{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:27:14Z","timestamp":1725460034685},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402080692"},{"type":"electronic","value":"9781402080708"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8070-0_9","type":"book-chapter","created":{"date-parts":[[2006,3,2]],"date-time":"2006-03-02T08:21:25Z","timestamp":1141287685000},"page":"119-132","source":"Crossref","is-referenced-by-count":4,"title":["Correlated Data Inference"],"prefix":"10.1007","author":[{"given":"Csilla","family":"Farkas","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrei G.","family":"Stoica","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"S. Abiteboul, D. Quass, J. McHugh, J. Widom, and J. Wiener. (1997). The Lorel query language for semi-structured data. Journal of Digital Libraries. Volume 1","DOI":"10.1007\/s007990050005"},{"key":"9_CR2","unstructured":"B. Amann, I. Fundulaki, and M. Scholl, et at. (2001). Mapping XML Fragments to Community Web Ontologies. Proceedings Fourth International Workshop on the Web and Databases"},{"key":"9_CR3","unstructured":"E. Bertino, S. Castano, E. Ferrari, and M. Mesiti. (2000). Specifying and Enforcing Access Control Policies for XML Document Sources. WWW Journal, Baltzer Science Publishers, Vol.3, N.3."},{"key":"9_CR4","unstructured":"E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. (2000). XML Access Control Systems: A Component-Based Approach. In Proc. IFIP WG11.3 Working Conference on Database Security, The Netherlands."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"P. Devanbu, M. Gertz et al. (2001). Flexible authentication of XML documents. ACM Conference on Computer and Communications Security.","DOI":"10.1145\/501983.502003"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"F. Dridi and G. Neumann. (1998). Towards access control for logical document structure. In Proc. of the Ninth International Workshop of Database and Expert Systems Applications, pages 322\u2013327, Vienna, Austria.","DOI":"10.1109\/DEXA.1998.707420"},{"key":"9_CR7","unstructured":"M. Erdman, S. Decker. Ontology-aware XML Queries. http:\/\/www.aifb.uni-karlsruhe.de\/mer\/Pubs\/semantic-xql.webdb00.pdf"},{"key":"9_CR8","unstructured":"M. Erdman and R. Studer. (to appear). How to Structure and Access XML Documents with Ontologies. Data and Knowledge Engineering, Special Issue on Intelligent Information Integration"},{"key":"9_CR9","unstructured":"M. Erdman and R. Studer. (1999). Ontologies as Conceptual Model for XML Documents. Proc. of the 12-th Workshop for Knowledge, Acquisition, Modeling and Management. Banff, Canada."},{"key":"9_CR10","unstructured":"A. Gabillon and E. Bruno. (2001). Regulating Access to XML Documents. In Proc. IFIP WG11.3 Working Conference on Database Security."},{"issue":"2","key":"9_CR11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"6","author":"T.R. Gruber","year":"1993","unstructured":"T.R. Gruber. (1993). A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition. Vol.6, no.2, pp 199\u2013221","journal-title":"Knowledge Acquisition"},{"key":"9_CR12","first-page":"570","volume-title":"Information Security: An integrated collection of essays","author":"S. Jajodia","year":"1995","unstructured":"S. Jajodia and C. Meadows. (1995). Inference problems in multilevel secure database management systems. In Information Security: An integrated collection of essays, pages 570\u2013584, IEEE Computer Society Press, Los Alamitos, C.A."},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1145\/210332.210335","volume":"42","author":"M. Kifer","year":"1995","unstructured":"M. Kifer, Georg Lausen, James Wu. (1995). Logical Foundations of Object Oriented and Frame Based Languages. Journal of ACM, vol. 42, p. 741\u2013843","journal-title":"Journal of ACM"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"M. Kudo and S. Hada. (2000). XML Document Security based on Provisional Authorizations. In Proc. of the 7th ACM conference on Computer and Communications Security, Athens Greece, November.","DOI":"10.1145\/352600.352613"},{"key":"9_CR15","unstructured":"T. Lee and J. Hendler (2001). The Semantic Web. Scientific American."},{"key":"9_CR16","unstructured":"OIL. Ontology Inference. Layer. http:\/\/www.ontoknowledge.org\/oil\/"},{"key":"9_CR17","unstructured":"J. Robie, J. Lapp, and D. Schach. (1998). XML Query Language (XQL). Proceedings of the W3C Query Language Workshop (QL-98), Boston."},{"key":"9_CR18","unstructured":"W3C. (2001). XML Encryption Requirements. W3C Working Draft, http:\/\/www.w3.org\/TR\/2001\/WD-xml-encryption-req-20011018"}],"container-title":["IFIP International Federation for Information Processing","Data and Applications Security XVII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8070-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T04:31:14Z","timestamp":1555475474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8070-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402080692","9781402080708"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8070-0_9","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}