{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:46:43Z","timestamp":1725472003171},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540467885"},{"type":"electronic","value":"9783540467908"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11896548_22","type":"book-chapter","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T06:02:49Z","timestamp":1161151369000},"page":"250-263","source":"Crossref","is-referenced-by-count":5,"title":["Query Translation for XPath-Based Security Views"],"prefix":"10.1007","author":[{"given":"Roel","family":"Vercammen","sequence":"first","affiliation":[]},{"given":"Jan","family":"Hidders","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Paredaens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/3-540-36285-1_6","volume-title":"Database Theory - ICDT 2003","author":"M. Benedikt","year":"2002","unstructured":"Benedikt, M., Fan, W., Kuper, G.M.: Structural properties of xPath fragments. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol.\u00a02572, pp. 79\u201395. Springer, Heidelberg (2002)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/11601524_9","volume-title":"Database Programming Languages","author":"M. Benedikt","year":"2005","unstructured":"Benedikt, M., Fundulaki, I.: XML subtree queries:\u00a0Specification and composition. In: Bierman, G., Koch, C. (eds.) DBPL 2005. LNCS, vol.\u00a03774, pp. 138\u2013153. Springer, Heidelberg (2005)"},{"key":"22_CR3","unstructured":"Berglund, A., Boag, S., Chamberlin, D., Fern\u00e1ndez, M., Kay, M., Robie, J., Sim\u00e9on, J.: XML path language (XPath) 2.0, W3C working draft (2005), \n                    \n                      http:\/\/www.w3.org\/TR\/xpath20"},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur.\u00a05(3), 290\u2013331 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"22_CR5","unstructured":"Draper, D., Frankhauser, P., Fern\u00e1ndez, M., Malhotra, A., Rose, K., Rys, M., Sim\u00e9on, J., Wadler, P.: XQuery 1.0 and XPath 2.0 formal semantics. W3C Working Draft (2005)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Fan, W., Chan, C.Y., Garofalakis, M.N.: Secure XML querying with security views. In: SIGMOD Conference, pp. 587\u2013598 (2004)","DOI":"10.1145\/1007568.1007634"},{"key":"22_CR7","unstructured":"Fern\u00e1ndez, M., Malhotra, A., Marsh, J., Nagy, M., Walsh, N.: XQuery 1.0 and XPath 2.0 data model (XDM) (2005), \n                    \n                      http:\/\/www.w3.org\/TR\/xpath-datamodel\/"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: SACMAT 2004, pp. 61\u201369 (2004)","DOI":"10.1145\/990036.990046"},{"key":"22_CR9","unstructured":"Godik, S., Moses, T. (eds.): eXtensible Access Control Markup Language (XACML) Version 1.0. (February 2003)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Gottlob, G., Koch, C., Pichler, R.: The complexity of XPath query evaluation. In: PODS 2003, San Diego, California, pp. 179\u2013190 (2003)","DOI":"10.1145\/773153.773171"},{"key":"22_CR11","unstructured":"Kudo, M., Hada, S.: XML access control, \n                    \n                      http:\/\/www.trl.ibm.com\/projects\/xml\/xacl\/"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Kuper, G., Fabio, M., Nataliya, R.: Generalized XML security views. In: SACMAT 2005, pp. 77\u201384 (2005)","DOI":"10.1145\/1063979.1063994"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Murata, M., Tozawa, A., Kudo, M., Hada, S.: XML access control using static analysis. In: CCS, pp. 73\u201384 (2003)","DOI":"10.1145\/948109.948122"},{"key":"22_CR14","series-title":"IFIP Conference Proceedings","first-page":"133","volume-title":"DBSec","author":"A. Stoica","year":"2002","unstructured":"Stoica, A., Farkas, C.: Secure XML views. In: Gudes, E., Shenoi, S. (eds.) DBSec. IFIP Conference Proceedings, vol.\u00a0256, pp. 133\u2013146. Kluwer, Dordrecht (2002)"}],"container-title":["Lecture Notes in Computer Science","Current Trends in Database Technology \u2013 EDBT 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11896548_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:36:43Z","timestamp":1619509003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11896548_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540467885","9783540467908"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11896548_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}