{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:16Z","timestamp":1725551596235},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_11","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"148-163","source":"Crossref","is-referenced-by-count":6,"title":["Protection of Relationships in XML Documents with the XML-BB Model"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thierry","family":"Sans","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer, 38\u201347 (1996)","DOI":"10.1109\/2.485845"},{"key":"11_CR2","unstructured":"Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and Enforcing Access Control Policies for XML Document Sources. World Wide Web Journal (2000)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-46439-5_8","volume-title":"Advances in Database Technology - EDBT 2000","author":"E. Damiani","year":"2000","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol.\u00a01777, p. 121. Springer, Heidelberg (2000)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A Fine-Grained Access Control System for XML Documents. In: ACM Transactions on Information and System Security (TISSEC) (2002)","DOI":"10.1145\/505586.505590"},{"key":"11_CR5","unstructured":"Gabillon, A., Bruno, E.: Regulating Access to XML documents. In: Fifteenth Annual IFIP WG 11.3 Working Conference on Database Security, Niagara on the Lake, Ontario, Canada (2001)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Gabillon, A.: An Authorization Model for XML DataBases. In: ACM Workshop on Secure Web Services, Fairfax, VA (2004)","DOI":"10.1145\/1111348.1111351"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Kudo, M., Hada, S.: XML Document Security Based on Provisional Authorisation. In: ACM Computer and Communications Security, Athens Greece (2000)","DOI":"10.1145\/352600.352613"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Brewer, D., Nash, M.: The Chinese wall security policy. In: IEEE Symposium on Security and Privacy, Oakland (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"11_CR9","unstructured":"Clark, J., DeRose, S.: XML Path Language (XPath) Version 1.0. Technical report, World Wide Web Consortium, W3C (2000), http:\/\/www.w3c.org\/TR\/xpath"},{"key":"11_CR10","unstructured":"Laux, A., Martin, L.: XML Update (XUpdate) language. Technical report, XML:DB working draft (1999), http:\/\/www.xmldb.org\/xupdate"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Fan, W., Chan, C.Y., Garofalakis, M.: Secure XML Querying with Security Views. In: SIGMOD (2004)","DOI":"10.1145\/1007568.1007634"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Mi\u00e8ge, A.: Modelling contexts in the Or-BAC model. In: 19th Annual Computer Security Applications Conference, Las Vegas (2003)","DOI":"10.1109\/CSAC.2003.1254346"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:53Z","timestamp":1605643373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11593980_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}