, R.P. van de, Beukering, J.: The Integration of Security and Integrity Constraints in MOKUM in: J. Biskup, M. Morgenstern, C. Landwehr (Eds), Proceedings of IFIP WG11.3 Working Conference on Database Security, IFIP\/ North Holland, 1994,pp. 223\u2013246."},{"key":"27_CR7","first-page":"462","volume-title":"Proceedings WebNet96","author":"R.P. Riet van de","year":"1996","unstructured":"Riet, R.P. van de, J.F.M. Burg, Modelling Alter Egos in Cyberspace: Who is Responsible? in: Proceedings WebNet96, San Francisco, AACE (Association for the Advancement of Computing in Education), Charlottesville, USA pp. 462\u2013467, 1996."},{"key":"27_CR8","unstructured":"Riet, R.P. van de, J.F.M. Burg, Modelling Alter Egos in Cyberspace: using a Work Flow management tool: who takes care of the Security and Privacy in: S. Lobodzinsky, I. Tomek (Eds)., Proceedings of WebNet97, Toronto, Association for the Advancement of Computing."},{"issue":"1","key":"27_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/103140.103144","volume":"16","author":"F. Rabitti","year":"1991","unstructured":"Rabitti, F., E. Bertino, W. Kim, D. Woelk: A Model of Authorization for nextgeneration database systems, ACM Transactions on Database Systems, Vol. 16, No. 1, pp. 88\u2013131, 1991.","journal-title":"ACM Transactions on Database Systems"},{"key":"27_CR10","unstructured":"Radu, S., F. Dehne and R.P. van de Riet, A first step towards distributed Mokum, Technical Report 428, Computer Science Department, Vrije Universiteit, 1997."},{"key":"27_CR11","unstructured":"Riet, R.P. van de, E. Gudes: An Object-Oriented Database Architecture for Providing High-Level Security in Cyberspace in: P. Samarati, R. Sandhu (Eds)., Proceedings of Tenth IFIP WG11.3 Working Conference on Database Security, Como 1996, pp. 92\u2013115."},{"issue":"1","key":"27_CR12","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0169-023X(97)00002-5","volume":"24","author":"R.P. Riet van de","year":"1997","unstructured":"Riet, R.P. van de, Andrea Junk & E. Gudes: Security in Cyberspace: a Knowledge-base Approach, Data and Knowledge Engineering, Vol 24, Nr. 1, North Holland, 1997, pp. 69\u201398.","journal-title":"Data and Knowledge Engineering"},{"key":"27_CR13","unstructured":"Riet, R.P. van de, W. Janssen, P. de Gruijter: Security moving from Database Systems to ERP Systems in: R. Wagner (Ed). Database and Expert Systems Applications, IEEE Computer Society, 1998, pp. 273\u2013280."},{"issue":"3","key":"27_CR14","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1145\/320473.320476","volume":"1","author":"M. Stonebraker","year":"1976","unstructured":"Stonebraker, M., E. Wong, P. Kreps, G. Held: The Design and Implementation of INGRES, Transactions on Database Systems, ACM, Vol 1, Nr. 3. pp. 189\u2013222., 1976.","journal-title":"Transactions on Database Systems"},{"key":"27_CR15","unstructured":"Wouter Teepe, Reind van de Riet, Martin Olivier: WorkFlow Analyzed for Security and Privacy in using Databases; submitted for publication. 2000."},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Varadharajan, V. Distributed Object System Security, Information Security-the next Decade, Edited by H.P Eloff and S. H. von Solms, Chapman & Hall, 1995, pp. 305\u2013321.","DOI":"10.1007\/978-0-387-34873-5_23"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44469-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T19:27:34Z","timestamp":1585855654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44469-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679783","9783540444695"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44469-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]},"assertion":[{"value":"28 June 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}