{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:16:27Z","timestamp":1740096987580,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["12-07-92693-IND_a, 12-07-00014-a"],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,26]]},"DOI":"10.1145\/2523514.2527015","type":"proceedings-article","created":{"date-parts":[[2014,1,7]],"date-time":"2014-01-07T14:49:20Z","timestamp":1389106160000},"page":"396-399","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance analysis of the developed mandatory access control system in the DBMS"],"prefix":"10.1145","author":[{"given":"Babenko","family":"Ludmila","sequence":"first","affiliation":[{"name":"Southern Federal University, Russia"}]},{"given":"Basan","family":"Alexandr","sequence":"additional","affiliation":[{"name":"Southern Federal University, Russia"}]},{"given":"Oleg","family":"Makarevich","sequence":"additional","affiliation":[{"name":"Southern Federal University, Russia"}]}],"member":"320","published-online":{"date-parts":[[2013,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626213"},{"volume-title":"Moscow","year":"1965","author":"Kaufman A.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Lazowska Edward D.; John Zahorjan G. Scott Graham Kenneth C. Sevcik. Quantitative System Performance: Computer System Analysis Using Queueing Network Models. Prentice-Hall Inc. ISBN 0-13-746975-6. 1984 Lazowska Edward D.; John Zahorjan G. Scott Graham Kenneth C. Sevcik. Quantitative System Performance: Computer System Analysis Using Queueing Network Models. Prentice-Hall Inc. ISBN 0-13-746975-6 . 1984"}],"event":{"name":"SIN '13: The 6th International Conference on Security of Information and Networks","sponsor":["Macquarie U., Austarlia","MNIT Malaviya National Institute of Technology","Aksaray Univ. Aksaray University","SFedU Southern Federal University","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Aksaray Turkey","acronym":"SIN '13"},"container-title":["Proceedings of the 6th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523514.2527015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T09:51:27Z","timestamp":1673689887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523514.2527015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,26]]},"references-count":3,"alternative-id":["10.1145\/2523514.2527015","10.1145\/2523514"],"URL":"https:\/\/doi.org\/10.1145\/2523514.2527015","relation":{},"subject":[],"published":{"date-parts":[[2013,11,26]]},"assertion":[{"value":"2013-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}