{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:17:04Z","timestamp":1742912224941,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387355443"},{"type":"electronic","value":"9780387399409"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-39940-9_329","type":"book-chapter","created":{"date-parts":[[2009,9,16]],"date-time":"2009-09-16T08:05:42Z","timestamp":1253088342000},"page":"2528-2534","source":"Crossref","is-referenced-by-count":0,"title":["Secure Database Development"],"prefix":"10.1007","author":[{"given":"Jan","family":"Jurjens","sequence":"first","affiliation":[]},{"given":"Eduardo B.","family":"Fernandez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"329_CR1_329","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D.A. Basin","year":"2006","unstructured":"Basin D.A., Doser J., and Lodderstedt T. Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1):39\u201391, 2006.","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"1","key":"329_CR2_329","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TDSC.2005.9","volume":"2","author":"E. Bertino","year":"2005","unstructured":"Bertino E. and Sandhu R. Database security \u2013 Concepts, approaches, and challenges. IEEE Trans. Dependable Sec. Comput., 2(1):2\u201319, 2005.","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"329_CR3_329","doi-asserted-by":"crossref","unstructured":"Best B., Jurjens J., and Nuseibeh B. Model-based security engineering of distributed information systems using UMLsec. In Proc. 29th Int. Conf. on Software Eng., 2007, pp. 581\u2013590.","DOI":"10.1109\/ICSE.2007.55"},{"key":"329_CR4_329","unstructured":"Castano S., Fugini M., Martella G., and Samarati P. Database Security. Addison-Wesley, 1994."},{"issue":"2","key":"329_CR5_329","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/69.277771","volume":"6","author":"E.B. Fernandez","year":"1994","unstructured":"Fernandez E.B., Gudes E., and Song H. A model for evaluation and administration of security in object-oriented databases. IEEE Trans. Knowl. Database Eng., 6(2):275\u2013292, 1994.","journal-title":"IEEE Trans. Knowl. Database Eng."},{"key":"329_CR6_329","doi-asserted-by":"crossref","unstructured":"Fernandez E.B., Larrondo-Petrie M.M., Sorgente T., and VanHilst M. A methodology to develop secure systems using patterns, Chapter V. In Integrating Security and Software Engineering: Advances and Future Vision, H. Mouratidis, P. Giorgini (eds.). IDEA Press, 2006, pp. 107\u2013126.","DOI":"10.4018\/978-1-59904-147-6.ch005"},{"key":"329_CR7_329","unstructured":"Fernandez E.B., Summers R.C., and Wood C. Database Security and Integrity (Systems Programming Series). Addison-Wesley, 1981."},{"key":"329_CR8_329","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Medina E. and Piattini M. Extending OCL for secure database development. In Proc. Int. Conf. on the Unified Modeling Language, 2004, pp. 380\u2013394.Lisbon, Portugal. LNCS,","DOI":"10.1007\/978-3-540-30187-5_27"},{"issue":"7","key":"329_CR9_329","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/j.infsof.2004.09.013","volume":"47","author":"E. Fern\u00e1ndez-Medina","year":"2005","unstructured":"Fern\u00e1ndez-Medina E. and Piattini M. Designing secure databases. Inf. Softw. Technol., 47(7):463\u2013477, 2005.","journal-title":"Inf. Softw. Technol."},{"key":"329_CR10_329","unstructured":"Fugini M. Secure database development methodologies. In Database Security: Status and Prospects, C.E. Landwehr (ed.). Elsevier, 1987, pp. 103\u2013129."},{"key":"329_CR11_329","doi-asserted-by":"crossref","unstructured":"Ge X., Polack F., and Laleau R. Secure Databases: an Analysis of Clark-Wilson Model in a Database Environment. In Proc. 16th Int. Conf. on Advanced Information Systems Eng., 2004, pp. 234\u2013247.","DOI":"10.1007\/978-3-540-25975-6_18"},{"key":"329_CR12_329","doi-asserted-by":"crossref","unstructured":"Hafner M. and Breu R. Towards a MOF\/QVT-Based Domain Architecture for Model Driven Security. In Proc. 9th Int. Conf. Model Driven Eng. Lang. and Syst., 2006.","DOI":"10.1007\/11880240_20"},{"key":"329_CR13_329","volume-title":"Secure Systems Development with UML","author":"J. Jurjens","year":"2004","unstructured":"Jurjens J. Secure Systems Development with UML. Springer, New York, 2004."},{"key":"329_CR14_329","doi-asserted-by":"crossref","unstructured":"Jurjens J. Sound methods and effective tools for model-based security engineering with UML. In Proc. 27th Int. Conf. on Software Eng., 2005, pp. 322\u2013331.","DOI":"10.1145\/1062455.1062519"},{"key":"329_CR15_329","unstructured":"Mouratidis H., J\u00fcrjens J., and Fox J. Towards a comprehensive framework for secure systems development. In Proc. 18th Int. Conf. on Advanced Information Systems Eng., 2006, pp. 48\u201362.CAiSE, Luxembourg. LNCS, (Eric Dubois, Klaus Pohl, eds.),"}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-39940-9_329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T04:25:42Z","timestamp":1590985542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-39940-9_329"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387355443","9780387399409"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-39940-9_329","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}