{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:39:32Z","timestamp":1725457172516},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375142"},{"type":"electronic","value":"9780306470080"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-47008-x_17","type":"book-chapter","created":{"date-parts":[[2005,12,12]],"date-time":"2005-12-12T18:28:25Z","timestamp":1134412105000},"page":"185-196","source":"Crossref","is-referenced-by-count":1,"title":["Protecting Deductive Databases from Unauthorized Retrievals"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Abiteboul, S., Hull, R., and Vianu, V., Foundations of Databases, Addison-Wesley, 1995."},{"key":"17_CR2","unstructured":"Apt, K., and Bezem, M., Acyclic Programs, New Generation Computing, 1990."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Barker, S., Data Protection by Logic Programming, 1st International Conference on Computational Logic, LNAI 1861, Springer, 2000.","DOI":"10.1007\/3-540-44957-4_87"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Barker, S., Secure Deductive Databases, 3rd International Workshop on Practical Applications of Declarative Languages (PADL\u201901), 2001.","DOI":"10.1007\/3-540-45241-9_9"},{"key":"17_CR5","unstructured":"Barker, S., Access Control by Constraint Satisfaction, To Appear."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Kraus, S., and Subrahmanian, V., Foundations of Secure Deductive Databases, IEEE TKDE, 7(3), 1995.","DOI":"10.1109\/69.390247"},{"key":"17_CR7","unstructured":"Castano, S., Fugini, M., Martella, G., and Samarati, P., Database Security, Addison Wesley, 1995."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Chen, W., and Warren, D., Tabled Evaluation with Delaying for General Logic Programs, J. ACM, 43(1), 1996.","DOI":"10.1145\/227595.227597"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Cuppens, F., and Demolombe, R., A Modal Logical Framework for Security Policies, ISMIS\u201997, 1997.","DOI":"10.1007\/3-540-63614-5_56"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"LLoyd, J., Foundations of Logic Programming, Springer, 1987.","DOI":"10.1007\/978-3-642-83189-8"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Minker, J., Logic and Databases: A 20 Year Retrospective, 1st I\u2019nat. Workshop on Logic in Databases, LNCS 1154, Springer, 1996.","DOI":"10.1007\/BFb0031734"},{"key":"17_CR12","unstructured":"Przymusinski, T., Perfect Model Semantics, Proc. 5th ICLP, 1988."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Ramakrishnan, R., Applications of Logic Databases, Kluwer, 1995.","DOI":"10.1007\/978-1-4615-2207-2"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., and Youman, C., Role-Based Access Control Models, IEEE Computer, 1996.","DOI":"10.1109\/2.485845"},{"key":"17_CR15","unstructured":"Sagonas, K., Swift, T., Warren, D., Freire, J., Rao. P., The XSB System, Version 2.0, Programmer\u2019s Manual, 1999."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Van Gelder, A., Ross, K., and Schlipf, J., The Well-Founded Semantics for General Logic Programs, J. ACM, 38(3), 1991.","DOI":"10.1145\/116825.116838"},{"key":"17_CR17","unstructured":"Vardi, M., The Complexity of Query Languages, ACM Symp. on the Theory of Computing, May, 1982."}],"container-title":["IFIP International Federation for Information Processing","Data and Application Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-47008-X_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T14:26:20Z","timestamp":1586615180000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-47008-X_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375142","9780306470080"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/0-306-47008-x_17","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2002]]}}}