{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:04:38Z","timestamp":1725473078467},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540477037"},{"type":"electronic","value":"9783540477044"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11908883_14","type":"book-chapter","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T10:43:22Z","timestamp":1163846602000},"page":"110-119","source":"Crossref","is-referenced-by-count":6,"title":["Access Control in Geographic Databases"],"prefix":"10.1007","author":[{"given":"Liliana Kasumi","family":"Sasaoka","sequence":"first","affiliation":[]},{"given":"Claudia Bauzer","family":"Medeiros","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Ashby, V., Jajodia, S., Smith, G., Wisseman, S., Wichers, D.: Trusted Database Management Systems - Interpretation of the Trusted Computer System Evaluation Criteria. Technical Report 001-005, National Computer Security Center, 75 pages (1996)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Belussi, A., Bertino, E., Catania, B., Damiani, M., Nucita, A.: An Authorization Model for Geographical Maps. In: Proc. 14th ACM GIS, November 2004, pp. 82\u201391 (2004)","DOI":"10.1145\/1032222.1032236"},{"issue":"3","key":"14_CR3","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security\u00a04(3), 191\u2013223 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Damiani, M., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: Proc., 10th ACM Symposium on Access Control, June 2005, pp. 29\u201337 (2005)","DOI":"10.1145\/1063979.1063985"},{"issue":"3","key":"14_CR5","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/A:1019289831564","volume":"3","author":"E. Bertino","year":"2000","unstructured":"Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and enforcing access control policies for XML document sources. World Wide Web\u00a03(3), 139\u2013151 (2000)","journal-title":"World Wide Web"},{"key":"14_CR6","unstructured":"Baraani-Dastjerdi, A., Pieprzyk, J., Safavi-Naini, R.: Security in Databases: A Survey Study, February 1996, pp. 1\u201339 (1996), \n                    \n                      http:\/\/citeseer.nj.nec.com\/baraani-dastjerdi96security.html"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K.: An access control model for video database systems. In: CIKM, pp. 336\u2013343 (2000)","DOI":"10.1145\/354756.354838"},{"issue":"7","key":"14_CR8","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1016\/0306-4379(95)00029-4","volume":"20","author":"E. Bertino","year":"1995","unstructured":"Bertino, E., Jajodia, S., Samarati, P.: Database Security - Research and Practice. Information Systems\u00a020(7), 537\u2013556 (1995)","journal-title":"Information Systems"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Bell, D.E., La Padula, L.J.: Secure Computer Systems: Unified exposition and Multics interpretation. Technical report, The Mitre Corp. (1976)","DOI":"10.21236\/ADA023588"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Clementini, E., di Felice, P., van Oosterom, P.: A Small Set of Formal Topological Relationships Suitable for End-User Interaction. In: Proceedings of the 3rd Symposium Spatial Database Systems, pp. 277\u2013295 (1993)","DOI":"10.1007\/3-540-56869-7_16"},{"key":"14_CR11","unstructured":"Ferraiolo, D., Kuhn, R.: Role-Based Access Control. In: Proceedings of 15th National Computer Security Conference (1992)"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/320473.320482","volume":"1","author":"P.G. Griffiths","year":"1976","unstructured":"Griffiths, P.G., Wade, B.: An authorization mechanism for a relational dabase system. ACM TODS\u00a01(3), 243\u2013255 (1976)","journal-title":"ACM TODS"},{"key":"14_CR13","unstructured":"Magalhaes, G.C.: Telecommunications outside plant management throughout Brazil. In: Proc. GITA 1997 (1997)"},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/383775.383777","volume":"4","author":"J. Park","year":"2001","unstructured":"Park, J., Sandhu, R., Ahn, G.: Role-Based Access Control on the Web. ACM Transactions on Information and System Security\u00a04(1), 37\u201371 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"14_CR15","unstructured":"Sagre, \n                    \n                      http:\/\/www.cpqdusa.com\/solutions\/outside.html\n                    \n                    \n                   (accessed on April 2006)"},{"key":"14_CR16","unstructured":"Sasaoka, L.K.: Access Control in Geographic Databases. Master\u2019s thesis, Universidade Estadual de Campina (June 2002) (in Portuguese)"},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/TNET.2004.828953","volume":"12","author":"W. Ye","year":"2004","unstructured":"Ye, W., Heidemann, J., Estrin, D.: Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks. IEEE\/ACM Transactions on Networking\u00a012(3), 493\u2013506 (2004)","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Lecture Notes in Computer Science","Advances in Conceptual Modeling - Theory and Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11908883_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:39:09Z","timestamp":1619509149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11908883_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540477037","9783540477044"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11908883_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}