{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:17:54Z","timestamp":1725495474895},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540001300"},{"type":"electronic","value":"9783540361282"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36128-6_38","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T17:20:41Z","timestamp":1194974441000},"page":"587-596","source":"Crossref","is-referenced-by-count":0,"title":["Secure Publishing of XML Documents"],"prefix":"10.1007","author":[{"given":"Barbara","family":"Carminati","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,11,8]]},"reference":[{"key":"38_CR1","unstructured":"RJ Anderson, JH Lee. Jikzi: A New Framework for Secure Publishing. Security Protocols: Proceedings of the 5th international workshop."},{"key":"38_CR2","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/S1363-4127(01)00206-0","volume":"6-2","author":"E. Bertino","year":"2001","unstructured":"E. Bertino, B. Carminati, E. Ferrari. XML Security. Information Security Technical Report, Vol 6-2, 44\u201358, 2001, Elsevier Advanced Technology.","journal-title":"Information Security Technical Report"},{"key":"38_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/3-540-45439-X_24","volume-title":"Information Security Conference (ISC01)","author":"E. Bertino","year":"2001","unstructured":"E. Bertino, B. Carminati, E. Ferrari. A Secure Publishing Service for Digital Libraries of XML Documents. Information Security Conference (ISC01), Lecture Notes in Computer Science, 2200:347\u2013362, Malaga, Spain, 2001."},{"key":"38_CR4","unstructured":"E. Bertino, B. Carminati, E. Ferrari, B. Thuraisingham, A. Gupta. Selective and Authentic Third-party Distribution of XML Document. Technical Report DSI, University of Milano. Submitted for publication."},{"key":"38_CR5","unstructured":"B. Carminati, E. Ferrari. Management of Access Control Policies for XML Document Sources. Technical Report DSI, University of Milano. Submitted for publication."},{"key":"38_CR6","unstructured":"D. Beech, M. Maloney, N. Mendelsohn, H. Thompson. XML Schema Part 1: Structures. W3C Proposed Recommendation, October 2000."},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"A. Deutsch, M. Fernandez, D. Florescu, A. Levy, and D. Suciu. A Query Language for XML. In Proc. Int\u2019l Conference on World Wide Web, Toronto, Canada, May 1999. Available at: http:\/\/www.research.att.com\/suciu .","DOI":"10.1016\/S1389-1286(99)00020-1"},{"key":"38_CR8","unstructured":"C. Geuer Pollmann. The XML Security Page. Available at http:\/\/www.nue.et-inf.uni-siegen.de\/~geuer-pollmann\/xml_security. html ."},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"H. Gladney, and J. Lotspiech. Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality. D-lib Magazine, May 1997.","DOI":"10.1045\/may97-gladney"},{"key":"38_CR10","unstructured":"R.C. Merkle A Certified Digital Signature. In Advances in Cryptology-Crypto\u2019 89, 1989."},{"key":"38_CR11","unstructured":"J. Robbie. XQL\u201999 Proposal, 1999. Available at http:\/\/metalab.unc.edu\/xql\/xql-proposal.html ."},{"key":"38_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/3-540-45263-X_17","volume-title":"COORDINATION 2000","author":"P. Katis","year":"2000","unstructured":"P. Katis, N. Sabadini, R.F.C. Walters. A formalization of the IWIM model. COORDINATION 2000, (Eds.) Porto, A.; Roman, G.-C., (Eds.), LNCS 1906, pages 267\u2013283, 2000."},{"key":"38_CR13","unstructured":"W. Stallings. Network Security Essentials: Applications and Standards. Prentice Hall, 2000."},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Wen-Guey Tzeng. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. IEEE Transactions on Knowledge and Data Engineeriing, 2001.","DOI":"10.1109\/69.979981"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"M. Winslett, N. Ching, V. Jones, I. Slepchin. Using Digital Credentials on the World Wide Web. Journal of Computer Security, 7, 1997.","DOI":"10.3233\/JCS-1997-5307"},{"key":"38_CR16","unstructured":"World Wide Web Consortium. XLink XML Linking Language, 1.0, 1999. W3C Recommendation. Available at http:\/\/www.w3.org\/TR\/xlink\/"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Word Wide Web Consortium. Extensible Markup Language (XML) 1.0, 1998.","DOI":"10.1007\/978-3-642-59944-6_8"},{"key":"38_CR18","unstructured":"World Wide Web Consortium. XML Encryption Working Group, 2001. http:\/\/www.w3.org\/TR\/2001\/CR-xmldsig-core-20010419\/"},{"key":"38_CR19","unstructured":"World Wide Web Consortium. XML Signature, 2001. http:\/\/www.w3.org\/TR\/2001\/CR-xmldsig-core-20010419\/"},{"key":"38_CR20","unstructured":"World Wide Web Consortium. XML Path Language (Xpath), 1.0, 1999. W3C Recommendation. Available at http:\/\/www.w3.org\/TR\/xpath ."},{"key":"38_CR21","unstructured":"World Wide Web Consortium. XML Query (XQuery), 1.0, 2001. W3C Working Draft. Available at http:\/\/www.w3.org\/TR\/xquery ."}],"container-title":["Lecture Notes in Computer Science","XML-Based Data Management and Multimedia Engineering \u2014 EDBT 2002 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36128-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T07:19:03Z","timestamp":1556954343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36128-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001300","9783540361282"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-36128-6_38","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}